File name:

sample2.exe

Full analysis: https://app.any.run/tasks/a1f69fc3-ee52-4c92-a155-606f9f4e10a3
Verdict: Malicious activity
Threats:

Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019.

Analysis date: March 18, 2025, 14:25:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
raccoon
stealer
vidar
evasion
ip-check
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

DD1B734796B4AA40AF46B4D69E1E2DA2

SHA1:

1EC7529315ECC251D2D71C2D684DC2ECF3A931B1

SHA256:

837EB41E90A4CE53EEB107E3AD39C7BAA22ADFAE133E0FF2672ECD3A323F7B04

SSDEEP:

49152:6k+hsGgporJg5ZOvQcOhxEVyrLNxHowXaCqGcuZbgo3cbiVgTDavs9t4zB:t+fgpoOOYJXNxHvXGGcuZbgoMbiVu2v7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • VIDAR has been detected (SURICATA)

      • wotsuper1.exe (PID: 2592)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • sample2.exe (PID: 128)
    • Creates a software uninstall entry

      • sample2.exe (PID: 128)
    • Reads the Internet Settings

      • sample2.exe (PID: 128)
      • wotsuper1.exe (PID: 2592)
    • Reads security settings of Internet Explorer

      • sample2.exe (PID: 128)
      • wotsuper1.exe (PID: 2592)
    • Checks for external IP

      • svchost.exe (PID: 1080)
      • wotsuper1.exe (PID: 2592)
    • There is functionality for taking screenshot (YARA)

      • wotsuper1.exe (PID: 2592)
    • There is functionality for capture public ip (YARA)

      • wotsuper1.exe (PID: 2592)
    • Potential Corporate Privacy Violation

      • msedge.exe (PID: 2920)
    • Searches for installed software

      • wotsuper1.exe (PID: 2592)
  • INFO

    • Checks supported languages

      • sample2.exe (PID: 128)
      • wotsuper1.exe (PID: 2592)
    • Reads the computer name

      • sample2.exe (PID: 128)
      • wotsuper1.exe (PID: 2592)
    • The sample compiled with chinese language support

      • sample2.exe (PID: 128)
    • Application launched itself

      • msedge.exe (PID: 1880)
      • msedge.exe (PID: 2656)
      • msedge.exe (PID: 3296)
    • Checks proxy server information

      • wotsuper1.exe (PID: 2592)
    • Reads the machine GUID from the registry

      • wotsuper1.exe (PID: 2592)
    • Manual execution by a user

      • msedge.exe (PID: 3296)
    • Reads product name

      • wotsuper1.exe (PID: 2592)
    • Reads CPU info

      • wotsuper1.exe (PID: 2592)
    • Reads Environment values

      • wotsuper1.exe (PID: 2592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (49.2)
.exe | Win32 Executable Delphi generic (16.2)
.scr | Windows screen saver (14.9)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 148992
InitializedDataSize: 31744
UninitializedDataSize: -
EntryPoint: 0x25468
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.1.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: -
CompanyName: wotsuper
FileDescription: wotsuper 2.1 Installation
FileVersion: 2.1
LegalCopyright: wotsuper
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
27
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start sample2.exe msedge.exe no specs wotsuper.exe #VIDAR wotsuper1.exe regedit.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs svchost.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sample2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Users\admin\AppData\Local\Temp\sample2.exe" C:\Users\admin\AppData\Local\Temp\sample2.exe
explorer.exe
User:
admin
Company:
wotsuper
Integrity Level:
HIGH
Description:
wotsuper 2.1 Installation
Exit code:
0
Version:
2.1
Modules
Images
c:\users\admin\appdata\local\temp\sample2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
580"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=2840 --field-trial-handle=1252,i,7079877349312640908,6061093022994916704,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
604"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3704 --field-trial-handle=1252,i,7079877349312640908,6061093022994916704,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1032"C:\Windows\regedit.exe" \s C:\Windows\wotsuper.regC:\Windows\regedit.exesample2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1224"C:\Users\admin\AppData\Local\Temp\sample2.exe" C:\Users\admin\AppData\Local\Temp\sample2.exeexplorer.exe
User:
admin
Company:
wotsuper
Integrity Level:
MEDIUM
Description:
wotsuper 2.1 Installation
Exit code:
3221226540
Version:
2.1
Modules
Images
c:\users\admin\appdata\local\temp\sample2.exe
c:\windows\system32\ntdll.dll
1748"C:\Program Files\wotsuper\wotsuper\wotsuper.exe" C:\Program Files\wotsuper\wotsuper\wotsuper.exe
sample2.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files\wotsuper\wotsuper\wotsuper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1880"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1Ldta7.htmlC:\Program Files\Microsoft\Edge\Application\msedge.exesample2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2592"C:\Program Files\wotsuper\wotsuper\wotsuper1.exe" C:\Program Files\wotsuper\wotsuper\wotsuper1.exe
sample2.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files\wotsuper\wotsuper\wotsuper1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2656"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1smEq7.htmlC:\Program Files\Microsoft\Edge\Application\msedge.exesample2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
8 577
Read events
8 379
Write events
169
Delete events
29

