analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

cpu-z_2.08-en.exe

Full analysis: https://app.any.run/tasks/ad1a217c-0295-4f88-b3f9-8de63ac8cb08
Verdict: Malicious activity
Analysis date: October 22, 2023, 17:18:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

579AD85EC10C4C5751FE4410F2C96AC6

SHA1:

59ABDFA654EDA10922EF6F37A1B2B7A4F59085CC

SHA256:

9B2C6C1AB49A5FEEBA0ED653E54449EE52E391E949F71939827751D88814C8F3

SSDEEP:

98304:NO9zKBJYrSSqteKLhI60RIOa+Hci+TI5zdCS33fZug51LcMkUrMGMaP8BZTy95vr:uKCyI6S4AL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • cpu-z_2.08-en.exe (PID: 1240)
      • cpu-z_2.08-en.exe (PID: 2900)
      • cpu-z_2.08-en.tmp (PID: 604)
      • cpuz.exe (PID: 2424)
    • Application was dropped or rewritten from another process

      • cpuz.exe (PID: 1588)
      • cpuz.exe (PID: 2424)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • cpu-z_2.08-en.tmp (PID: 604)
    • Start notepad (likely ransomware note)

      • cpu-z_2.08-en.tmp (PID: 2080)
    • Drops a system driver (possible attempt to evade defenses)

      • cpuz.exe (PID: 2424)
    • Reads the Internet Settings

      • cpuz.exe (PID: 2424)
    • Checks Windows Trust Settings

      • cpuz.exe (PID: 2424)
    • Reads security settings of Internet Explorer

      • cpuz.exe (PID: 2424)
    • Reads settings of System Certificates

      • cpuz.exe (PID: 2424)
  • INFO

    • Checks supported languages

      • cpu-z_2.08-en.tmp (PID: 2080)
      • cpu-z_2.08-en.exe (PID: 1240)
      • cpu-z_2.08-en.exe (PID: 2900)
      • cpu-z_2.08-en.tmp (PID: 604)
      • cpuz.exe (PID: 2424)
    • Reads the computer name

      • cpu-z_2.08-en.tmp (PID: 2080)
      • cpu-z_2.08-en.tmp (PID: 604)
      • cpuz.exe (PID: 2424)
    • Create files in a temporary directory

      • cpu-z_2.08-en.exe (PID: 1240)
      • cpu-z_2.08-en.exe (PID: 2900)
      • cpuz.exe (PID: 2424)
    • Application was dropped or rewritten from another process

      • cpu-z_2.08-en.tmp (PID: 604)
      • cpu-z_2.08-en.tmp (PID: 2080)
    • Creates files in the program directory

      • cpu-z_2.08-en.tmp (PID: 604)
    • Manual execution by a user

      • cpuz.exe (PID: 1588)
      • cpuz.exe (PID: 2424)
    • Checks proxy server information

      • cpuz.exe (PID: 2424)
    • Reads the machine GUID from the registry

      • cpuz.exe (PID: 2424)
    • Reads Environment values

      • cpuz.exe (PID: 2424)
    • Creates files or folders in the user directory

      • cpuz.exe (PID: 2424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

ProductVersion: 2.08
ProductName: CPUID CPU-Z
LegalCopyright:
FileVersion:
FileDescription: CPUID CPU-Z Setup
CompanyName: CPUID, Inc.
Comments: This installation was built with Inno Setup.
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 1
EntryPoint: 0xaad0
UninitializedDataSize: -
InitializedDataSize: 17920
CodeSize: 41984
LinkerVersion: 2.25
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
TimeStamp: 1992:06:20 00:22:17+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start cpu-z_2.08-en.exe no specs cpu-z_2.08-en.tmp no specs cpu-z_2.08-en.exe cpu-z_2.08-en.tmp no specs notepad.exe no specs cpuz.exe no specs cpuz.exe

Process information

PID
CMD
Path
Indicators
Parent process
1240"C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exe" C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exeexplorer.exe
User:
admin
Company:
CPUID, Inc.
Integrity Level:
MEDIUM
Description:
CPUID CPU-Z Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\cpu-z_2.08-en.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2080"C:\Users\admin\AppData\Local\Temp\is-VD0FT.tmp\cpu-z_2.08-en.tmp" /SL5="$602F8,1938476,58368,C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exe" C:\Users\admin\AppData\Local\Temp\is-VD0FT.tmp\cpu-z_2.08-en.tmpcpu-z_2.08-en.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-vd0ft.tmp\cpu-z_2.08-en.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\oleaut32.dll
2900"C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exe" /SPAWNWND=$5036C /NOTIFYWND=$602F8 C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exe
cpu-z_2.08-en.tmp
User:
admin
Company:
CPUID, Inc.
Integrity Level:
HIGH
Description:
CPUID CPU-Z Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\cpu-z_2.08-en.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
604"C:\Users\admin\AppData\Local\Temp\is-1AHOG.tmp\cpu-z_2.08-en.tmp" /SL5="$70300,1938476,58368,C:\Users\admin\AppData\Local\Temp\cpu-z_2.08-en.exe" /SPAWNWND=$5036C /NOTIFYWND=$602F8 C:\Users\admin\AppData\Local\Temp\is-1AHOG.tmp\cpu-z_2.08-en.tmpcpu-z_2.08-en.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1ahog.tmp\cpu-z_2.08-en.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3628"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\CPUID\CPU-Z\cpuz_readme.txtC:\Windows\System32\notepad.execpu-z_2.08-en.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1588"C:\Program Files\CPUID\CPU-Z\cpuz.exe" C:\Program Files\CPUID\CPU-Z\cpuz.exeexplorer.exe
User:
admin
Company:
CPUID
Integrity Level:
MEDIUM
Description:
CPU-Z Application
Exit code:
3221226540
Version:
2, 0, 8, 0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\cpuid\cpu-z\cpuz.exe
2424"C:\Program Files\CPUID\CPU-Z\cpuz.exe" C:\Program Files\CPUID\CPU-Z\cpuz.exe
explorer.exe
User:
admin
Company:
CPUID
Integrity Level:
HIGH
Description:
CPU-Z Application
Version:
2, 0, 8, 0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\cpuid\cpu-z\cpuz.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
Total events
6 993
Read events
6 961
Write events
26
Delete events
6

