File name:

CH341SER.exe

Full analysis: https://app.any.run/tasks/c1fe6b33-8af3-476a-a39e-03cd1c0577b4
Verdict: Malicious activity
Analysis date: May 27, 2025, 08:34:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
MD5:

17501FBA8A991F5656CFB52C4469283E

SHA1:

59089B4E112664DC7AE0049544B2AFAFD6D2CFFE

SHA256:

A2BB1C04F2519788346EE08790AE2D3E3A49DDE4F49997BF6E81D8301CCF5123

SSDEEP:

24576:Md8uGXZfSHjokacRfQ10lVOjiEp53cRudbbc18RIMsOjmVfyrlG+WOu6/Ry5fQMo:Y0SHjokacRfQ10lVOjiC1cRwbbc18RIm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • CH341SER.exe (PID: 7320)
      • DRVSETUP64.exe (PID: 7536)
      • drvinst.exe (PID: 7784)
    • Executable content was dropped or overwritten

      • CH341SER.exe (PID: 7320)
      • DRVSETUP64.exe (PID: 7536)
      • drvinst.exe (PID: 7784)
    • Creates file in the systems drive root

      • CH341SER.exe (PID: 7320)
    • Reads security settings of Internet Explorer

      • CH341SER.exe (PID: 7320)
    • Creates files in the driver directory

      • drvinst.exe (PID: 7784)
      • DRVSETUP64.exe (PID: 7536)
  • INFO

    • Checks supported languages

      • CH341SER.exe (PID: 7320)
      • drvinst.exe (PID: 7784)
    • Reads the computer name

      • CH341SER.exe (PID: 7320)
      • drvinst.exe (PID: 7784)
    • The sample compiled with english language support

      • CH341SER.exe (PID: 7320)
      • DRVSETUP64.exe (PID: 7536)
      • drvinst.exe (PID: 7784)
    • The sample compiled with chinese language support

      • CH341SER.exe (PID: 7320)
    • Process checks computer location settings

      • CH341SER.exe (PID: 7320)
    • Create files in a temporary directory

      • DRVSETUP64.exe (PID: 7536)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 7784)
    • Reads the software policy settings

      • drvinst.exe (PID: 7784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | WinRAR Self Extracting archive (94.8)
.scr | Windows screen saver (2.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:05:22 04:59:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5
CodeSize: 81920
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ch341ser.exe setup.exe no specs drvsetup64.exe no specs sppextcomobj.exe no specs slui.exe drvinst.exe

Process information

PID
CMD
Path
Indicators
Parent process
7320"C:\Users\admin\AppData\Local\Temp\CH341SER.exe" C:\Users\admin\AppData\Local\Temp\CH341SER.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ch341ser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7396"C:\WCH.CN\CH341SER\SETUP.EXE" C:\WCH.CN\CH341SER\SETUP.EXECH341SER.exe
User:
admin
Integrity Level:
MEDIUM
Description:
EXE For Driver Installation
Version:
1, 7, 2, 0
Modules
Images
c:\wch.cn\ch341ser\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7536C:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.EXEC:\WCH.CN\CH341SER\DRVSETUP64\DRVSETUP64.exe
User:
admin
Integrity Level:
HIGH
Description:
EXE For Driver Installation
Version:
1, 7, 2, 0
Modules
Images
c:\windows\system32\devobj.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\newdev.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
c:\windows\system32\spinf.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\spfileq.dll
7560C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7784DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{3c499dc9-9211-ba43-b175-95ff5bbe1ebd}\CH341SER.INF" "9" "4c9e2e733" "00000000000001C8" "WinSta0\Default" "00000000000001DC" "208" "C:\WCH.CN\CH341SER\WIN 1X"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
Total events
3 701
Read events
3 699
Write events
2
Delete events
0

Modification events

(PID) Process:(7320) CH341SER.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:C%%WCH.CN%CH341SER
Value:
C:\WCH.CN\CH341SER
(PID) Process:(7536) DRVSETUP64.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.dev.log
Value:
4096
Executable files
77
Suspicious files
14
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341PORTSA64.DLLexecutable
MD5:9DAFB3192514248CD4E65407658FF874
SHA256:DEE3D7C686C343B3B770E0238E27EE4D987AAB9A02C24002E2FA332586B1819B
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341S64.sysexecutable
MD5:A6FF2C612ECE0423C337F46FCB75ECAA
SHA256:70CB29CF0AD4A6F60EA87E15E21EF9B24DCC26221733CB9FBAC20D403A8810A1
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341SER.sysexecutable
MD5:A5D471A30FBDCC7D7BAAE4D4E5DFD609
SHA256:21F32D4F723F9693B052F04E1D6A638653A7968000DCD68FFDB0FBF575A2BB33
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341PTA64.DLLexecutable
MD5:CB90FE7684489BC20AEC4D1A6F28FD6D
SHA256:656846E40F9D68AD10FDF0764A25322AE963E6B9C8715B40C87799B27711E907
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341SER.CATbinary
MD5:3CB28ADC55ADEADB676CF09056A18B80
SHA256:52C771BA8C2B33F1040442E96519E08ADF251641ED77D3BC8D078F48697ABB96
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341SER.INFbinary
MD5:867D71937AC1F93DBEB22E7DE5CF677C
SHA256:FB573086EE1B6F65D68A330CC4B48350439E3327C85292FC455B3588DFF053A3
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341S98.SYSexecutable
MD5:363B7CADD3D533738CBCA4EA8D97758F
SHA256:EF2AFBB2679ADDED712555ED8D99EB79C365526503D646F972BE81899A65154C
7320CH341SER.exeC:\WCH.CN\CH341SER\CH341PORTS.DLLexecutable
MD5:4135FFB3AFE5F16BC4018ABB7806992F
SHA256:729C8EA399523369AA5B99AE07277AEDD7FCC1C83F62618DC2683152B3D077FD
7320CH341SER.exeC:\WCH.CN\CH341SER\WIN 1X\CH341PORTSA64.DLLexecutable
MD5:4950E5F9E7FCE8173F28914629576C79
SHA256:26C0CCDCE0FC3819B370D253429FBEBDE613849DF4C801B074F9C77A85F3D6C0
7320CH341SER.exeC:\WCH.CN\CH341SER\WIN 1X\CH341PT.DLLexecutable
MD5:F5A43FAE173DF7A6D16954DF5205C0EE
SHA256:0DE452FD8B2F2CE3F873BC5F6341A8984B76DD2023D52E614B91620ED021A72B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8084
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8084
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5796
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.64
  • 40.126.31.131
  • 40.126.31.130
  • 20.190.159.129
  • 40.126.31.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info