File name:

SetupLdr.exe

Full analysis: https://app.any.run/tasks/18fc6b47-195b-465f-8c20-f79605c96144
Verdict: Malicious activity
Analysis date: December 22, 2023, 17:55:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

013CD4CEA708005D104B46B4B4E8213E

SHA1:

1663CAC34A035EFDC45C1D4DD2249FEE62FA5D04

SHA256:

8070EAC8A83A1D5691E9C58DDBB6E4771CD95C6F616E805E74C25C5B771D0330

SSDEEP:

98304:6+QQmKfBTe6PmYU4De9b9NEgJujAbWzwi10Wsnfn9fdKryu5a1eay6fTq4XvvPOz:Roft1fVgeKn9axW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 2956)
    • Uses Task Scheduler to run other applications

      • SetupLdr.tmp (PID: 2700)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • SetupLdr.tmp (PID: 2020)
      • SetupLdr.tmp (PID: 2700)
    • Executing commands from ".cmd" file

      • dllhost.exe (PID: 2956)
      • SetupLdr.tmp (PID: 2700)
    • Reads the Internet Settings

      • SetupLdr.tmp (PID: 2020)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 1112)
    • Starts CMD.EXE for commands execution

      • SetupLdr.tmp (PID: 2020)
      • dllhost.exe (PID: 2956)
      • SetupLdr.tmp (PID: 2700)
    • Uses RUNDLL32.EXE to load library

      • rundll32.exe (PID: 2880)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2012)
  • INFO

    • Drops the executable file immediately after the start

      • SetupLdr.exe (PID: 2740)
      • SetupLdr.tmp (PID: 2020)
      • SetupLdr.exe (PID: 2132)
      • SetupLdr.tmp (PID: 2700)
    • Checks supported languages

      • SetupLdr.tmp (PID: 2020)
      • SetupLdr.exe (PID: 2740)
      • SetupLdr.exe (PID: 2132)
      • SetupLdr.tmp (PID: 2700)
    • Create files in a temporary directory

      • SetupLdr.exe (PID: 2740)
      • SetupLdr.exe (PID: 2132)
      • SetupLdr.tmp (PID: 2020)
      • SetupLdr.tmp (PID: 2700)
    • Reads the computer name

      • SetupLdr.tmp (PID: 2020)
      • SetupLdr.tmp (PID: 2700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:05:21 07:56:23+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 57344
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6
ImageVersion: 6
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: ImageView
FileVersion: 1.0.0.1
LegalCopyright:
OriginalFileName:
ProductName: ImageView
ProductVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
14
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start setupldr.exe no specs setupldr.tmp no specs rundll32.exe no specs rundll32.exe no specs CMSTPLUA no specs cmd.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs taskkill.exe no specs setupldr.exe no specs setupldr.tmp no specs schtasks.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
964reg add "hklm\software\policies\microsoft\windows defender\spynet" /v "submitsamplesconsent" /t reg_dword /d 2 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1112"C:\Windows\System32\cmd.exe" /c taskkill /im taskhostsw.exe /fC:\Windows\SysWOW64\cmd.exeSetupLdr.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
128
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1420"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\d.cmd""C:\Windows\SysWOW64\cmd.exeSetupLdr.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1736"schtasks.exe" /create /xml C:\tmp\ar.xml /tn GoogleUpdateTaskMachineUAC /fC:\Windows\SysWOW64\schtasks.exeSetupLdr.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1996taskkill /im taskhostsw.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2000"rundll32.exe" C:\Users\admin\AppData\Local\Temp\is-JEMDL.tmp\drvon.dll,onC:\Windows\System32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2012C:\Windows\system32\cmd.exe /c ""C:\tmp\.cmd" "C:\Windows\System32\cmd.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2020"C:\Users\admin\AppData\Local\Temp\is-PP08G.tmp\SetupLdr.tmp" /SL5="$6012A,6507999,799744,C:\Users\admin\AppData\Local\Temp\SetupLdr.exe" C:\Users\admin\AppData\Local\Temp\is-PP08G.tmp\SetupLdr.tmpSetupLdr.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
1
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-pp08g.tmp\setupldr.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2084reg add "hklm\software\policies\microsoft\windows defender\spynet" /v "spynetreporting" /t reg_dword /d 0 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2132"C:\Users\admin\AppData\Local\Temp\SetupLdr.exe" /verysilent /sp-C:\Users\admin\AppData\Local\Temp\SetupLdr.exeSetupLdr.tmp
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
ImageView
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\setupldr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
1 178
Read events
1 152
Write events
16
Delete events
10

Modification events

(PID) Process:(2956) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2956) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2956) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2956) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(2020) SetupLdr.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
B34E4B1D946DB2DD4CEA759C065C50249ACA884FADF3E65FC2480EFBA0E29454
Executable files
7
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
2740SetupLdr.exeC:\Users\admin\AppData\Local\Temp\is-PP08G.tmp\SetupLdr.tmpexecutable
MD5:26FDE21186F38E8E67D6906AB889812D
SHA256:CF0F237277F224BEE22C2C315BC1ED169D1ACA53CAD8914FAACD14BD3C69C344
2020SetupLdr.tmpC:\tmp\.cmdtext
MD5:3F233C45D5A0AB082536E2F3780F995E
SHA256:3F8A56079FF0DB77870F6BC8FDBFA56AE267DA2B92472148D6576B629B78B11C
2700SetupLdr.tmpC:\Users\admin\AppData\Local\Temp\is-5DNA6.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2020SetupLdr.tmpC:\Users\admin\AppData\Local\Temp\is-JEMDL.tmp\drvon.dllexecutable
MD5:293483FC7446C5222180C81420914D09
SHA256:D7A4F856C1AB9CF7DD3AC6A2C6301912AFB2B488EFE60879E84B454CD119C420
2020SetupLdr.tmpC:\Users\admin\AppData\Local\Temp\is-JEMDL.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2132SetupLdr.exeC:\Users\admin\AppData\Local\Temp\is-VFGHN.tmp\SetupLdr.tmpexecutable
MD5:26FDE21186F38E8E67D6906AB889812D
SHA256:CF0F237277F224BEE22C2C315BC1ED169D1ACA53CAD8914FAACD14BD3C69C344
2700SetupLdr.tmpC:\tmp\is-PFOPD.tmpxml
MD5:5497D6644400E2A4EFBE6FAC192B2EE3
SHA256:CF52B17D4E63F39BF1B24C0861947FF3C74C94401976E7235ED8B3A314CE3083
2700SetupLdr.tmpC:\tmp\ar.xmlxml
MD5:5497D6644400E2A4EFBE6FAC192B2EE3
SHA256:CF52B17D4E63F39BF1B24C0861947FF3C74C94401976E7235ED8B3A314CE3083
2700SetupLdr.tmpC:\Users\admin\AppData\Local\Temp\d.cmdtext
MD5:55302A2E6F91EFB2DD464A71CAD31088
SHA256:74F3983FE45949C1215A7ED41DFCF34A0F83AE04EF2A82D50949C85F2DE4C54B
2700SetupLdr.tmpC:\tmp\taskhostsw.exeexecutable
MD5:27F50C1E155BE52886E26D7D75EE0CB2
SHA256:F75C5B809E07FE2BDCC52FBA4EBED26C82B703ACF60D1B6A725189C496AD4753
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
352
svchost.exe
224.0.0.252:5355
unknown
1220
svchost.exe
239.255.255.250:3702
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info