Modification events

(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
A949E432B4731D0CE1C9B67E6285AA35D4F6D4A5EC981D0286CAED5C7E22ACBF
(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Program Files\CPUID\CPU-Z\cpuz.exe
(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
61E4748ED17E1A8DFA5FDE8FEEA42FCB1669018089EBB32B0818E00D56F254ED
(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
5C02000070CF49C10B05DA01
(PID) Process:(604) cpu-z_2.08-en.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) cpuz.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2424) cpuz.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2424) cpuz.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2424) cpuz.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
7
Suspicious files
16
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
1240cpu-z_2.08-en.exeC:\Users\admin\AppData\Local\Temp\is-VD0FT.tmp\cpu-z_2.08-en.tmpexecutable
MD5:77B6D18B219D145C73F779D0D82F6BD0
SHA256:AAB8B17924B8F250D1CA477FA705D342BF620FF5864EBBC0B5E5D177C43A1743
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\is-563EP.tmpexecutable
MD5:AED8A6FC0E79C6EE1F073BAAFF2F5FBE
SHA256:E3FD159588488CC9D36B5EFD1904AAFC420397E3D2857EF12CAA3EA7DFED7EB9
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\is-VDFPE.tmptext
MD5:B02BD9A26ACA56C65E516E1E0621A0E0
SHA256:92808E357B94A1D955D8D7C112C0D3DD46DAA50FAB6167E273B295C288C3E1FC
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\cpuz.exeexecutable
MD5:AED8A6FC0E79C6EE1F073BAAFF2F5FBE
SHA256:E3FD159588488CC9D36B5EFD1904AAFC420397E3D2857EF12CAA3EA7DFED7EB9
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\is-TK29J.tmptext
MD5:E44F547A3378E46171D56A8A80CE9A40
SHA256:AB086F912FF00C8C3AB42B8CA6D01395A96ECA253FAE4B186A3CA72C230B66B0
2900cpu-z_2.08-en.exeC:\Users\admin\AppData\Local\Temp\is-1AHOG.tmp\cpu-z_2.08-en.tmpexecutable
MD5:77B6D18B219D145C73F779D0D82F6BD0
SHA256:AAB8B17924B8F250D1CA477FA705D342BF620FF5864EBBC0B5E5D177C43A1743
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\is-8HTA1.tmpexecutable
MD5:77B6D18B219D145C73F779D0D82F6BD0
SHA256:AAB8B17924B8F250D1CA477FA705D342BF620FF5864EBBC0B5E5D177C43A1743
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\is-OI21S.tmptext
MD5:6F17A8C4A1307E68515CBFE99AA94ECD
SHA256:2645CC947875658717E2B8C8E0DBAD80A09E8CB8AB80D26595CA06C73CF73542
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\cpuz_readme.txttext
MD5:6F17A8C4A1307E68515CBFE99AA94ECD
SHA256:2645CC947875658717E2B8C8E0DBAD80A09E8CB8AB80D26595CA06C73CF73542
604cpu-z_2.08-en.tmpC:\Program Files\CPUID\CPU-Z\cpuz_eula.txttext
MD5:E44F547A3378E46171D56A8A80CE9A40
SHA256:AB086F912FF00C8C3AB42B8CA6D01395A96ECA253FAE4B186A3CA72C230B66B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
6
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2424
cpuz.exe
GET
200
2.19.198.64:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?bf2cf5598dd6fd24
unknown
compressed
61.6 Kb
unknown
2424
cpuz.exe
GET
200
23.32.238.27:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgOtcy3iHUtqqXerqZ8ymWI%2FoA%3D%3D
unknown
binary
503 b
unknown
2424
cpuz.exe
GET
200
2.19.198.64:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?864d91880d70a57f
unknown
compressed
4.66 Kb
unknown
2424
cpuz.exe
GET
200
23.5.172.116:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2424
cpuz.exe
195.154.81.43:443
download.cpuid.com
Online S.a.s.
FR
unknown
2424
cpuz.exe
2.19.198.64:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
2424
cpuz.exe
23.5.172.116:80
x1.c.lencr.org
AKAMAI-AS
NL
unknown
4
System
192.168.100.255:137
whitelisted
2424
cpuz.exe
23.32.238.27:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
download.cpuid.com
  • 195.154.81.43
whitelisted
ctldl.windowsupdate.com
  • 2.19.198.64
  • 2.19.198.57
  • 23.32.238.144
  • 2.19.198.51
  • 23.32.238.152
whitelisted
x1.c.lencr.org
  • 23.5.172.116
whitelisted
r3.o.lencr.org
  • 23.32.238.27
  • 23.32.238.82
shared

Threats

No threats detected
No debug info