File name:

5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe

Full analysis: https://app.any.run/tasks/192da4fd-4117-436b-a5e2-881fc52ce673
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 15, 2025, 18:24:44
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
trox
stealer
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 10 sections
MD5:

39683EC6F79958BBDEA8CBFC405CB5BD

SHA1:

F277E72C779020B5E8E9FB66D816EB8B7FAD4D29

SHA256:

5C1762991B72ED564D5F728D256ECBB4472F9E12D6F82C4F31AAD5FC1CE99CDD

SSDEEP:

98304:egKBJF5myzrJJokGOnWZGMkCGN3EFyRUZD/wQySa5CJgV1E1Frv1/x4wqsSN28GT:yAw+aQ2SqMMqDDiQ+0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROX has been detected

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Process drops legitimate windows executable

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Executable content was dropped or overwritten

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Process drops python dynamic module

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Loads Python modules

      • main.exe (PID: 8076)
  • INFO

    • Checks supported languages

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
      • main.exe (PID: 8076)
    • The sample compiled with english language support

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Create files in a temporary directory

      • 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe (PID: 7512)
    • Reads the machine GUID from the registry

      • main.exe (PID: 8076)
    • Reads the computer name

      • main.exe (PID: 8076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:09 09:08:43+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.43
CodeSize: 86016
InitializedDataSize: 7391232
UninitializedDataSize: 150528
EntryPoint: 0x10ba
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.2.1.0
ProductVersionNumber: 0.2.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
ProductName: mablo
ProductVersion: 0.2.1.0
FileVersion: 0.2.1.0
OriginalFileName: main.exe
InternalName: main
FileDescription: main.exe
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROX 5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe main.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7512"C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe" C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
main.exe
Version:
0.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8076C:\Users\admin\AppData\Local\Temp\5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\main.exe5c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
main.exe
Version:
0.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_7512_133918070910437294\main.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8160C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
294
Read events
294
Write events
0
Delete events
0

Modification events

No data
Executable files
22
Suspicious files
2
Text files
916
Unknown types
0

Dropped files

PID
Process
Filename
Type
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\libcrypto-1_1.dllexecutable
MD5:AAD424A6A0AE6D6E7D4C50A1D96A17FC
SHA256:3A2DBA6098E77E36A9D20C647349A478CB0149020F909665D209F548DFA71377
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_bz2.pydexecutable
MD5:1C52BA084A3723940C0778AB5186893A
SHA256:CB008E0A6C65DDB5F20AB96E65285DEE874468DF203FAEAFCA5E9B4A9F2918DC
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_socket.pydexecutable
MD5:B3AF79BBFD7D5C5285660819792A3A9C
SHA256:EB6132B253C40D7C3E00B2BBB392A1573075F8BBC0B2D59E2B077D2CFE8B028C
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_hashlib.pydexecutable
MD5:4F51ED287BBAE386090A9BCC3531B2B8
SHA256:5B6DA4B43C258B459159C4FBC7AD3521B387C377C058FE77AD74BA000606D72E
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\libssl-1_1.dllexecutable
MD5:697766ABA55F44BBD896CBD091A72B55
SHA256:44A228B3646EB3575ABD5CBCB079E018DE11CA6B838A29E4391893DE69E0CF4B
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\python37.dllexecutable
MD5:465089EACED8159EC533E4A37033E227
SHA256:2B29AE140CB9F08AF872ACF9E17F785EF99398EF3367549B55242BC064D6AE40
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_ctypes.pydexecutable
MD5:10861D3FA19D7DC3B41EB6F837340782
SHA256:6255BAB0B7F3E2209A9C8B89A3E1EC1BBC7A29849A18E70C0CF582A63C90BED1
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\main.exeexecutable
MD5:2F9B0842571CF58282A4F154DF6E9029
SHA256:792E103F1A9F5C2A125C161364EEEA965AF5C5AC8462F924BCFF45643CCDDA0C
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\_tkinter.pydexecutable
MD5:D8BEF3883F3E58C6257C43B059F652B0
SHA256:80BFB1A85F5DE28B084DEC0A6FF3B89C90FE68979E863ED0C52397C77B6E6A20
75125c1762991b72ed564d5f728d256ecbb4472f9e12d6f82c4f31aad5fc1ce99cdd.exeC:\Users\admin\AppData\Local\Temp\onefile_7512_133918070910437294\certifi\cacert.pemtext
MD5:234D271ECB91165AAEC148AD6326DD39
SHA256:C55B21F907F7F86D48ADD093552FB5651749FF5F860508CCBB423D6C1FBD80C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.174:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7936
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7936
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4024
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.174:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.48.23.174
  • 23.48.23.173
  • 23.48.23.176
  • 23.48.23.185
  • 23.48.23.190
  • 23.48.23.177
  • 23.48.23.181
  • 23.48.23.180
  • 23.48.23.188
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.20
  • 20.190.160.130
  • 20.190.160.65
  • 20.190.160.132
  • 20.190.160.66
  • 40.126.32.76
  • 20.190.160.17
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info