File name:

iMesh_setup.exe

Full analysis: https://app.any.run/tasks/fd1a6b1d-d189-4cfe-94c2-39f212f57f7d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 11, 2025, 06:10:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

918EE135AB0D302D282F54D3E0320549

SHA1:

490A2A3011762E7B6548F89DA96240B054438850

SHA256:

7111DBB07C431AB7E3F65E18FD00CC9FCC4897C6E23E56B88C55C1719E112904

SSDEEP:

98304:RxL5qjskQM8ljBgf0JZ3KS43P0k0g+23+Uv3R/7TqVnqSI+VLlvCObjWsoC9KV5J:WKK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • iMesh_setup.exe (PID: 616)
      • iMesh_setup.exe (PID: 3304)
    • Actions looks like stealing of personal data

      • iMesh_V11_en_Setup.exe (PID: 6004)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • iMesh_setup.exe (PID: 616)
    • The process creates files with name similar to system file names

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Executable content was dropped or overwritten

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
  • INFO

    • The sample compiled with english language support

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Checks supported languages

      • iMesh_setup.exe (PID: 616)
      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Reads the computer name

      • iMesh_V11_en_Setup.exe (PID: 6004)
      • iMesh_setup.exe (PID: 616)
    • Create files in a temporary directory

      • iMesh_V11_en_Setup.exe (PID: 6004)
      • iMesh_setup.exe (PID: 616)
    • Compiled with Borland Delphi (YARA)

      • iMesh_V11_en_Setup.exe (PID: 6004)
    • Reads CPU info

      • iMesh_V11_en_Setup.exe (PID: 6004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:04:15 20:43:49+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 98816
InitializedDataSize: 185856
UninitializedDataSize: -
EntryPoint: 0x12a70
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.0.950.47630
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: This installation was built with InstallAware: http://www.installaware.com
CompanyName: iMesh Inc.
FileDescription: iMesh
FileVersion: 11.0.0.127583
LegalCopyright: Copyright (c) 2012
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start imesh_setup.exe imesh_v11_en_setup.exe sppextcomobj.exe no specs slui.exe no specs imesh_setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe
explorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2284C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3304"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exeexplorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
MEDIUM
Description:
iMesh
Exit code:
3221226540
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6004.\iMesh_V11_en_Setup.exe /m="C:\Users\admin\AppData\Local\Temp\IMESH_~1.EXE" /k=""C:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.exe
iMesh_setup.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\miabce9.tmp\imesh_v11_en_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6184"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
354
Read events
349
Write events
2
Delete events
3

Modification events

(PID) Process:(616) iMesh_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_setup.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_V11_en_Setup.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(6004) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:iMeshInstall
Value:
Executable files
15
Suspicious files
11
Text files
47
Unknown types
0

Dropped files

PID
Process
Filename
Type
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.res
MD5:
SHA256:
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.msiexecutable
MD5:339C101C2F19CF6D97F838D847878FA4
SHA256:ECD0910B72580898797A4ACAE73B52FDBDDDE50E6CCC53A6A6D8870306D28478
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\OFFLINE\mIDEFunc.dll\mEXEFunc.dllexecutable
MD5:F184BE47FF281B17D8AC5C702F4CA896
SHA256:D2446D97172A0199DDC532D901B1A814B2B55F3B243998D2725754610B975312
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\OFFLINE\mMSI.dll\mMSIExec.dllexecutable
MD5:5D8F3068EED59622FCBB6154A4E79300
SHA256:CFEE120644EC5CD44552CB218AB8BF53E01EE074EA6F3CF15718FABDBBC6DD3F
616iMesh_setup.exeC:\Users\admin\AppData\Local\Temp\miaBCE9.tmp\iMesh_V11_en_Setup.exeexecutable
MD5:DAC0E4A831A21A9DD3A4241FC888D635
SHA256:7638DE78D69AE57DCDE3ECC5F6F04763977A19EC4E3C84F88419F5030AA89B50
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\lang.loctext
MD5:92E9EF9EEE03426DBDAB6CC57D8EA5FD
SHA256:144E84DE063A4114B350E41B09B96A7E25967E7A7AEC6B2B38EE3C12F7E3A1BF
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\index3.htmhtml
MD5:8A261C200557CE855272767A0FF24325
SHA256:600FD1C8D40D3C16882D1FD43B7D6280EBEEDE71724EA5F952661497D02AD200
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\Finalizing.dfmbinary
MD5:4F7CE87A30AE43FD0CB9C793D50324AA
SHA256:4774876B4387E3305A05DBD3875707EF4FEC0F1AF60DE4D8C610867E4DCAFBB8
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\finish.dfm.miaftext
MD5:288D5514F2BF2C1CDDD3FF7DB7AA3EA7
SHA256:38EF4C46DDD969CB607C437FEDBDE6212A00FF99BE885641FF9D4158DAE9BBBC
6004iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\index5.htmhtml
MD5:326A7F619454B9473CF12A79F625B2F1
SHA256:FF5F8528FCD4A1900088E9C93C5DB22A97DE2B8424DDF95A23B5EEEC705A671A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4120
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.23
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.130
  • 40.126.32.136
  • 20.190.160.128
  • 40.126.32.134
  • 20.190.160.64
  • 20.190.160.66
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info