File name:

Ready Or Not Trainer Setup (1).exe

Full analysis: https://app.any.run/tasks/6ab29c36-e23c-449f-b11e-874fdd163690
Verdict: Malicious activity
Analysis date: July 25, 2024, 14:59:20
OS: Windows 10 Professional (build: 19045, 64 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

EBA75894A9D05AF16B6FB999660D76E8

SHA1:

092C75D7BA24F2B5AF90AC501F656CEF5F0A66CF

SHA256:

722EE5BC13876B3912731898A3BC08E941E5EDC6FBACDC4BFDDE0249223170DA

SSDEEP:

1536:Q668Dtf9nk7RBog5KG6JkOiVPL+09ME5LBtJD64uQgCYO6+YFyHA7OqCkNRBog5m:w8DvE57miVj+J6pHdHg7OA57N/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Scans artifacts that could help determine the target

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads Microsoft Outlook installation path

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads Internet Explorer settings

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Checks Windows Trust Settings

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
  • INFO

    • Checks supported languages

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Create files in a temporary directory

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Disables trace logs

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads Environment values

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Checks proxy server information

      • slui.exe (PID: 1620)
      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads the software policy settings

      • slui.exe (PID: 1620)
      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads the machine GUID from the registry

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Reads the computer name

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Creates files or folders in the user directory

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
    • Process checks Internet Explorer phishing filters

      • Ready Or Not Trainer Setup (1).exe (PID: 324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2076:12:06 19:29:50+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 105984
InitializedDataSize: 28160
UninitializedDataSize: -
EntryPoint: 0x1bcfe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.0.0.0
ProductVersionNumber: 8.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: WeMod Setup
CompanyName: WeMod LLC
FileDescription: WeMod Setup
FileVersion: 8.0.0.0
InternalName: WeMod-Setup.exe
LegalCopyright: Copyright © WeMod LLC 2022
LegalTrademarks: -
OriginalFileName: WeMod-Setup.exe
ProductName: WeMod
ProductVersion: 8.0.0.0
AssemblyVersion: 8.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ready or not trainer setup (1).exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
324"C:\Users\admin\AppData\Local\Temp\Ready Or Not Trainer Setup (1).exe" C:\Users\admin\AppData\Local\Temp\Ready Or Not Trainer Setup (1).exe
explorer.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod Setup
Version:
8.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ready or not trainer setup (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1620C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 060
Read events
3 033
Write events
27
Delete events
0

Modification events

(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:NumberOfSubdomains
Value:
1
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:Total
Value:
35
(PID) Process:(324) Ready Or Not Trainer Setup (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Ready Or Not Trainer Setup (1)_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
0
Suspicious files
20
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:421FCCCC73348578131514F7026398B3
SHA256:2C0E42F7A923CAD8A8FA2B8F3D474D99BCE75BC6A42E3197A111976ACFDC2F9F
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:3EAD0FCC4CBC44B42C811198954D88A6
SHA256:5DCBF648DC33FFB62694B67E571E3E0B64E444122FBE8BD24ABEC241E399C9E0
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\UZ3R3TV1\api.wemod[1].xmltext
MD5:C1DDEA3EF6BBEF3E7060A1A9AD89E4C5
SHA256:B71E4D17274636B97179BA2D97C742735B6510EB54F22893D3A2DAFF2CEB28DB
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:DD56968AE38EC759ACB0AA2A3B970F60
SHA256:A69A7BC4D4548E01678591E86F5E73B6A85AED8C9B438BC1E5704BEB0E085966
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_CD726B3E63F3B047EB7AD9C60415612Dbinary
MD5:AB9B34391692F22FC6DFE5A4A5A5A011
SHA256:DA4C824A2B3E3B2C15A94A5224160C75EDA5C009DBA34DAC6A65CCA012A10F3C
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:1FA0EC1AA09E32F3B6A3D96F66590AE9
SHA256:D2F1842746A24FD68D3F2E1F7E31BC997036815948ECEF2E77696D128051ACA3
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\setup[1].htmhtml
MD5:048531E92BD84A1078EF3F78E60FEE1A
SHA256:F3FCC5025883366683BF944D3E991E040EA498FA301D3BDC658A89E78A5CE4CF
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:8CC5CE6B47CDF5456053DF44FF903A7C
SHA256:27CA7F55FE9826335402C37E3DE95653682769D48930B672ED6387794729BAC3
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:8D1040B12A663CA4EC7277CFC1CE44F0
SHA256:3086094D4198A5BBD12938B0D2D5F696C4DFC77E1EAE820ADDED346A59AA8727
324Ready Or Not Trainer Setup (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_CD726B3E63F3B047EB7AD9C60415612Dbinary
MD5:3C51BD118A7EDC28457B8082E2654543
SHA256:1FEF6E8EA10E57D1D9FD84511DF3D773CA5EE15809D069D2204A0966829355A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
63
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
324
Ready Or Not Trainer Setup (1).exe
GET
200
216.58.206.35:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
324
Ready Or Not Trainer Setup (1).exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
whitelisted
324
Ready Or Not Trainer Setup (1).exe
GET
200
216.58.206.35:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDklZiQejFICwmJPZAmIEq2
unknown
whitelisted
324
Ready Or Not Trainer Setup (1).exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR64T7ooMQqLLQoy%2BemBUYZQOKh6QQUkK9qOpRaC9iQ6hJWc99DtDoo2ucCEGO2IkqWfxOGk0NWE9vukyQ%3D
unknown
whitelisted
5272
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
324
Ready Or Not Trainer Setup (1).exe
GET
200
216.58.206.35:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6624
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5756
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
324
Ready Or Not Trainer Setup (1).exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCECsuburZdTZsFIpu26N8jAc%3D
unknown
whitelisted
5272
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3108
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6012
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4404
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
4204
svchost.exe
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
324
Ready Or Not Trainer Setup (1).exe
104.22.42.75:443
api.wemod.com
CLOUDFLARENET
unknown
324
Ready Or Not Trainer Setup (1).exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
324
Ready Or Not Trainer Setup (1).exe
54.214.74.177:443
api2.amplitude.com
AMAZON-02
US
unknown
324
Ready Or Not Trainer Setup (1).exe
142.250.184.238:443
www.google-analytics.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.174
whitelisted
api.wemod.com
  • 104.22.42.75
  • 104.22.43.75
  • 172.67.25.118
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.google-analytics.com
  • 142.250.184.238
whitelisted
api2.amplitude.com
  • 54.214.74.177
  • 52.37.43.96
  • 54.203.133.11
  • 52.41.28.210
  • 52.42.200.139
  • 44.224.82.219
  • 54.70.42.204
  • 52.32.56.222
whitelisted
ocsp.pki.goog
  • 216.58.206.35
whitelisted
c.pki.goog
  • 216.58.206.35
whitelisted
o.pki.goog
  • 216.58.206.35
whitelisted
ocsp.comodoca.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted

Threats

No threats detected
No debug info