File name:

random.exe

Full analysis: https://app.any.run/tasks/e86c13f6-8581-413d-9c13-fe5111a77617
Verdict: Malicious activity
Threats:

GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools

Analysis date: February 15, 2025, 16:26:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
crypto-regex
themida
golang
gcleaner
loader
auto
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
MD5:

FEE7300CD6DE9CE505A0F7FCAC4DC9AA

SHA1:

3EE2596E67218C66CE05075C991F6083776E1983

SHA256:

7D020D703679B4F2654E61F3F5A636370735B7C669553CF3F03FEA60B29C9031

SSDEEP:

98304:RxV70D+HZQkUaNzrunDOHUguSWV3xJ7ONglc1GF1lMttwZiGELArhRWyUC3o48VE:Me0Ps

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GCLEANER has been detected (SURICATA)

      • BitLockerToGo.exe (PID: 5432)
    • GENERIC has been found (auto)

      • BitLockerToGo.exe (PID: 5432)
  • SUSPICIOUS

    • Reads the BIOS version

      • random.exe (PID: 6728)
    • Found regular expressions for crypto-addresses (YARA)

      • random.exe (PID: 6728)
    • There is functionality for communication over UDP network (YARA)

      • random.exe (PID: 6728)
    • Reads security settings of Internet Explorer

      • BitLockerToGo.exe (PID: 5432)
    • Connects to the server without a host name

      • BitLockerToGo.exe (PID: 5432)
    • Executable content was dropped or overwritten

      • BitLockerToGo.exe (PID: 5432)
    • Potential Corporate Privacy Violation

      • BitLockerToGo.exe (PID: 5432)
  • INFO

    • Checks supported languages

      • random.exe (PID: 6728)
      • BitLockerToGo.exe (PID: 5432)
    • Application based on Golang

      • random.exe (PID: 6728)
    • Detects GO elliptic curve encryption (YARA)

      • random.exe (PID: 6728)
    • Themida protector has been detected

      • random.exe (PID: 6728)
    • Checks proxy server information

      • BitLockerToGo.exe (PID: 5432)
    • Reads the computer name

      • BitLockerToGo.exe (PID: 5432)
    • Reads the machine GUID from the registry

      • BitLockerToGo.exe (PID: 5432)
    • Creates files or folders in the user directory

      • BitLockerToGo.exe (PID: 5432)
    • Create files in a temporary directory

      • BitLockerToGo.exe (PID: 5432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit, No debug
PEType: PE32
LinkerVersion: 3
CodeSize: 2713600
InitializedDataSize: 3173888
UninitializedDataSize: -
EntryPoint: 0xad1000
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start random.exe #GCLEANER bitlockertogo.exe

Process information

PID
CMD
Path
Indicators
Parent process
5432"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
random.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BitLocker To Go Reader
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\bitlockerdiscoveryvolumecontents\bitlockertogo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6728"C:\Users\admin\AppData\Local\Temp\random.exe" C:\Users\admin\AppData\Local\Temp\random.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
666
Modules
Images
c:\users\admin\appdata\local\temp\random.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
678
Read events
675
Write events
3
Delete events
0

Modification events

(PID) Process:(5432) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5432) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5432) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
4
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\service[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\dll[1]executable
MD5:2ECB51AB00C5F340380ECF849291DBCF
SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\service[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\info[1].htmtext
MD5:FE9B08252F126DDFCB87FB82F9CC7677
SHA256:E63E7EBE4C2DB7E61FFC71AF0675E870BCDE0A9D8916E5B3BE0CB252478030BF
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\fuckingdllENCR[1].dllbinary
MD5:4BC1EF6688690AF3DD8D3D70906A9F98
SHA256:7703A6B77C0B0935F5900A2D846CFA3AB59B46D03A1A0844F6BCB5CF9496B2FE
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Temp\Fedd0FRBedACGFe0e2vYNFRt41dVZ\Bunifu_UI_v1.5.3.dllexecutable
MD5:2ECB51AB00C5F340380ECF849291DBCF
SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
5432BitLockerToGo.exeC:\Users\admin\Desktop\YCL.lnkbinary
MD5:F859A5B5097B584B2445B8778AEED6CA
SHA256:35C3BF16C67C5E0FB499F3C9035CD7AD5C3AF43A3897135205E2A88407B42B84
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\soft[1]executable
MD5:F49D1AAAE28B92052E997480C504AA3B
SHA256:36D96DD4C16B132358F28EFCD5C24B088AC181424B5C443777BFD27995C13BD0
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Temp\Fedd0FRBedACGFe0e2vYNFRt41dVZ\Y-Cleaner.exeexecutable
MD5:F49D1AAAE28B92052E997480C504AA3B
SHA256:36D96DD4C16B132358F28EFCD5C24B088AC181424B5C443777BFD27995C13BD0
5432BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\success[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
32
DNS requests
19
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/success?substr=mixfour&s=three&sub=non
unknown
malicious
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
malicious
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/update
unknown
malicious
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/info
unknown
malicious
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
malicious
5432
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
436
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
184.86.251.18:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
1176
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
www.bing.com
  • 184.86.251.18
  • 184.86.251.16
  • 184.86.251.23
  • 184.86.251.19
  • 184.86.251.25
  • 184.86.251.20
  • 184.86.251.17
  • 184.86.251.22
  • 184.86.251.24
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 23.54.109.203
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
google.com
  • 142.250.74.206
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.68
  • 40.126.31.0
  • 40.126.31.129
  • 40.126.31.2
  • 20.190.159.23
  • 20.190.159.131
  • 20.190.159.0
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted

Threats

PID
Process
Class
Message
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
5432
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
Process
Message
random.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------