File name:

5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe

Full analysis: https://app.any.run/tasks/192da4fd-4117-436b-a5e2-881fc52ce673
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 15, 2025, 18:24:44
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
trox
stealer
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 10 sections
MD5:

39683EC6F79958BBDEA8CBFC405CB5BD

SHA1:

F277E72C779020B5E8E9FB66D816EB8B7FAD4D29

SHA256:

5C1762991B72ED564D5F728D256ECBB4472F9E12D6F82C4F31AAD5FC1CE99CDD

SSDEEP:

98304:egKBJF5myzrJJokGOnWZGMkCGN3EFyRUZD/wQySa5CJgV1E1Frv1/x4wqsSN28GT:yAw+aQ2SqMMqDDiQ+0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROX has been detected

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Process drops legitimate windows executable

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Executable content was dropped or overwritten

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Process drops python dynamic module

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Loads Python modules

      • main.exe (PID: 8076)
  • INFO

    • Create files in a temporary directory

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • The sample compiled with english language support

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Checks supported languages

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
      • main.exe (PID: 8076)
    • Reads the computer name

      • main.exe (PID: 8076)
    • Reads the machine GUID from the registry

      • main.exe (PID: 8076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:09 09:08:43+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.43
CodeSize: 86016
InitializedDataSize: 7391232
UninitializedDataSize: 150528
EntryPoint: 0x10ba
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.2.1.0
ProductVersionNumber: 0.2.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
ProductName: mablo
ProductVersion: 0.2.1.0
FileVersion: 0.2.1.0
OriginalFileName: main.exe
InternalName: main
FileDescription: main.exe
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROX 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe main.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7512"C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe" C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
main.exe
Version:
0.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8076C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\main.exe5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
main.exe
Version:
0.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_7512_133918070910437294\main.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8160C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
294
Read events
294
Write events
0
Delete events
0

Modification events

No data
Executable files
22
Suspicious files
2
Text files
916
Unknown types
0

Dropped files

PID
Process
Filename
Type
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_ctypes.pydexecutable
MD5:10861D3FA19D7DC3B41EB6F837340782
SHA256:6255BAB0B7F3E2209A9C8B89A3E1EC1BBC7A29849A18E70C0CF582A63C90BED1
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_queue.pydexecutable
MD5:234F63AE981F5A8E87DBABDA8CEEA32A
SHA256:3E1304AFDCD900748F62D15F93005E65457B9466454E322D065852603C510AC8
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_lzma.pydexecutable
MD5:F91A9F1F2EFEE2F5DBAE42EA5D5D7153
SHA256:1F82BB06C79B6B392C92CAD87FFA736377FA25CD6D10DA8D61441D42C0D0101E
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\tcl86t.dllexecutable
MD5:30195AA599DD12AC2567DE0815ADE5E6
SHA256:E79443E9413BA9A4442CA7DB8EE91A920E61AC2FB55BE10A6AB9A9C81F646DBB
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_socket.pydexecutable
MD5:B3AF79BBFD7D5C5285660819792A3A9C
SHA256:EB6132B253C40D7C3E00B2BBB392A1573075F8BBC0B2D59E2B077D2CFE8B028C
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\main.exeexecutable
MD5:2F9B0842571CF58282A4F154DF6E9029
SHA256:792E103F1A9F5C2A125C161364EEEA965AF5C5AC8462F924BCFF45643CCDDA0C
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_ssl.pydexecutable
MD5:2825BAE93CD459D835B74892C9BD80DB
SHA256:AF4379FDC8BD41F7A8A4B509DE949202CCDB5E4825797D7A5DDDD5E77671382C
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_bz2.pydexecutable
MD5:1C52BA084A3723940C0778AB5186893A
SHA256:CB008E0A6C65DDB5F20AB96E65285DEE874468DF203FAEAFCA5E9B4A9F2918DC
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\libcrypto-1_1.dllexecutable
MD5:AAD424A6A0AE6D6E7D4C50A1D96A17FC
SHA256:3A2DBA6098E77E36A9D20C647349A478CB0149020F909665D209F548DFA71377
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\python3.dllexecutable
MD5:167EBEFCF1A2CB0CE7F4118FE826F58B
SHA256:112C98099E5E6156A8844C6C39B2136F3146E1F2221C37B9064AB7AF6FDFABB7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.174:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7936
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7936
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4024
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.174:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.48.23.174
  • 23.48.23.173
  • 23.48.23.176
  • 23.48.23.185
  • 23.48.23.190
  • 23.48.23.177
  • 23.48.23.181
  • 23.48.23.180
  • 23.48.23.188
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.20
  • 20.190.160.130
  • 20.190.160.65
  • 20.190.160.132
  • 20.190.160.66
  • 40.126.32.76
  • 20.190.160.17
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info