File name:

memreduct-3.4-setup.exe

Full analysis: https://app.any.run/tasks/3a705c9e-b198-44a7-b18f-31dc18d4d5bf
Verdict: Malicious activity
Analysis date: January 23, 2024, 08:01:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0F74E88D113F46798DC0F5D69C26DA2F

SHA1:

ACE6920CD953BCA45CB798672592AE7089D6D01D

SHA256:

A7BA8B9DA0A1FDF7A886FE86B2CA55B4AFE05D69B2C9C4D33B27D65986D6A033

SSDEEP:

6144:4Ya6eFisfjzl/eP3OD8Jb+Wh1btdxlrgTM5onRIR7YdH3zfbv7cxQ1/C8z:4YgzjJWPe0+ybt+TMGnqR7YFfH+QFpz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • memreduct-3.4-setup.exe (PID: 2084)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • memreduct-3.4-setup.exe (PID: 2084)
    • The process creates files with name similar to system file names

      • memreduct-3.4-setup.exe (PID: 2084)
    • Executable content was dropped or overwritten

      • memreduct-3.4-setup.exe (PID: 2084)
    • Reads settings of System Certificates

      • memreduct.exe (PID: 1040)
  • INFO

    • Reads the computer name

      • memreduct-3.4-setup.exe (PID: 2084)
      • memreduct.exe (PID: 1040)
    • Checks supported languages

      • memreduct-3.4-setup.exe (PID: 2084)
      • memreduct.exe (PID: 1040)
      • memreduct.exe (PID: 1928)
    • Create files in a temporary directory

      • memreduct-3.4-setup.exe (PID: 2084)
    • Creates files in the program directory

      • memreduct-3.4-setup.exe (PID: 2084)
    • Creates files or folders in the user directory

      • memreduct-3.4-setup.exe (PID: 2084)
      • memreduct.exe (PID: 1040)
    • Reads the machine GUID from the registry

      • memreduct.exe (PID: 1040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 23:56:47+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.4.0.0
ProductVersionNumber: 3.4.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: https://www.henrypp.org
CompanyName: Henry++
FileDescription: Mem Reduct
FileVersion: 3.4
InternalName: memreduct
LegalCopyright: (c) Henry++. All rights reversed.
OriginalFileName: memreduct-3.4-setup.exe
ProductName: Mem Reduct
ProductVersion: 3.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start memreduct-3.4-setup.exe memreduct.exe memreduct.exe no specs memreduct-3.4-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1040"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exe
memreduct-3.4-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1928"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exememreduct-3.4-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
575
Version:
3.4
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2084"C:\Users\admin\Desktop\memreduct-3.4-setup.exe" C:\Users\admin\Desktop\memreduct-3.4-setup.exe
explorer.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\users\admin\desktop\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2184"C:\Users\admin\Desktop\memreduct-3.4-setup.exe" C:\Users\admin\Desktop\memreduct-3.4-setup.exeexplorer.exe
User:
admin
Company:
Henry++
Integrity Level:
MEDIUM
Description:
Mem Reduct
Exit code:
3221226540
Version:
3.4
Modules
Images
c:\users\admin\desktop\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
Total events
3 265
Read events
3 251
Write events
14
Delete events
0

Modification events

(PID) Process:(1040) memreduct.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
4
Suspicious files
8
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.exeexecutable
MD5:3DCCD98AE5C8709938768D2B2EA95094
SHA256:F1764DCC0040FDDC734D7B56A2C73A986653AC2CA01A8C01FAE3ACE98BA17904
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\License.txttext
MD5:3C34AFDC3ADF82D2448F12715A255122
SHA256:0B383D5A63DA644F628D99C33976EA6487ED89AAA59F0B3257992DEAC1171E6B
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\modern-header.bmpimage
MD5:940C56737BF9BB69CE7A31C623D4E87A
SHA256:766A893FE962AEFD27C574CB05F25CF895D3FC70A00DB5A6FA73D573F571AEFC
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.exe.sigbinary
MD5:5C45201F84E943B07F301DEDC7286101
SHA256:71CD86024CF52AF773D49B20EF9DB01DEB3B6620C303E8764668FDCFEAAF1194
2084memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\Readme.txttext
MD5:1CA07C2BF88B53659DA4EFDFC3EDCE30
SHA256:D3B3D572287FCED7EF401268A5B61A3FE03F49DB718487345D122DAFF4F66A4A
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsnF6F.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\History.lnkbinary
MD5:9194CB7D0EA7FC9CF69C744B960FBE9F
SHA256:7D2E5EDE09BF868E2406BB64CDCD130BAE0B2F4BFF5BCB703EAEC3E9A355B069
2084memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Readme.lnkbinary
MD5:64A36538F292832910B12ECE3AB4CDE6
SHA256:79BA51070E58E81DB3D269364DC5FAA1936E12E74ACC64072B138988AE230E8C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
1040
memreduct.exe
185.199.110.133:443
raw.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.108.133
unknown

Threats

No threats detected
No debug info