File name:

HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.7z

Full analysis: https://app.any.run/tasks/28a667a5-718b-4b05-8168-a1c43ac4f285
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 03, 2025, 22:16:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
python
evasion
pastebin
discord
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

3C62E61FAA5778E48983AA30B408A3E0

SHA1:

31AD08A9681F15F9803FF5B43FB72663CB82D3DF

SHA256:

B521902B84E13958A12B14F0264489CCF0F98BC20366EF169AF962B50104C3E0

SSDEEP:

196608:KZPA5s7dDm0c5Oc0drGHSFiOs5jhCyNQmRL:Ka+m1gc0drGHSFs5jEuRL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • main.exe (PID: 5964)
    • Steals credentials from Web Browsers

      • main.exe (PID: 5964)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
      • main.exe (PID: 3676)
      • YamyNuke.exe (PID: 6192)
    • Process drops python dynamic module

      • main.exe (PID: 3676)
      • YamyNuke.exe (PID: 6192)
    • Reads security settings of Internet Explorer

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
    • The process drops C-runtime libraries

      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 3676)
    • Process drops legitimate windows executable

      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 3676)
    • Loads Python modules

      • main.exe (PID: 5964)
      • YamyNuke.exe (PID: 2240)
    • Application launched itself

      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 3676)
    • Checks for external IP

      • main.exe (PID: 5964)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1676)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1676)
      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 3676)
    • Manual execution by a user

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
    • Checks supported languages

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
      • main.exe (PID: 3676)
      • YamyNuke.exe (PID: 6192)
      • YamyNuke.exe (PID: 2240)
      • main.exe (PID: 5964)
    • Create files in a temporary directory

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
      • main.exe (PID: 3676)
      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 5964)
    • Reads the computer name

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
      • main.exe (PID: 3676)
      • YamyNuke.exe (PID: 6192)
      • main.exe (PID: 5964)
    • Process checks computer location settings

      • HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe (PID: 7012)
    • Reads the machine GUID from the registry

      • YamyNuke.exe (PID: 2240)
      • main.exe (PID: 5964)
    • Checks proxy server information

      • main.exe (PID: 5964)
    • Creates files or folders in the user directory

      • main.exe (PID: 5964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:10:26 12:03:46+00:00
ArchivedFileName: HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe heur-trojan.win32.generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe main.exe yamynuke.exe conhost.exe no specs yamynuke.exe main.exe

Process information

PID
CMD
Path
Indicators
Parent process
1676"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2240"C:\Users\admin\AppData\Local\Temp\YamyNuke.exe" C:\Users\admin\AppData\Local\Temp\YamyNuke.exe
YamyNuke.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\yamynuke.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2960\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeYamyNuke.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3676"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exe
HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5964"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exe
main.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6192"C:\Users\admin\AppData\Local\Temp\YamyNuke.exe" C:\Users\admin\AppData\Local\Temp\YamyNuke.exe
HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\yamynuke.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7012"C:\Users\admin\Desktop\HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe" C:\Users\admin\Desktop\HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe
explorer.exe
User:
admin
Company:
Java@Registred
Integrity Level:
HIGH
Description:
JavaUpadate.exe
Exit code:
0
Version:
7.02.0012
Modules
Images
c:\users\admin\desktop\heur-trojan.win32.generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
15 066
Read events
15 046
Write events
20
Delete events
0

Modification events

(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.7z
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1676) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
99
Suspicious files
5
Text files
33
Unknown types
0

Dropped files

PID
Process
Filename
Type
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_raw_blowfish.pydexecutable
MD5:E160A38E3B7475090685431C8569F60E
SHA256:E1CE85E142D774ACA6AFBE10CDA5679FD1DF85A88E1627BABECA264665627A80
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_raw_cast.pydexecutable
MD5:6E852F19DBD835EC71DDB8DEABF70B52
SHA256:674536C78C0298CFCA4F73D8CF53896674D688021137DAE3B2EDFF5735B1934B
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_ARC4.pydexecutable
MD5:1929456F077BA7B65211C578F6723453
SHA256:DCAB0C3CB2B5F39FC3AC8E4744DCD404ADDAC6BA68EBDBD80448D08197CD811A
6192YamyNuke.exeC:\Users\admin\AppData\Local\Temp\_MEI61922\VCRUNTIME140.dllexecutable
MD5:0E675D4A7A5B7CCD69013386793F68EB
SHA256:BF5FF4603557C9959ACEC995653D052D9054AD4826DF967974EFD2F377C723D1
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_pkcs1_decode.pydexecutable
MD5:46C0A29B1A0C63DB2149581C26CFFC04
SHA256:BF775496ABEB4A5F50133DE26AAA0C82C1F66672F0A80A147E4CE7313E6DF450
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_Salsa20.pydexecutable
MD5:B102881D8B59128BA0E04012956E0088
SHA256:1958DC3F998FEA388B70F9868B7AEDDF2D585DF907194212CA45CA28F44EC6C6
7012HEUR-Trojan.Win32.Generic-774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d.exeC:\Users\admin\AppData\Local\Temp\main.exeexecutable
MD5:50031932CF2CF93921E7A4BFB04AD307
SHA256:45D086E6A24EFF3AA638B5120034BFC9908F9C7228DDA527F2E22D6FB1DE2E87
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_raw_aesni.pydexecutable
MD5:8C89645740EAE9592F6303DF9DF59750
SHA256:2EEBAD43B264ADFB2881C0F08A8F622CDE13E836FB8D215D8D77A5497C80C36A
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_raw_des3.pydexecutable
MD5:3E1BA914E902FDE883A530CA668CFD2C
SHA256:94B52AE9160AF0101865B96440573F067C918C8A9B5784463B00FB44B81EA0F7
3676main.exeC:\Users\admin\AppData\Local\Temp\_MEI36762\Crypto\Cipher\_raw_aes.pydexecutable
MD5:86D0BC13D935857B72CB7B5E1185181D
SHA256:AC3D03BA5C054D2F689F85A79D16BFDC5024AA64F74C38FFC2AE737AA1BE19FE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
25
DNS requests
16
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1188
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1012
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1012
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1188
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1188
backgroundTaskHost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.72
  • 20.190.160.2
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.5
  • 20.190.160.67
  • 20.190.160.64
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
api.ipify.org
  • 104.26.12.205
  • 104.26.13.205
  • 172.67.74.152
shared
pastebin.com
  • 104.20.4.235
  • 104.20.3.235
  • 172.67.19.24
whitelisted
discord.com
  • 162.159.135.232
  • 162.159.136.232
  • 162.159.138.232
  • 162.159.137.232
  • 162.159.128.233
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
No debug info