File name:

2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos

Full analysis: https://app.any.run/tasks/4662b789-5df4-4ad8-bafd-9e719ccc633f
Verdict: Malicious activity
Analysis date: May 19, 2025, 08:50:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
scan
smbscan
yero
worm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

471CDB57B056D2F2FDF02BE12669879F

SHA1:

1A64CB3EE125D580D6DD36C738E7C17FE94C16EC

SHA256:

6FF303EF7612119A1573DF34D10777681B2BD4BA9459B4DB5B16E63BF5E41D05

SSDEEP:

98304:yR6RLPFyqkIpmK77v+xIPk5eq4y/Bu+iyQIVru7mRaHDL9gGfOhcRVCq3Q9iuZQu:CelYggODILOs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • YERO mutex has been found

      • tmp1102625.exe (PID: 5728)
    • YERO has been detected

      • 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe (PID: 1324)
      • tmp1102625.exe (PID: 5728)
    • Attempting to scan the network

      • tmp1102625.exe (PID: 5728)
    • SMBSCAN has been detected (SURICATA)

      • tmp1102625.exe (PID: 5728)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe (PID: 1324)
      • tmp1102625.exe (PID: 5728)
    • Reads security settings of Internet Explorer

      • tmp1102625.exe (PID: 5728)
    • Executes application which crashes

      • tmp1102625.exe (PID: 5728)
    • Potential Corporate Privacy Violation

      • tmp1102625.exe (PID: 5728)
  • INFO

    • Create files in a temporary directory

      • 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe (PID: 1324)
    • Checks supported languages

      • 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe (PID: 1324)
      • tmp1102625.exe (PID: 5728)
      • tmp1102890.exe (PID: 1180)
    • Creates files or folders in the user directory

      • tmp1102625.exe (PID: 5728)
      • WerFault.exe (PID: 7216)
    • The sample compiled with english language support

      • 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe (PID: 1324)
    • Reads the computer name

      • tmp1102625.exe (PID: 5728)
    • Checks proxy server information

      • tmp1102625.exe (PID: 5728)
      • slui.exe (PID: 7636)
    • Reads the software policy settings

      • slui.exe (PID: 7636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (38.2)
.exe | Win32 EXE Yoda's Crypter (37.5)
.dll | Win32 Dynamic Link Library (generic) (9.2)
.exe | Win32 Executable (generic) (6.3)
.exe | Win16/32 Executable Delphi generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 12288
InitializedDataSize: 4096
UninitializedDataSize: 106496
EntryPoint: 0x1cee0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #YERO 2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe #SMBSCAN tmp1102625.exe tmp1102890.exe no specs werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1180C:\Users\admin\AppData\Local\Temp\tmp1102890.exeC:\Users\admin\AppData\Local\Temp\tmp1102890.exe2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
103.0.5060.114
Modules
Images
c:\users\admin\appdata\local\temp\tmp1102890.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
1324"C:\Users\admin\Desktop\2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe" C:\Users\admin\Desktop\2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5728C:\Users\admin\AppData\Local\Temp\tmp1102625.exeC:\Users\admin\AppData\Local\Temp\tmp1102625.exe
2025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
216
Modules
Images
c:\users\admin\appdata\local\temp\tmp1102625.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7216C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5728 -s 1240C:\Windows\SysWOW64\WerFault.exetmp1102625.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7636C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
5 444
Read events
5 444
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
13242025-05-19_471cdb57b056d2f2fdf02be12669879f_black-basta_elex_gcleaner_hijackloader_remcos.exeC:\Users\admin\AppData\Local\Temp\tmp1103000.exe
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe-
MD5:
SHA256:
7216WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tmp1102625.exe_8ddbeb826a6148d1376db088b95ad97a29d9f29e_b53fd918_f823d154-790b-4122-bbcb-86964dd4c59e\Report.wer
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe-
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe-
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe-
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe-
MD5:
SHA256:
5728tmp1102625.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\SingleClientServicesUpdater.exe-
MD5:
SHA256:
7216WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\tmp1102625.exe.5728.dmpbinary
MD5:4C0D2E3C62DC68C813463F902F0BF6DD
SHA256:E64F48FE30F43F8348BE54A13FD5DAAA76D693A99A54A9084A5DE21F7E33F871
7216WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDB4E.tmp.dmpbinary
MD5:77386CBE8FF6F5326A5AD3ED7305AA41
SHA256:115FE850E0CCE01AF0A559FA1657A182F55B9B06E878C3E9AFA9D7B36DD1F198
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
139
DNS requests
13
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7452
SIHClient.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
7452
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5728
tmp1102625.exe
139.70.56.42:139
WM
US
unknown
5728
tmp1102625.exe
98.129.4.28:139
RMH-14
US
unknown
5728
tmp1102625.exe
17.74.130.211:139
APPLE-ENGINEERING
GB
unknown
5728
tmp1102625.exe
184.190.219.114:139
ASN-CXA-ALL-CCI-22773-RDC
US
unknown
5728
tmp1102625.exe
38.3.160.96:139
COGENT-174
US
unknown
5728
tmp1102625.exe
109.114.94.86:139
Vodafone Italia S.p.A.
IT
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
uk.undernet.org
unknown
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

PID
Process
Class
Message
5728
tmp1102625.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
No debug info