File name:

2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot

Full analysis: https://app.any.run/tasks/e650ddef-931f-42af-9893-ce5a01090eb3
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 19, 2025, 02:40:53
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sality
sainbox
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

D5352CF73C99521C1D2BF5D2D2C11CCA

SHA1:

C08778224D6B33DDCEAAD57126A73557863DED32

SHA256:

B61C26242F1C8E7DB15AC76077414D3B05611A1E73006C5954628DC997C02875

SSDEEP:

98304:RYbYMmZLD5MTgrY5k1zq3XlqJscoYY+KAEtJuyuvq5:+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SALITY has been detected

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • SAINBOX has been detected

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • SALITY mutex has been found

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
  • INFO

    • The sample compiled with chinese language support

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • Checks supported languages

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • Create files in a temporary directory

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • Reads the computer name

      • 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe (PID: 7036)
    • Checks proxy server information

      • slui.exe (PID: 728)
    • Reads the software policy settings

      • slui.exe (PID: 728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:15 02:24:31+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 1445888
InitializedDataSize: 594432
UninitializedDataSize: -
EntryPoint: 0x13a59e
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: 迷你玩科技有限公司
FileDescription: 迷你世界
FileVersion: 1.0.0.1
InternalName: dumpsend.exe
LegalCopyright: Copyright (C) 2018
OriginalFileName: dumpsender.exe
ProductName: 迷你世界
ProductVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #SALITY 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
728C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7036"C:\Users\admin\Desktop\2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe" C:\Users\admin\Desktop\2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe
explorer.exe
User:
admin
Company:
迷你玩科技有限公司
Integrity Level:
MEDIUM
Description:
迷你世界
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 644
Read events
3 628
Write events
16
Delete events
0

Modification events

(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_0
Value:
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_0
Value:
5517
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_0
Value:
17001001
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_0
Value:
0
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_1
Value:
659249672
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_1
Value:
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_1
Value:
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_1
Value:
(PID) Process:(7036) 2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl\-227342143
Operation:writeName:1768776801
Value:
10
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
70362025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeC:\Users\admin\Desktop\servermail.xmltext
MD5:1DEF52C025ED4F6296D633D4EAF2846C
SHA256:A446EF3215D4E9B12C51B57DB3D574E1CB4AA44CD5EB752F8D9756697A184130
70362025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exeC:\Users\admin\AppData\Local\Temp\winsemoj.exeexecutable
MD5:B360FA63134A63F9ACFE046D2DFE10D9
SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
42
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7036
2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe
GET
404
43.152.26.239:80
http://mdownload.mini1.cn/mailset/servermail.xml
unknown
whitelisted
5256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2564
RUXIMICS.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2564
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
5256
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2564
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7036
2025-05-19_d5352cf73c99521c1d2bf5d2d2c11cca_darkgate_elex_gcleaner_icedid_qakbot.exe
43.152.26.239:80
mdownload.mini1.cn
ACE
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2564
RUXIMICS.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
2564
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5256
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5256
SIHClient.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.174
whitelisted
mdownload.mini1.cn
  • 43.152.26.239
  • 43.152.28.43
  • 43.152.28.77
  • 43.152.29.148
  • 43.152.26.238
  • 43.152.29.101
  • 43.152.28.41
  • 43.152.26.151
  • 43.152.29.72
  • 43.152.26.209
  • 43.152.28.111
  • 43.152.26.197
  • 43.152.29.77
  • 43.152.26.142
  • 43.152.26.154
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

No threats detected
No debug info