File name:

Setup R2R-WAIFU v1.5.0.exe

Full analysis: https://app.any.run/tasks/65ab33b5-a782-4aa2-b2d2-5be4104eaa56
Verdict: Malicious activity
Analysis date: November 12, 2023, 15:37:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8585B40673A72D3FA07416EAE4416A7C

SHA1:

E8DFB3DE03BE2D57C0363A7A016B7A7203B64CE9

SHA256:

A6DDA568DCA884E24157B899D923DE72F502AC3336D7BEF51DCFE2A324CE06EF

SSDEEP:

49152:ywE08Hovj/AtAME+oeKn9eg5C4VcLdijTAl9lJadhtnrCMb3K7rE24Iql+bghTkb:w0yo3ME+oeseeVc8jT6adhtnWMLK7Q2D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Setup R2R-WAIFU v1.5.0.exe (PID: 3460)
      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
      • Setup R2R-WAIFU v1.5.0.exe (PID: 3572)
    • Creates a writable file the system directory

      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
  • INFO

    • Create files in a temporary directory

      • Setup R2R-WAIFU v1.5.0.exe (PID: 3460)
      • Setup R2R-WAIFU v1.5.0.exe (PID: 3572)
      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
    • Checks supported languages

      • Setup R2R-WAIFU v1.5.0.exe (PID: 3460)
      • Setup R2R-WAIFU v1.5.0.exe (PID: 3572)
      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3204)
      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
    • Reads the computer name

      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3204)
      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
    • Creates files in the program directory

      • Setup R2R-WAIFU v1.5.0.tmp (PID: 3608)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (57.2)
.exe | Win32 Executable (generic) (18.2)
.exe | Win16/32 Executable Delphi generic (8.3)
.exe | Generic Win/DOS Executable (8)
.exe | DOS Executable Generic (8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:06:14 15:27:46+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 66560
InitializedDataSize: 169472
UninitializedDataSize: -
EntryPoint: 0x1181c
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.5.0.0
ProductVersionNumber: 1.5.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: TEAM R2R
FileDescription: R2R-WAIFU Setup
FileVersion: 1.5.0
LegalCopyright: TEAM R2R
ProductName: R2R-WAIFU
ProductVersion: 1.5.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup r2r-waifu v1.5.0.exe no specs setup r2r-waifu v1.5.0.tmp no specs setup r2r-waifu v1.5.0.exe setup r2r-waifu v1.5.0.tmp no specs

Process information

PID
CMD
Path
Indicators
Parent process
3204"C:\Users\admin\AppData\Local\Temp\is-UBN2G.tmp\Setup R2R-WAIFU v1.5.0.tmp" /SL5="$60134,551847,237056,C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exe" C:\Users\admin\AppData\Local\Temp\is-UBN2G.tmp\Setup R2R-WAIFU v1.5.0.tmpSetup R2R-WAIFU v1.5.0.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-ubn2g.tmp\setup r2r-waifu v1.5.0.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3460"C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exe" C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exeexplorer.exe
User:
admin
Company:
TEAM R2R
Integrity Level:
MEDIUM
Description:
R2R-WAIFU Setup
Exit code:
0
Version:
1.5.0
Modules
Images
c:\users\admin\appdata\local\temp\setup r2r-waifu v1.5.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3572"C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exe" /SPAWNWND=$501F6 /NOTIFYWND=$60134 C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exe
Setup R2R-WAIFU v1.5.0.tmp
User:
admin
Company:
TEAM R2R
Integrity Level:
HIGH
Description:
R2R-WAIFU Setup
Exit code:
0
Version:
1.5.0
Modules
Images
c:\users\admin\appdata\local\temp\setup r2r-waifu v1.5.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3608"C:\Users\admin\AppData\Local\Temp\is-VFIP2.tmp\Setup R2R-WAIFU v1.5.0.tmp" /SL5="$70186,551847,237056,C:\Users\admin\AppData\Local\Temp\Setup R2R-WAIFU v1.5.0.exe" /SPAWNWND=$501F6 /NOTIFYWND=$60134 C:\Users\admin\AppData\Local\Temp\is-VFIP2.tmp\Setup R2R-WAIFU v1.5.0.tmpSetup R2R-WAIFU v1.5.0.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
3221225547
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-vfip2.tmp\setup r2r-waifu v1.5.0.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
1 157
Read events
1 151
Write events
0
Delete events
6

