File name:

memreduct-3.4-setup.exe

Full analysis: https://app.any.run/tasks/a53c736f-b435-438f-8936-f949d2d521f4
Verdict: Malicious activity
Analysis date: October 04, 2022, 19:38:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0F74E88D113F46798DC0F5D69C26DA2F

SHA1:

ACE6920CD953BCA45CB798672592AE7089D6D01D

SHA256:

A7BA8B9DA0A1FDF7A886FE86B2CA55B4AFE05D69B2C9C4D33B27D65986D6A033

SSDEEP:

6144:4Ya6eFisfjzl/eP3OD8Jb+Wh1btdxlrgTM5onRIR7YdH3zfbv7cxQ1/C8z:4YgzjJWPe0+ybt+TMGnqR7YFfH+QFpz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • memreduct.exe (PID: 3372)
    • Drops executable file immediately after starts

      • memreduct-3.4-setup.exe (PID: 4012)
    • Loads dropped or rewritten executable

      • memreduct-3.4-setup.exe (PID: 4012)
    • Application was dropped or rewritten from another process

      • memreduct.exe (PID: 3372)
  • SUSPICIOUS

    • Checks supported languages

      • memreduct-3.4-setup.exe (PID: 4012)
      • memreduct.exe (PID: 3372)
    • Reads the computer name

      • memreduct-3.4-setup.exe (PID: 4012)
      • memreduct.exe (PID: 3372)
    • Creates a directory in Program Files

      • memreduct-3.4-setup.exe (PID: 4012)
    • Executable content was dropped or overwritten

      • memreduct-3.4-setup.exe (PID: 4012)
    • Creates files in the program directory

      • memreduct-3.4-setup.exe (PID: 4012)
    • Creates a software uninstall entry

      • memreduct-3.4-setup.exe (PID: 4012)
    • Creates files in the user directory

      • memreduct-3.4-setup.exe (PID: 4012)
      • memreduct.exe (PID: 3372)
    • Drops a file with a compile date too recent

      • memreduct-3.4-setup.exe (PID: 4012)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2021-Sep-25 21:56:47
Detected languages:
  • English - United States
Comments: https://www.henrypp.org
CompanyName: Henry++
FileDescription: Mem Reduct
FileVersion: 3.4
InternalName: memreduct
LegalCopyright: (c) Henry++. All rights reversed.
OriginalFilename: memreduct-3.4-setup.exe
ProductName: Mem Reduct
ProductVersion: 3.4

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 216

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 5
TimeDateStamp: 2021-Sep-25 21:56:47
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
26230
26624
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.41746
.rdata
32768
5018
5120
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.14107
.data
40960
131960
1536
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.11058
.ndata
176128
180224
0
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc
356352
7448
7680
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.26855

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.50665
744
UNKNOWN
English - United States
RT_ICON
2
2.8505
296
UNKNOWN
English - United States
RT_ICON
103
2.56193
288
UNKNOWN
English - United States
RT_DIALOG
104
2.65946
280
UNKNOWN
English - United States
RT_DIALOG
105
2.67385
512
UNKNOWN
English - United States
RT_DIALOG
106
2.91148
248
UNKNOWN
English - United States
RT_DIALOG
109
2.70146
212
UNKNOWN
English - United States
RT_DIALOG
110
2.82633
1638
UNKNOWN
English - United States
RT_BITMAP
111
2.92767
238
UNKNOWN
English - United States
RT_DIALOG
103 (#2)
1.97134
34
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start memreduct-3.4-setup.exe memreduct.exe memreduct-3.4-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3176"C:\Users\admin\AppData\Local\Temp\memreduct-3.4-setup.exe" C:\Users\admin\AppData\Local\Temp\memreduct-3.4-setup.exeExplorer.EXE
User:
admin
Company:
Henry++
Integrity Level:
MEDIUM
Description:
Mem Reduct
Exit code:
3221226540
Version:
3.4
Modules
Images
c:\users\admin\appdata\local\temp\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
3372"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exe
memreduct-3.4-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\comdlg32.dll
4012"C:\Users\admin\AppData\Local\Temp\memreduct-3.4-setup.exe" C:\Users\admin\AppData\Local\Temp\memreduct-3.4-setup.exe
Explorer.EXE
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.4
Modules
Images
c:\users\admin\appdata\local\temp\memreduct-3.4-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
Total events
948
Read events
939
Write events
9
Delete events
0

Modification events

(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:InstallLocation
Value:
"C:\Program Files\Mem Reduct"
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:UninstallString
Value:
"C:\Program Files\Mem Reduct\uninstall.exe"
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayName
Value:
Mem Reduct
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayIcon
Value:
"C:\Program Files\Mem Reduct\memreduct.exe"
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayVersion
Value:
3.4
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:Publisher
Value:
Henry++
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:URLInfoAbout
Value:
https://www.henrypp.org
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:NoModify
Value:
1
(PID) Process:(4012) memreduct-3.4-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:NoRepair
Value:
1
Executable files
4
Suspicious files
1
Text files
7
Unknown types
6

Dropped files

PID
Process
Filename
Type
4012memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Readme.lnklnk
MD5:
SHA256:
4012memreduct-3.4-setup.exeC:\Users\admin\Desktop\Mem Reduct.lnklnk
MD5:
SHA256:
4012memreduct-3.4-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\History.lnklnk
MD5:
SHA256:
4012memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.exe.sigbinary
MD5:5C45201F84E943B07F301DEDC7286101
SHA256:71CD86024CF52AF773D49B20EF9DB01DEB3B6620C303E8764668FDCFEAAF1194
4012memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsrEB59.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
4012memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsrEB59.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
4012memreduct-3.4-setup.exeC:\Users\admin\AppData\Local\Temp\nsrEB59.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
4012memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.exeexecutable
MD5:3DCCD98AE5C8709938768D2B2EA95094
SHA256:F1764DCC0040FDDC734D7B56A2C73A986653AC2CA01A8C01FAE3ACE98BA17904
4012memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\History.txttext
MD5:50B3303580B967B4E8532598A4A896DF
SHA256:4C90E2C59FCD6CB46F6477557FE976F4930CF43A1364CC4FE1746D0A38B8E79A
4012memreduct-3.4-setup.exeC:\Program Files\Mem Reduct\memreduct.lngtext
MD5:FD343886FFF92EFB78D9C037030940C2
SHA256:D8E4DF8CF32AC59B5CF17187725B06A87783306CD09F56551B07DBAC28996241
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3372
memreduct.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
malicious

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
shared

Threats

No threats detected
No debug info