File name:

Tordex-Nuker-main.zip

Full analysis: https://app.any.run/tasks/a1e59f79-de9b-472d-b380-100db21d1dfc
Verdict: Malicious activity
Analysis date: May 13, 2025, 18:59:08
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

99B46361CBBBA1BB64255D83A3C95678

SHA1:

9923D251376EE8588D3B8CC4DE3613C88ECB733F

SHA256:

7FA79438D61C6B02A8E1FCBA8E3EE55685B0541CB76DE0685786094B19BF38A8

SSDEEP:

98304:Go8jrJQQkZUqq0K3QPFQVX98mmIG8CmcWUaAmitYl1PGm9WmLwPyoNr6261hwNRP:2WoG3w97zrSpuQae2y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Loads Python modules

      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6576)
    • Executable content was dropped or overwritten

      • Tordex_Nuker.exe (PID: 6080)
      • Tordex_Nuker.exe (PID: 5428)
    • Process drops legitimate windows executable

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Process drops python dynamic module

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Application launched itself

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
  • INFO

    • Manual execution by a user

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • Checks supported languages

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6080)
      • Tordex_Nuker.exe (PID: 6576)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6808)
    • Reads the computer name

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 1056)
      • Tordex_Nuker.exe (PID: 6080)
      • Tordex_Nuker.exe (PID: 6576)
    • Create files in a temporary directory

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
    • The sample compiled with english language support

      • Tordex_Nuker.exe (PID: 5428)
      • Tordex_Nuker.exe (PID: 6080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:30 10:22:32
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Tordex-Nuker-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
10
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs tordex_nuker.exe conhost.exe no specs tordex_nuker.exe no specs tordex_nuker.exe conhost.exe no specs tordex_nuker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1056"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exeTordex_Nuker.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
Modules
Images
c:\users\admin\desktop\tordex-nuker-main\tordex_nuker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1672C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTordex_Nuker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4244"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5428"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
Modules
Images
c:\users\admin\desktop\tordex-nuker-main\tordex_nuker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5528C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5964\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTordex_Nuker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
6080"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
6576"C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exe" C:\Users\admin\Desktop\Tordex-Nuker-main\Tordex_Nuker.exeTordex_Nuker.exe
User:
admin
Integrity Level:
MEDIUM
6808"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
8 620
Read events
8 585
Write events
22
Delete events
13

Modification events

(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
70
Suspicious files
2
Text files
40
Unknown types
0

Dropped files

PID
Process
Filename
Type
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.8088\Tordex-Nuker-main\README.mdtext
MD5:D462246DCE4ABF2A79B64B6B9B497542
SHA256:732C67F66FDA5E4E14BCE9DBF715AB3AA2AC75548C3A2E876A1E330870957A0B
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.8088\Tordex-Nuker-main\Tordex_Nuker.exeexecutable
MD5:466E85D7350F6A38C130D931DC0115A6
SHA256:A2FBEDB0072F786A99B3A5472A6803A28F143E6816EC99B69030E791A3EFF061
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_bz2.pydexecutable
MD5:C17DCB7FC227601471A641EC90E6237F
SHA256:55894B2B98D01F37B9A8CF4DAF926D0161FF23C2FB31C56F9DBBAC3A61932712
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main\Tordex-Nuker-main\Tordex_Nuker.exeexecutable
MD5:466E85D7350F6A38C130D931DC0115A6
SHA256:A2FBEDB0072F786A99B3A5472A6803A28F143E6816EC99B69030E791A3EFF061
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_asyncio.pydexecutable
MD5:142E957AE9FE9DD8514E1781C9A35C2B
SHA256:4C6D6690E91974804C1EAF77827EA63882711689BAFF0718A246796FF40B2A23
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_hashlib.pydexecutable
MD5:422E214CA76421E794B99F99A374B077
SHA256:78223AEF72777EFC93C739F5308A3FC5DE28B7D10E6975B8947552A62592772B
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_lzma.pydexecutable
MD5:66A9028EFD1BB12047DAFCE391FD6198
SHA256:E44DEA262A24DF69FD9B50B08D09AE6F8B051137CE0834640C977091A6F9FCA8
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_socket.pydexecutable
MD5:ABF998769F3CBA685E90FA06E0EC8326
SHA256:62D0493CED6CA33E2FD8141649DD9889C23B2E9AFC5FDF56EDB4F888C88FB823
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Tordex-Nuker-main\Tordex-Nuker-main\README.mdtext
MD5:D462246DCE4ABF2A79B64B6B9B497542
SHA256:732C67F66FDA5E4E14BCE9DBF715AB3AA2AC75548C3A2E876A1E330870957A0B
5428Tordex_Nuker.exeC:\Users\admin\AppData\Local\Temp\_MEI54282\_queue.pydexecutable
MD5:955B197C38EA5BD537CE9C7CB2109802
SHA256:73CADE82EE139459FE5841E5631274FC9CAF7F579418B613F278125435653539
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
664
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
664
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.23
  • 40.126.31.131
  • 20.190.159.75
  • 40.126.31.2
  • 40.126.31.3
  • 40.126.31.69
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info