Modification events

(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:DisplayName
Value:
wotsuper 2.1
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:DisplayVersion
Value:
2.1
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:VersionMajor
Value:
2
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:VersionMinor
Value:
1
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:Publisher
Value:
wotsuper
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:DisplayIcon
Value:
C:\Program Files\wotsuper\wotsuper\Uninstall.exe
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:UninstallString
Value:
C:\Program Files\wotsuper\wotsuper\Uninstall.exe
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:URLInfoAbout
Value:
http://www.wotsuper.com/
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:HelpLink
Value:
wotsuper@company.com
(PID) Process:(128) sample2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1
Operation:writeName:InstallLocation
Value:
C:\Program Files\wotsuper\wotsuper\
Executable files
4
Suspicious files
44
Text files
26
Unknown types
1

Dropped files

PID
Process
Filename
Type
2592wotsuper1.exeC:\ProgramData\7A7MDPOP4N5IGDQFCFGDZH28V\files\passwords.txttext
MD5:E0EE1892004A327AE8878494352A35E6
SHA256:E1B782EB670A6D8ED01FEB9CD9DDEF9AE20569B72A1E33E078906D07627F7850
128sample2.exeC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmpcompressed
MD5:A3E6D0A5A1074040F5AD76A7535F3D76
SHA256:3B25C297F17BD5D2AAC3D3B27C57FD7C749C2D15F43E1A8CF899158138A9A708
1880msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
3216msedge.exe
MD5:
SHA256:
128sample2.exeC:\Program Files\wotsuper\wotsuper\Uninstall.initext
MD5:72029B01C6667D1CB7945CE3C99FCB32
SHA256:60DEFD21A46328A7FF9C16A46B9D1791E85A2E548BBD22582646AA60FE9116C8
128sample2.exeC:\Users\admin\AppData\Local\Temp\$inst\2.tmpcompressed
MD5:8708699D2C73BED30A0A08D80F96D6D7
SHA256:A32E0A83001D2C5D41649063217923DAC167809CAB50EC5784078E41C9EC0F0F
128sample2.exeC:\Windows\wotsuper.regtext
MD5:42F073434559FB6B9C67ABA86DE89D1B
SHA256:03AC69047BCE954FDCE3D00AF881161A073F921D73FF79369E9EE96A109F9EED
3296msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF189ff4.TMP
MD5:
SHA256:
3296msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
25
DNS requests
13
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2592
wotsuper1.exe
POST
200
208.95.112.1:80
http://ip-api.com/line/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
1748
wotsuper.exe
199.59.243.228:443
telete.in
AMAZON-02
US
shared
2592
wotsuper1.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
2920
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3296
msedge.exe
239.255.255.250:1900
whitelisted
2920
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2920
msedge.exe
172.67.74.161:443
iplogger.org
CLOUDFLARENET
US
whitelisted

DNS requests

Domain
IP
Reputation
telete.in
  • 199.59.243.228
shared
manillamemories.com
unknown
ip-api.com
  • 208.95.112.1
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
iplogger.org
  • 172.67.74.161
  • 104.26.3.46
  • 104.26.2.46
whitelisted
www.bing.com
  • 92.123.104.7
  • 92.123.104.65
  • 92.123.104.23
  • 92.123.104.67
  • 92.123.104.47
  • 92.123.104.53
  • 92.123.104.61
  • 92.123.104.59
  • 92.123.104.64
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2592
wotsuper1.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
1080
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2592
wotsuper1.exe
A Network Trojan was detected
ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
2920
msedge.exe
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in DNS Lookup)
2920
msedge.exe
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in DNS Lookup)
2920
msedge.exe
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in TLS SNI)
No debug info