File name:

Bloxstrap-v2.9.0.exe

Full analysis: https://app.any.run/tasks/048a3947-2142-4924-9cef-adfca7d51160
Verdict: Malicious activity
Analysis date: April 17, 2025, 09:19:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

B154CB83069A96714DF2294023542EB2

SHA1:

3DE11CC38887225430BA88974371B3F4179394AF

SHA256:

7C2A96C7A5B4597C8E4442A0207974B6F14B220A6ED5837F40CBD32C43CA7FA0

SSDEEP:

98304:IIKPw2I1I10000x+pj1ImLaItwi74PZJ4N572NC5HYuM1D3Gd2nnnnnnnnnnnnnT:CRevNunfm2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • $77-System.exe (PID: 5244)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • Reads security settings of Internet Explorer

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • The process creates files with name similar to system file names

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • Executing commands from a ".bat" file

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • Starts CMD.EXE for commands execution

      • Bloxstrap-v2.9.0.exe (PID: 5668)
  • INFO

    • Checks supported languages

      • Bloxstrap-v2.9.0.exe (PID: 6620)
      • Bloxstrap-v2.9.0.exe (PID: 5668)
      • $77-System.exe (PID: 5244)
    • Reads the computer name

      • Bloxstrap-v2.9.0.exe (PID: 6620)
      • Bloxstrap-v2.9.0.exe (PID: 5668)
      • $77-System.exe (PID: 5244)
    • Create files in a temporary directory

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • Process checks computer location settings

      • Bloxstrap-v2.9.0.exe (PID: 5668)
    • Checks proxy server information

      • slui.exe (PID: 2136)
    • Reads the software policy settings

      • slui.exe (PID: 5892)
      • slui.exe (PID: 2136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 5120
InitializedDataSize: 13454336
UninitializedDataSize: -
EntryPoint: 0x20cc
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.9.0.0
ProductVersionNumber: 2.9.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Bloxstrap
FileDescription: Bloxstrap
FileVersion: 2.9.0
InternalName: Bloxstrap.dll
LegalCopyright:
OriginalFileName: Bloxstrap.dll
ProductName: Bloxstrap
ProductVersion: 2.9.0
AssemblyVersion: 2.9.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start bloxstrap-v2.9.0.exe bloxstrap-v2.9.0.exe no specs cmd.exe no specs conhost.exe no specs $77-system.exe no specs sppextcomobj.exe no specs slui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1228C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2136\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2136C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2140C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\UAC.bat" "C:\Windows\SysWOW64\cmd.exeBloxstrap-v2.9.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5244"C:\Users\admin\AppData\Local\Temp\$77-System.exe" C:\Users\admin\AppData\Local\Temp\$77-System.exeBloxstrap-v2.9.0.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
135.0.7049.85
Modules
Images
c:\users\admin\appdata\local\temp\$77-system.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5668"C:\Users\admin\Desktop\Bloxstrap-v2.9.0.exe" C:\Users\admin\Desktop\Bloxstrap-v2.9.0.exe
explorer.exe
User:
admin
Company:
Bloxstrap
Integrity Level:
MEDIUM
Description:
Bloxstrap
Exit code:
0
Version:
2.9.0
Modules
Images
c:\users\admin\desktop\bloxstrap-v2.9.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
5892"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6620"C:\Users\admin\AppData\Local\Temp\Bloxstrap-v2.9.0.exe" C:\Users\admin\AppData\Local\Temp\Bloxstrap-v2.9.0.exeBloxstrap-v2.9.0.exe
User:
admin
Company:
Bloxstrap
Integrity Level:
MEDIUM
Description:
Bloxstrap
Version:
2.9.0
Modules
Images
c:\users\admin\appdata\local\temp\bloxstrap-v2.9.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 901
Read events
1 900
Write events
1
Delete events
0

Modification events

(PID) Process:(5668) Bloxstrap-v2.9.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
2
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5668Bloxstrap-v2.9.0.exeC:\Users\admin\AppData\Local\Temp\Bloxstrap-v2.9.0.exeexecutable
MD5:C6117D3B5020B8FA5E48B6DBF5BEFABB
SHA256:40D3370DCA2B21A3051AD89E387BA12443C0B8DFAC7720DEE64E9F7117D502D7
5668Bloxstrap-v2.9.0.exeC:\Users\admin\AppData\Local\Temp\$77-System.exeexecutable
MD5:FB163D25CB191954C9324D0F2AF6A28A
SHA256:5BABD30DC0A412CF7EB2C961B1111A84387015C82CA3006A2B7CC0CB3D201D4D
5668Bloxstrap-v2.9.0.exeC:\Users\admin\AppData\Local\Temp\UAC.battext
MD5:2A2A26323761CBCE99636678910BC6A4
SHA256:915024EBEDB95C6CB339FD6DFF3F33BB8EC3E9888FDE6D01557CC75B9B4A79CB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
24
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6388
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6388
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.164.40:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.147.7:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 2.16.164.40
  • 2.16.164.32
  • 2.16.164.11
  • 2.16.164.83
  • 2.16.164.74
  • 2.16.164.10
  • 2.16.164.34
  • 2.16.164.75
  • 2.16.164.26
whitelisted
login.live.com
  • 20.190.147.7
  • 20.190.147.0
  • 20.190.147.11
  • 20.190.147.12
  • 20.190.147.6
  • 20.190.177.85
  • 20.190.177.148
  • 20.190.177.20
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info