File name:

613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c

Full analysis: https://app.any.run/tasks/23e08d43-7695-4735-bc22-2ffbaebfba32
Verdict: Malicious activity
Analysis date: April 29, 2025, 09:29:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sfx
dropper
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
MD5:

80E95B38B833BB147FEE23F7A94EA963

SHA1:

68722006A2A1AC942BD12083401440BD51AE82C6

SHA256:

613B31ED6F4C1C534CFE3004FE7741CA3AC080F99D22E1B0AF9D80EB1ADD9E1C

SSDEEP:

98304:apnq5lzPU4Po4QPezk5re6P/zeyzWUm5kYpbWc39dkvRihcOJNJJdy78owTGOLx9:mqm7wDyTLOrkZy9y+uXOdDWJM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SFX dropper has been detected

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
    • Application launched itself

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
    • Drops a system driver (possible attempt to evade defenses)

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
    • Executable content was dropped or overwritten

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
  • INFO

    • Process checks computer location settings

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
    • Reads the computer name

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
    • Checks supported languages

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7392)
      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
    • Creates files in the program directory

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
    • The sample compiled with chinese language support

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
    • The sample compiled with english language support

      • 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe (PID: 7664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:11:12 18:45:34+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 153088
InitializedDataSize: 172032
UninitializedDataSize: -
EntryPoint: 0x1d6d8
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #DROPPER 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe no specs 613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7392"C:\Users\admin\AppData\Local\Temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe" C:\Users\admin\AppData\Local\Temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7664"C:\Users\admin\AppData\Local\Temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe" -el -s2 "-dC:\" "-p" "-sp"C:\Users\admin\AppData\Local\Temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe
613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
8044C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
8084"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
489
Read events
489
Write events
0
Delete events
0

Modification events

No data
Executable files
29
Suspicious files
23
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\装机人员工具\CPUZ\cpuz_readme_cn.txttext
MD5:16CADB8D85C90656688E41E9AA961D96
SHA256:62277602D8AB06622202478D464A7EABAF1DF89012061037E367C92D931DC3A1
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\装机人员工具\Everest\pkey.txttext
MD5:8C965599749F5709B112002B695966D9
SHA256:6A42D1694EDFA37E8EE20E7E25DA6CCD90361F9BB96CBB222B568CB2B43BA366
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\绿色软件\Foxit Reader\FoxitReader_Preferences.initext
MD5:6FD18F8581A1BFE035AAEEC18F8853AE
SHA256:B634F1714C7E46840B0F9F59D024899A7C4229BFC0A4E11CB6C837D872E32AD3
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\装机人员工具\CPUZ\cpuz.initext
MD5:48C023CFC3BF62AD6EA471EBA9289C10
SHA256:147609A66CF4B80B3A74C8D389D373BFDAC91F2439A2EC48388307F3D7D2B169
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\绿色软件\软件卸载工具\myuninst_lng.initext
MD5:897BAC8CFFE4AD5E61729D237DDF2BEE
SHA256:3152D3A908ADD63D5CE60741C8758FB2E8F32E21A7DA3D0180D81417169E090A
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\绿色软件\Foxit Reader\lang_zh_cn.xmlxml
MD5:1AF697825E3C65E96E4920D3EED43F2F
SHA256:83373FCFA1876A3C119B571D801BBE7EBE826956971EFC9367BEF3627010EFFF
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\装机人员工具\第一次清理优化.battext
MD5:EA5CF5815F5DCD10071C2157C04DFBF7
SHA256:88966F9FF4964BA2FC7211B579CF7E849018CFC169EB045B08F76242D9347982
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\绿色软件\Foxit Reader\Foxit Reader.exeexecutable
MD5:533D50C611C2C02721F5A027133B0208
SHA256:2D456500AB6255DD370B2FB1A266D4C0EF0B8E4521891D6348422DEA4AFD702C
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\装机人员工具\GPU-Z.exeexecutable
MD5:A86E66B9433915D39B8496FE3B77926D
SHA256:5886E4FE8E804841BAF2C248E95A61402629BF2124985875297357A0AA54D71E
7664613b31ed6f4c1c534cfe3004fe7741ca3ac080f99d22e1b0af9d80eb1add9e1c.exeC:\Program Files\装机人员工具\DisplayX.exeexecutable
MD5:52978CB9C209F1A8802D6228210B0F6D
SHA256:1F6D012842350E00445FE28BBCE4D1B74DF56A7D14D879825CDA4B610FCF7B86
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7348
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7348
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
4244
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.19
  • 23.216.77.21
  • 23.216.77.18
  • 23.216.77.29
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.128
  • 40.126.32.68
  • 20.190.160.67
  • 40.126.32.72
  • 40.126.32.134
  • 20.190.160.3
  • 20.190.160.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info