File name:

start.exe

Full analysis: https://app.any.run/tasks/fee298db-2505-44e6-968b-8b4094495c14
Verdict: Malicious activity
Analysis date: May 30, 2025, 10:48:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
sfx
dropper
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

AB3847BFF89EB639A99AFECFC2FA05C5

SHA1:

1E018D2911C0FF22908752FB1134945BC6944FA5

SHA256:

5751CEB02DA4FBABA02AC497385AF9A898D964204A11F00F1410A3A0DBB3B06D

SSDEEP:

12288:tcgCzNHJj96xfKJStJkRm3bYXob0AnmFMcaGQx8n54cAAfkIJpDfK:EQKgLIQmFuGQxuAAfkIbjK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SFX dropper has been detected

      • start.exe (PID: 1572)
  • SUSPICIOUS

    • Application launched itself

      • start.exe (PID: 1572)
    • Reads the Internet Settings

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
      • cmd.exe (PID: 676)
      • time.exe (PID: 2888)
      • donate.exe (PID: 1892)
    • Reads security settings of Internet Explorer

      • start.exe (PID: 1572)
      • time.exe (PID: 2888)
      • donate.exe (PID: 1892)
    • There is functionality for taking screenshot (YARA)

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
    • Executing commands from a ".bat" file

      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
      • explorer.exe (PID: 2196)
    • Starts CMD.EXE for commands execution

      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
      • explorer.exe (PID: 2196)
    • Uses REG/REGEDIT.EXE to modify registry

      • joke.exe (PID: 1632)
    • Uses TASKKILL.EXE to kill process

      • joke.exe (PID: 1632)
    • The process executes JS scripts

      • cmd.exe (PID: 3304)
    • The executable file from the user directory is run by the CMD process

      • s.exe (PID: 3976)
    • Executable content was dropped or overwritten

      • cscript.exe (PID: 2772)
  • INFO

    • Reads the computer name

      • start.exe (PID: 1572)
      • donate.exe (PID: 1892)
      • start.exe (PID: 2656)
      • time.exe (PID: 2888)
    • Checks supported languages

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
      • time.exe (PID: 2888)
      • donate.exe (PID: 1892)
    • Creates files in the program directory

      • start.exe (PID: 2656)
    • Manual execution by a user

      • WinRAR.exe (PID: 2960)
      • time.exe (PID: 2888)
      • time.exe (PID: 2780)
      • joke.exe (PID: 1632)
      • joke.exe (PID: 4048)
      • taskmgr.exe (PID: 2416)
      • donate.exe (PID: 1892)
    • Application launched itself

      • chrome.exe (PID: 1848)
    • Create files in a temporary directory

      • time.exe (PID: 2888)
      • donate.exe (PID: 1892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:03 07:51:19+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.33
CodeSize: 214528
InitializedDataSize: 188928
UninitializedDataSize: -
EntryPoint: 0x21d50
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
82
Monitored processes
29
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #DROPPER start.exe no specs start.exe winrar.exe no specs taskmgr.exe no specs donate.exe no specs cmd.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs time.exe no specs time.exe chrome.exe no specs chrome.exe no specs cmd.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs joke.exe no specs joke.exe taskkill.exe no specs taskkill.exe no specs reg.exe no specs explorer.exe no specs taskmgr.exe no specs cmd.exe no specs cscript.exe s.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
676"C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\E74E.tmp\E74F.tmp\E750.bat C:\Users\admin\Desktop\donate.exe"C:\Windows\System32\cmd.exedonate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1548"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1572"C:\Users\admin\Desktop\start.exe" C:\Users\admin\Desktop\start.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\start.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1632"C:\Users\admin\Desktop\joke.exe" C:\Users\admin\Desktop\joke.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Virus
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\joke.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1848"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.donationalerts.com/r/Reyz0L"C:\Program Files\Google\Chrome\Application\chrome.exe
cmd.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1892"C:\Users\admin\Desktop\donate.exe" C:\Users\admin\Desktop\donate.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\donate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2196explorer.exeC:\Windows\explorer.exejoke.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2416"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2580REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /fC:\Windows\System32\reg.exejoke.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2804 --field-trial-handle=1164,i,2602935251816353573,14682431328285503331,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
19 744
Read events
19 538
Write events
204
Delete events
2

