File name:

Tordex-Nuker-main.zip

Full analysis: https://app.any.run/tasks/a1e59f79-de9b-472d-b380-100db21d1dfc
Verdict: Malicious activity
Analysis date: May 13, 2025, 18:59:08
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

99B46361CBBBA1BB64255D83A3C95678

SHA1:

9923D251376EE8588D3B8CC4DE3613C88ECB733F

SHA256:

7FA79438D61C6B02A8E1FCBA8E3EE55685B0541CB76DE0685786094B19BF38A8

SSDEEP:

98304:Go8jrJQQkZUqq0K3QPFQVX98mmIG8CmcWUaAmitYl1PGm9WmLwPyoNr6261hwNRP:2WoG3w97zrSpuQae2y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • The process drops C-runtime libraries

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Executable content was dropped or overwritten

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Process drops python dynamic module

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Application launched itself

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Loads Python modules

      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6576)
  • INFO

    • Reads the computer name

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6080)
      • Tordex_Nuker.exe (PID: 6576)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6808)
    • Checks supported languages

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6080)
      • Tordex_Nuker.exe (PID: 6576)
    • The sample compiled with english language support

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Manual execution by a user

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Create files in a temporary directory

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:30 10:22:32
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Tordex-Nuker-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
10
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs tordex_nuker.exe conhost.exe no specs tordex_nuker.exe no specs tordex_nuker.exe conhost.exe no specs tordex_nuker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1056"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exeTordex_Nuker.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
Modules
Images
c:\users\admin\desktop\tordex-nuker-main\tordex_nuker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1672C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTordex_Nuker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4244"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5428"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
Modules
Images
c:\users\admin\desktop\tordex-nuker-main\tordex_nuker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5528C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5964\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTordex_Nuker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
6080"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
6576"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exeTordex_Nuker.exe
User:
admin
Integrity Level:
MEDIUM
6808"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
8 620
Read events
8 585
Write events
22
Delete events
13

Modification events

(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
70
Suspicious files
2
Text files
40
Unknown types
0

Dropped files

PID
Process
Filename
Type
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main\Tordex-Nuker-main\README.mdtext
MD5:D462246DCE4ABF2A79B64B6B9B497542
SHA256:732C67F66FDA5E4E14BCE9DBF715AB3AA2AC75548C3A2E876A1E330870957A0B
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.8088\Tordex-Nuker-main\Tordex_Nuker.exeexecutable
MD5:466E85D7350F6A38C130D931DC0115A6
SHA256:A2FBEDB0072F786A99B3A5472A6803A28F143E6816EC99B69030E791A3EFF061
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.8088\Tordex-Nuker-main\README.mdtext
MD5:D462246DCE4ABF2A79B64B6B9B497542
SHA256:732C67F66FDA5E4E14BCE9DBF715AB3AA2AC75548C3A2E876A1E330870957A0B
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main\Tordex-Nuker-main\Tordex_Nuker.exeexecutable
MD5:466E85D7350F6A38C130D931DC0115A6
SHA256:A2FBEDB0072F786A99B3A5472A6803A28F143E6816EC99B69030E791A3EFF061
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_overlapped.pydexecutable
MD5:4DF3728D404E0B1607A80B32C6C93BCC
SHA256:C8A0E2C0D7F82CEDB839D2C0B827CF139113FAA4ABA05F2345C80E2CF3335B8A
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_queue.pydexecutable
MD5:955B197C38EA5BD537CE9C7CB2109802
SHA256:73CADE82EE139459FE5841E5631274FC9CAF7F579418B613F278125435653539
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_lzma.pydexecutable
MD5:66A9028EFD1BB12047DAFCE391FD6198
SHA256:E44DEA262A24DF69FD9B50B08D09AE6F8B051137CE0834640C977091A6F9FCA8
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_socket.pydexecutable
MD5:ABF998769F3CBA685E90FA06E0EC8326
SHA256:62D0493CED6CA33E2FD8141649DD9889C23B2E9AFC5FDF56EDB4F888C88FB823
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_uuid.pydexecutable
MD5:B5F2D9353F758E1A60E67DAC33DEBDD2
SHA256:CDE836EF0BDE1C15C1C3750DE54B50D2285864C512ABBFC9E2C94F0FF5AA5CA2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
664
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
664
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.23
  • 40.126.31.131
  • 20.190.159.75
  • 40.126.31.2
  • 40.126.31.3
  • 40.126.31.69
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info