File name:

build.exe

Full analysis: https://app.any.run/tasks/1f12a751-d5e6-4adf-b6df-b7a9cc0f4fcb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 21, 2025, 21:51:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

FA4BAE8CDD737E56ABB6181D6645191E

SHA1:

065CAB0AF0CF3026DE3A24E21FBDEC5D2FDA3D5B

SHA256:

9E589CE8E361ABAC8485995A9AB81A452B8B0A99F0350227DA2C2A2AA33881CD

SSDEEP:

24576:a2UScOZk0MKvud6XsUbZIbsPKfzlHiMJA8SRsjAw:a2UScOm0MKmd6XsUbZIbsPKfzlHLJA8v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • build.exe (PID: 4224)
    • Actions looks like stealing of personal data

      • build.exe (PID: 4224)
  • SUSPICIOUS

    • Executes application which crashes

      • build.exe (PID: 4224)
  • INFO

    • Reads the computer name

      • build.exe (PID: 4224)
    • Checks supported languages

      • build.exe (PID: 4224)
    • Create files in a temporary directory

      • build.exe (PID: 4224)
    • Checks proxy server information

      • WerFault.exe (PID: 1324)
      • slui.exe (PID: 6428)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 1324)
    • Reads the software policy settings

      • WerFault.exe (PID: 1324)
      • slui.exe (PID: 6428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:12:06 14:16:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.28
CodeSize: 546304
InitializedDataSize: 152576
UninitializedDataSize: -
EntryPoint: 0x5e27e
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start build.exe werfault.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1324C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4224 -s 684C:\Windows\SysWOW64\WerFault.exe
build.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4224"C:\Users\admin\AppData\Local\Temp\build.exe" C:\Users\admin\AppData\Local\Temp\build.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\local\temp\build.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6428C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 663
Read events
3 663
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
15
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_build.exe_644bfa471d8b8e9d9020d4a394d58aa1bbf194_772e5f62_37d1540e-1fc3-4871-87fe-09a1411fe21e\Report.wer
MD5:
SHA256:
4224build.exeC:\Users\admin\AppData\Local\Temp\BOFUPMJWUSFVSNIBDJEE\PKSPOJEGLU.SMFSMLXSDbinary
MD5:A5B55EF875A290F8739655274B5CFAE6
SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF
1324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER63DB.tmp.WERInternalMetadata.xmlxml
MD5:B9923BE0304977114B6AA9FCCE1754D3
SHA256:2B44BECA996ECE856144C307C63E66DC8126CEDC69A4ED9EB317FECEE7048FB7
4224build.exeC:\Users\admin\AppData\Local\Temp\BOFUPMJWUSFVSNIBDJEE\NEXEWRILCY.NYTJFQMCRbinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
1324WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:D310523737A0D4D05066857AC157F458
SHA256:0A0520D498306689AFA3CAC09ACE82E09229108FC9FABA5A906291D077004484
1324WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:FBB6447B28AB08B74B8FE150D87AAF63
SHA256:5C80838FA2DBB2E09C946A02F9227592D6F1FA85274382725B30E52FFF809F1E
1324WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\build.exe.4224.dmpbinary
MD5:8B91553CE52688368F9C0A29EA993381
SHA256:B34BBD1CA5F9C79A450C48DC8AFA2DA31F0410DE00072E8AFA8869700104779F
1324WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:D9D1496DCEB41768F4079BE1330ECC13
SHA256:6DB2216BDAA2F736ED38E2325FF35F7E3E50EFD9B56145ADC35AEDBD5F2FDC5B
1324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER63FB.tmp.xmlxml
MD5:9D4C90281E06451291CB3C03C6E907A5
SHA256:ADAE08B02A903B001ED2B11F4541FB8AAF257E96E5CA2B510BAE86B74EF9ECFC
1324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER637C.tmp.dmpbinary
MD5:A63773320C73C796098DB854BE88A563
SHA256:E45C92DCAF0A4EA1642EA1F354AA7711A5585D71CD39B771D2750CF6BA704CB1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
31
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1324
WerFault.exe
GET
200
184.24.77.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1324
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3576
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6388
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6388
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4172
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1324
WerFault.exe
20.189.173.20:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1324
WerFault.exe
184.24.77.40:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1324
WerFault.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3576
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3576
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.46
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.20
whitelisted
crl.microsoft.com
  • 184.24.77.40
  • 184.24.77.34
  • 184.24.77.23
  • 184.24.77.27
  • 184.24.77.24
  • 184.24.77.43
  • 184.24.77.39
  • 184.24.77.31
  • 184.24.77.33
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.3
  • 20.190.160.64
  • 20.190.160.4
  • 20.190.160.65
  • 40.126.32.68
  • 20.190.160.131
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.31
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
No debug info