Modification events

(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
Executable files
1
Suspicious files
20
Text files
25
Unknown types
0

Dropped files

PID
Process
Filename
Type
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF19016d.TMP
MD5:
SHA256:
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF1900f0.TMPtext
MD5:456D3EF989973A7C218E338A6CFFAD25
SHA256:75631D994431F254B94255C50038A3657BFC45D76FCE9D794D514E57CA678872
1892donate.exeC:\Users\admin\AppData\Local\Temp\E74E.tmp\E74F.tmp\E750.battext
MD5:45D022431CB16738A2CC3E942AFD5588
SHA256:AEEF76E749F86EDF2BFCB60A263AD3613339FC06750BC0060ABB69568B923725
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.oldtext
MD5:5CB0B2845A3BDF2304E7CEA61A3FC51E
SHA256:0A73277FE3C683BCACFCF2658568C9D750AB78F56A4DEA9FBD563AA5D67EC666
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old~RF190620.TMPtext
MD5:FF6BABA737D50E515029C3F3A1305BBC
SHA256:670EED15EAA8E3F1A4F8612B229654EB0C64107AEAF0B1017E4BD45E3F7EED83
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\489cccaf-e057-43a5-9065-c7a77e673cf5.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF19011f.TMPtext
MD5:825B582C78EC88D54C215EFDF1EAD639
SHA256:367995D01A8F13E5C30C79499F86B034775BFD009D83DC97635DE438D47DFA37
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldtext
MD5:A24B909E4573DE480D459FBFBD20D770
SHA256:E7D33D7AD48DE7D8C150ED0DA355C8ACE856C8C5F7DEE13CD74EE41B13748284
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:1C6BD9993E8ECB91342E78927D81DCA3
SHA256:76BE6BB39D2B3287BCBBCF6465599F0CF66FE5B9F4F55D10ED38B0BCF1A4BEC3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
20
DNS requests
15
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
3012
chrome.exe
142.250.185.131:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
1848
chrome.exe
239.255.255.250:1900
whitelisted
3012
chrome.exe
92.38.244.24:443
www.donationalerts.com
LLC Digital Network
RU
unknown
3012
chrome.exe
74.125.71.84:443
accounts.google.com
GOOGLE
US
whitelisted
3012
chrome.exe
142.250.186.132:443
www.google.com
GOOGLE
US
whitelisted
1848
chrome.exe
224.0.0.251:5353
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
clientservices.googleapis.com
  • 142.250.185.131
whitelisted
www.donationalerts.com
  • 92.38.244.24
unknown
accounts.google.com
  • 74.125.71.84
whitelisted
www.google.com
  • 142.250.186.132
whitelisted
update.googleapis.com
  • 142.250.184.195
whitelisted
optimizationguide-pa.googleapis.com
  • 142.250.185.202
  • 142.250.186.106
  • 142.250.185.74
  • 142.250.186.138
  • 142.250.181.234
  • 172.217.23.106
  • 142.250.185.138
  • 142.250.185.170
  • 216.58.206.42
  • 142.250.186.74
  • 142.250.74.202
  • 216.58.212.170
  • 142.250.186.42
  • 142.250.185.234
  • 172.217.16.202
  • 142.250.185.106
whitelisted
www.googleapis.com
  • 172.217.18.10
  • 142.250.185.202
  • 142.250.184.234
  • 142.250.185.170
  • 142.250.185.106
  • 172.217.18.106
  • 142.250.181.234
  • 142.250.184.202
  • 142.250.185.74
  • 142.250.186.106
  • 142.250.186.138
  • 142.250.185.234
  • 142.250.186.170
  • 142.250.185.138
  • 172.217.23.106
  • 216.58.206.74
whitelisted

Threats

No threats detected
No debug info