File name:

a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363

Full analysis: https://app.any.run/tasks/cf270fe8-1d66-4682-9d69-5e981b2ceacc
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 18, 2024, 08:55:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

92D8AF626C05F7ED59198ACA56AFCF94

SHA1:

B6EBD0ECDB5A11A6CAF241BB7B1E6084F9050CA3

SHA256:

A2AAC15DBDA5DD6103C871BA0DB46F5AF18E6A5941589A0BAACFFFE72FD7B363

SSDEEP:

98304:rIJJNtyVmd/Up+HJvh3h1FvYO9nW9OA1X1oXoZzS5eUHcFNmHJWR/SaWvo1AYcsu:l2q+ed+LTvzw2Zft1Ln9bconKB4q/0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads the BIOS version

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Potential Corporate Privacy Violation

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads Microsoft Outlook installation path

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6500)
    • Reads security settings of Internet Explorer

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Checks Windows Trust Settings

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads Internet Explorer settings

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • There is functionality for taking screenshot (YARA)

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Process requests binary or script from the Internet

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
  • INFO

    • Process checks whether UAC notifications are on

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Checks supported languages

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • The sample compiled with chinese language support

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads the machine GUID from the registry

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads the computer name

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • The sample compiled with english language support

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Create files in a temporary directory

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads CPU info

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Creates files or folders in the user directory

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Checks proxy server information

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Reads the software policy settings

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
    • Themida protector has been detected

      • a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe (PID: 6436)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:15 12:17:31+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 1486848
InitializedDataSize: 11141120
UninitializedDataSize: -
EntryPoint: 0x12970a6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.55
ProductVersionNumber: 1.0.0.55
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 1.0.0.55
FileDescription: DZKJ Schematics & PCB Layout
ProductName: 东震科技电子图
ProductVersion: 1.0.0.55
CompanyName: DZKJ Schematics
LegalCopyright: DZKJ Schematics
Comments: DZKJ Schematics & PCB Layout
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe regsvr32.exe no specs a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6320"C:\Users\admin\AppData\Local\Temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe" C:\Users\admin\AppData\Local\Temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeexplorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
MEDIUM
Description:
DZKJ Schematics & PCB Layout
Exit code:
3221226540
Version:
1.0.0.55
Modules
Images
c:\users\admin\appdata\local\temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6436"C:\Users\admin\AppData\Local\Temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe" C:\Users\admin\AppData\Local\Temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
explorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
HIGH
Description:
DZKJ Schematics & PCB Layout
Exit code:
0
Version:
1.0.0.55
Modules
Images
c:\users\admin\appdata\local\temp\a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
6500regsvr32 C:\Users\admin\AppData\Local\Temp\DZPdf.dll /sC:\Windows\SysWOW64\regsvr32.exea2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
1 448
Read events
1 438
Write events
8
Delete events
2

Modification events

(PID) Process:(6436) a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6436) a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6436) a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6500) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6500) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6500) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6500) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6500) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(6436) a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(6436) a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
Executable files
2
Suspicious files
7
Text files
11
Unknown types
1

Dropped files

PID
Process
Filename
Type
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Temp\DZPdf.dllexecutable
MD5:35D66DB087DE03B967AD8D62FA22DBB9
SHA256:A42A1B5CAF838B3D211C5E4C3AEF41AA4B60D0A9394264810A0768F60C330E2C
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\f[1].pngimage
MD5:A7B1D0D1EF63B09218812F0A83BEC4B9
SHA256:747EC9E2C62A2E882A92E885DD05BE13DA92903DD58C43F77772BD29CAE1BE39
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\layui[1].csstext
MD5:8E7BB0928DBB67E3DE4559A17949923B
SHA256:6458791D1EA9378D871A09DCDB1F9382858F210B1DDB4123B6A57F7B14DFDD03
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\jquery-1.11.1.min[1].jss
MD5:8101D596B2B8FA35FE3A634EA342D7C3
SHA256:540BC6DEC1DD4B92EA4D3FB903F69EABF6D919AFD48F4E312B163C28CFF0F441
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\layer[1].jss
MD5:6E80F0CFF749C82653B9CDDE9EEAB937
SHA256:1CE6649D82D2DB0F8E4823F701DDFCFD9C7F107CB446C907E46EC7E57171A2A3
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\vip[1].jpgimage
MD5:846E9D6E9EDC2C85EC82FEB6F2996226
SHA256:0874F886D97F59A375555E93BD6EC6AFAA9D9C78F266E5D46792DF85107384E8
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\whatapp[1].jpgimage
MD5:3EBE312093AEFF69CBF831FC6998B521
SHA256:B2F61C8F603823C2137BE1651912672880AA9AE97C02A1AF571A94D43A880C38
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Roaming\DZKJ\pz.initext
MD5:74C104A4BC1881E97F1FA84CFA71174C
SHA256:03B873E16A833308B78D33012A59DF6304D4CCE1AF3074063AB30305B6AD736A
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\main[1].htmhtml
MD5:A294F6453249F93230391E440630EA0A
SHA256:12B80F42EB7F3BF5A61E915D7D3EEFBF4C405AD07F9FAB3F3A043DEEC607FC45
6436a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\p[1].pngimage
MD5:51578862CCA0763CABD94242D859903B
SHA256:3A3DF91165577241A2346D04AB44B4D295B443C65FF5AB994EA212D1BAE8D8E2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
39
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
POST
200
3.72.182.186:80
http://www.dzkj16888.com/tg/jh.php
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/main/gg/banner.php
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
302
3.72.182.186:80
http://www.dzkj16888.com/main/ad/main.php?code=PCB&ver=55&file=92d8af626c05f7ed59198aca56afcf94
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
POST
200
3.72.182.186:80
http://down.dzkj16888.com/manage/51/?check=1&cmd=BAF504E89981D28D03EE454EA61277491DE7F3EA7D3D8A9F76D5609AF2A68E9A&ver=55
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/main/main.php?ver=55&file=92d8af626c05f7ed59198aca56afcf94
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
302
3.72.182.186:80
http://www.dzkj16888.com/main/ad/banner.php?code=PCB
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/main/js/jquery-1.11.1.min.js
unknown
unknown
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/layui/css/layui.css
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
104.126.37.139:443
Akamai International B.V.
DE
unknown
4712
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2396
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5000
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
3.72.182.186:80
www.dzkj16888.com
AMAZON-02
DE
suspicious
2396
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
157.240.0.6:443
connect.facebook.net
FACEBOOK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.dzkj16888.com
  • 3.72.182.186
unknown
down.dzkj16888.com
  • 3.72.182.186
unknown
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
connect.facebook.net
  • 157.240.0.6
whitelisted
sdk.51.la
  • 148.153.240.67
  • 90.84.161.21
  • 90.84.161.20
  • 90.84.161.17
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.4
  • 20.190.159.2
  • 40.126.31.67
  • 20.190.159.73
whitelisted

Threats

PID
Process
Class
Message
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
6436
a2aac15dbda5dd6103c871ba0db46f5af18e6a5941589a0baacfffe72fd7b363.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
No debug info