File name:

iMesh_setup.exe

Full analysis: https://app.any.run/tasks/fd1a6b1d-d189-4cfe-94c2-39f212f57f7d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 11, 2025, 06:10:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

918EE135AB0D302D282F54D3E0320549

SHA1:

490A2A3011762E7B6548F89DA96240B054438850

SHA256:

7111DBB07C431AB7E3F65E18FD00CC9FCC4897C6E23E56B88C55C1719E112904

SSDEEP:

98304:RxL5qjskQM8ljBgf0JZ3KS43P0k0g+23+Uv3R/7TqVnqSI+VLlvCObjWsoC9KV5J:WKK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • iMesh_setup.exe (PID: 616)
      • iMesh_setup.exe (PID: 3304)
    • Actions looks like stealing of personal data

      • iMesh_V11_en_Setup.exe (PID: 6004)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • The process creates files with name similar to system file names

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Drops 7-zip archiver for unpacking

      • iMesh_setup.exe (PID: 616)
  • INFO

    • The sample compiled with english language support

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Reads the computer name

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Create files in a temporary directory

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Checks supported languages

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Reads CPU info

      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Compiled with Borland Delphi (YARA)

      • iMesh_V11_en_Setup.exe (PID: 6004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:04:15 20:43:49+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 98816
InitializedDataSize: 185856
UninitializedDataSize: -
EntryPoint: 0x12a70
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.0.950.47630
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: This installation was built with InstallAware: http://www.installaware.com
CompanyName: iMesh Inc.
FileDescription: iMesh
FileVersion: 11.0.0.127583
LegalCopyright: Copyright (c) 2012
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start imesh_setup.exe imesh_v11_en_setup.exe sppextcomobj.exe no specs slui.exe no specs imesh_setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe
explorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2284C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3304"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exeexplorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
MEDIUM
Description:
iMesh
Exit code:
3221226540
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6004.\iMesh_V11_en_Setup.exe /m="C:\Users\admin\AppData\Local\Temp\IMESH_~1.EXE" /k=""C:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.exe
iMesh_setup.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\miabce9.tmp\imesh_v11_en_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6184"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
354
Read events
349
Write events
2
Delete events
3

Modification events

(PID) Process:(616) iMesh_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_setup.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_V11_en_Setup.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:iMeshInstall
Value:
Executable files
15
Suspicious files
11
Text files
47
Unknown types
0

Dropped files

PID
Process
Filename
Type
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.res
MD5:
SHA256:
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\OFFLINE\mIDEFunc.dll\mEXEFunc.dllexecutable
MD5:F184BE47FF281B17D8AC5C702F4CA896
SHA256:D2446D97172A0199DDC532D901B1A814B2B55F3B243998D2725754610B975312
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\OFFLINE\mDown.dll\mDownExec.dllexecutable
MD5:B7F0D95E4E97D518496FD9D90A4E0786
SHA256:51512BA85758FB12CFD9A1850C9BEB9151FD41C5997F07F74D174CC4C787C876
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\finish.dfmbinary
MD5:E5A02C6EF209105BF26761F8DF1D1538
SHA256:C8A00B652EB485F1F482486A4357D123E4F94BCFAB8300837963EF76104E0B71
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\mia.libexecutable
MD5:6A9B4E9C5DC1B4E40AF2185667C32BF9
SHA256:AB4267F8077C7012FF7E545A619ED1CA7A0B5E9469AA07B621EABC737DFAA753
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\lang.loctext
MD5:92E9EF9EEE03426DBDAB6CC57D8EA5FD
SHA256:144E84DE063A4114B350E41B09B96A7E25967E7A7AEC6B2B38EE3C12F7E3A1BF
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\icon.icoimage
MD5:576857E3E3FF14A9B99A774597315773
SHA256:22684061AA57A0A475A3373A10621CE4350BC0605B5ACF74B9558A7D4F2EBCBC
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\#BRAND#.mtxtext
MD5:DC025CADE3AC874C3A29D9605ECAD8A3
SHA256:2323742B59141CD831F0A0DAE61BBB01A6334B12620A337F82207D2615E167B7
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia.tmptext
MD5:C1E4A7DAE277FD01B35500DF97A54096
SHA256:050FCBCA8BC73D6E54EB0E456B8194CE027FC503AF4C38228B962EC1E60A3BF6
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\finish.dfm.miaftext
MD5:288D5514F2BF2C1CDDD3FF7DB7AA3EA7
SHA256:38EF4C46DDD969CB607C437FEDBDE6212A00FF99BE885641FF9D4158DAE9BBBC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4120
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.23
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.130
  • 40.126.32.136
  • 20.190.160.128
  • 40.126.32.134
  • 20.190.160.64
  • 20.190.160.66
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info