File name:

memreduct-3.4-setup.exe

Full analysis: https://app.any.run/tasks/3a705c9e-b198-44a7-b18f-31dc18d4d5bf
Verdict: Malicious activity
Analysis date: January 23, 2024, 08:01:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0F74E88D113F46798DC0F5D69C26DA2F

SHA1:

ACE6920CD953BCA45CB798672592AE7089D6D01D

SHA256:

A7BA8B9DA0A1FDF7A886FE86B2CA55B4AFE05D69B2C9C4D33B27D65986D6A033

SSDEEP:

6144:4Ya6eFisfjzl/eP3OD8Jb+Wh1btdxlrgTM5onRIR7YdH3zfbv7cxQ1/C8z:4YgzjJWPe0+ybt+TMGnqR7YFfH+QFpz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • memreduct-3.4-setup.exe (PID: 2084)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • memreduct-3.4-setup.exe (PID: 2084)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • memreduct-3.4-setup.exe (PID: 2084)
    • The process creates files with name similar to system file names

      • memreduct-3.4-setup.exe (PID: 2084)
    • Reads settings of System Certificates

      • memreduct.exe (PID: 1040)
  • INFO

    • Create files in a temporary directory

      • memreduct-3.4-setup.exe (PID: 2084)
    • Checks supported languages

      • memreduct-3.4-setup.exe (PID: 2084)
      • memreduct.exe (PID: 1928)
      • memreduct.exe (PID: 1040)
    • Creates files in the program directory

      • memreduct-3.4-setup.exe (PID: 2084)
    • Reads the computer name

      • memreduct-3.4-setup.exe (PID: 2084)
      • memreduct.exe (PID: 1040)
    • Creates files or folders in the user directory

      • memreduct.exe (PID: 1040)
      • memreduct-3.4-setup.exe (PID: 2084)
    • Reads the machine GUID from the registry

      • memreduct.exe (PID: 1040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 23:56:47+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.4.0.0
ProductVersionNumber: 3.4.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: https://www.henrypp.org
CompanyName: Henry++
FileDescription: Mem Reduct
FileVersion: 3.4
InternalName: memreduct
LegalCopyright: (c) Henry++. All rights reversed.
OriginalFileName: memreduct-3.4-setup.exe
ProductName: Mem Reduct
ProductVersion: 3.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start memreduct-3.4-setup.exe memreduct.exe memreduct.exe no specs memreduct-3.4-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1040"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exe
memreduct-3.4-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1928"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exememreduct-3.4-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
575
Version:
3.4
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2084"C:\Users\admin\Desktop\memreduct-3.4-setup.exe" C:\Users\admin\Desktop\memreduct-3.4-setup.exe
explorer.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\users\admin\desktop\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2184"C:\Users\admin\Desktop\memreduct-3.4-setup.exe" C:\Users\admin\Desktop\memreduct-3.4-setup.exeexplorer.exe
User:
admin
Company:
Henry++
Integrity Level:
MEDIUM
Description:
Mem Reduct
Exit code:
3221226540
Version:
3.4
Modules
Images
c:\users\admin\desktop\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
Total events
3 265
Read events
3 251
Write events
14
Delete events
0

Modification events

(PID) Process:(1040) memreduct.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
4
Suspicious files
8
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Mem Reduct.lnkbinary
MD5:4AC7371A3E2BDE815AA03BB9FB4CEFFC
SHA256:8606947E8831CEA8BF21600D0781F587D59FE75FAE0CC00B46038CA088E33E00
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.lngtext
MD5:FD343886FFF92EFB78D9C037030940C2
SHA256:D8E4DF8CF32AC59B5CF17187725B06A87783306CD09F56551B07DBAC28996241
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Uninstall.lnkbinary
MD5:BDE7C6AE9CB0309775C5034F9B57E997
SHA256:FA1B719A177FDE27A689D636CFCF5EB8DF2FFE4310DED44EBE197086A20C0A4D
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\modern-header.bmpimage
MD5:940C56737BF9BB69CE7A31C623D4E87A
SHA256:766A893FE962AEFD27C574CB05F25CF895D3FC70A00DB5A6FA73D573F571AEFC
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\History.lnkbinary
MD5:9194CB7D0EA7FC9CF69C744B960FBE9F
SHA256:7D2E5EDE09BF868E2406BB64CDCD130BAE0B2F4BFF5BCB703EAEC3E9A355B069
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\uninstall.exeexecutable
MD5:8F93DDEE594FD80058C892055BE53380
SHA256:4D3609748B72BC51C5963D50F5ADECEF94C8BD36A2D5DDAB527814E996A1612D
1040memreduct.exeC:\Users\admin\AppData\Roaming\Henry++\Mem Reduct\memreduct.initext
MD5:BECD8014689052071281EA5479F08020
SHA256:6BB9236D7BCE7A95E8986013ECB08693EDC8080747A353FE2EBDF81CD1782590
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1040
memreduct.exe
185.199.110.133:443
raw.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.108.133
shared

Threats

No threats detected
No debug info