Modification events

(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
655F8BE823E89876A4AB7862D8D6595627A167B9910166C8961FC86125B18477
(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Windows\system32\R2RCMEMU.dll
(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
017AC1DFEAAF34F94B018CCB22FD5AF6D8D0D85E54C5DA616C51754C86109990
(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
180E000038C5D9367E15DA01
(PID) Process:(3608) Setup R2R-WAIFU v1.5.0.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
Executable files
11
Suspicious files
3
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
3608Setup R2R-WAIFU v1.5.0.tmpC:\Program Files\TEAM R2R\R2R-WAIFU\is-SK4EL.tmpimage
MD5:B4C0508EACD37D7DC2E5B11253FA142C
SHA256:5701A119E52076FFD40C5DA0BFDBAEB78F759AA04F9136DDE4B968650FB3F73F
3608Setup R2R-WAIFU v1.5.0.tmpC:\Windows\system32\is-HE4N2.tmpexecutable
MD5:4E6843BB4A70011304E161BEBEB63D3B
SHA256:D9CCA3680A0A1D39FC2F3FE6DD353AB88D7FFE9EE68ED2E7218FF6E674DD74EC
3608Setup R2R-WAIFU v1.5.0.tmpC:\Program Files\TEAM R2R\R2R-WAIFU\unins000.datbinary
MD5:9B63D8291D0B7C4A07CAA12F0D5451F1
SHA256:908AA8ED099B332A44FF8765AA463FC855F1FDF8ECEE6329724C23650370D3B4
3608Setup R2R-WAIFU v1.5.0.tmpC:\Program Files\TEAM R2R\R2R-WAIFU\changelog.txttext
MD5:61F31F6263F3D9964212F5DF4361BBC9
SHA256:D2E191C0AE8316BBAEF59C65904D4C34DDF301BB6E70B56197729FD7E4404269
3608Setup R2R-WAIFU v1.5.0.tmpC:\Users\admin\AppData\Local\Temp\is-PNF3U.tmp\R2RINNO.dllexecutable
MD5:FE369A9470426CF1570198224F8922B0
SHA256:75E01C305E8E28EEA25DEA2B4B83C3D230EE6EC4AE4FE017BC7B52292E27B961
3608Setup R2R-WAIFU v1.5.0.tmpC:\Windows\system32\is-PLQCH.tmpexecutable
MD5:25EB942F831823A18070CA6B4DF295F0
SHA256:10744536FBFEDD3DBC72FA6636284B32C0E541BAECAD386EB2A881ABE772FB55
3608Setup R2R-WAIFU v1.5.0.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\TEAM R2R\R2R-WAIFU\Manual.lnkbinary
MD5:2BE936A142332E3076AA6B550508496C
SHA256:B56D236034AE1FFB6159E4126B2664F41CA530B03787A18CD5AB4150A5AF479D
3608Setup R2R-WAIFU v1.5.0.tmpC:\Users\admin\AppData\Local\Temp\is-PNF3U.tmp\SKIN.CJSTYLESexecutable
MD5:5F87CAF3F7CF63DDE8E6AF53BDF31289
SHA256:4731982B02B067D3F5A5A7518279A9265A49FB0F7B3F8DC3D61B82A5359D4940
3608Setup R2R-WAIFU v1.5.0.tmpC:\Windows\System32\R2RWUPIEMU.dllexecutable
MD5:4E6843BB4A70011304E161BEBEB63D3B
SHA256:D9CCA3680A0A1D39FC2F3FE6DD353AB88D7FFE9EE68ED2E7218FF6E674DD74EC
3608Setup R2R-WAIFU v1.5.0.tmpC:\Program Files\TEAM R2R\R2R-WAIFU\is-OJQT5.tmpexecutable
MD5:5741DD867E94F4BCC1D81CE36AB79AF2
SHA256:4A7753872BF0727E3A344BB2B5466E54F949DBC289FEBFC690AC75E24FBD1C3D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info