File name:

test.exe

Full analysis: https://app.any.run/tasks/db17a190-a552-4219-b6f3-13b7ae110749
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 25, 2025, 19:51:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
stealer
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
MD5:

F2DE88E97571916CDF58022C9BCC7E3C

SHA1:

FC9006D3F052EDD0A9AC08AEEFF36A51DE1A0BAE

SHA256:

C321BF94E224639ED1EA3849796F2DCFAAE6D9A8194F3575ABFD445667048352

SSDEEP:

49152:bvdTspgqiLyRshRcvnOsnbH9VU8x5Yofke8LYqjdOH/IccmwTbHMaZuNhoFlBdBj:blYpluxhRaOsn79Vz5H58LYqjdQJYbMn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • test.exe (PID: 3488)
    • Connects to the CnC server

      • test.exe (PID: 3488)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • test.exe (PID: 3488)
    • Reads the date of Windows installation

      • test.exe (PID: 3488)
    • Connects to the server without a host name

      • test.exe (PID: 3488)
    • Connects to unusual port

      • test.exe (PID: 3488)
    • Process requests binary or script from the Internet

      • test.exe (PID: 3488)
    • Contacting a server suspected of hosting an CnC

      • test.exe (PID: 3488)
  • INFO

    • Checks proxy server information

      • test.exe (PID: 3488)
    • Reads the computer name

      • test.exe (PID: 3488)
    • Creates files in the program directory

      • test.exe (PID: 3488)
    • Creates files or folders in the user directory

      • test.exe (PID: 3488)
    • Create files in a temporary directory

      • test.exe (PID: 3488)
    • Process checks computer location settings

      • test.exe (PID: 3488)
    • Checks supported languages

      • test.exe (PID: 3488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:25 19:53:28+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 55808
InitializedDataSize: 1310208
UninitializedDataSize: -
EntryPoint: 0x1e78
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start test.exe

Process information

PID
CMD
Path
Indicators
Parent process
3488"C:\Users\admin\AppData\Local\Temp\test.exe" C:\Users\admin\AppData\Local\Temp\test.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\test.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 041
Read events
1 038
Write events
3
Delete events
0

Modification events

(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
15
Unknown types
7

Dropped files

PID
Process
Filename
Type
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Chrome_History.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Edge_History.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Chrome_Downloads.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Edge_Downloads.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Software_Info.txttext
MD5:AAB1B59AF386F4F63F9007EF79B3D07A
SHA256:1EB2569F1A69183A48F7D93B4AFB8BFF9D7972FB160D3649EEBD67B2C986ED1F
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Windows_Info.txttext
MD5:4E2F2B4707A956C7012439F90B75E224
SHA256:55BEE1C44449C4AB20073AED0546A0BD947CC5306BE67309519D31B6191C8374
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\FTP Clients\FileZilla\layout.xmlxml
MD5:4526724CD149C14EF9D37D86F825B9F7
SHA256:138167D8F03D48E88DA0AEC3DF38F723BC1895822F75660CCCB5E994814BEE90
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Screenshot.jpgimage
MD5:669AF8D9CB8B2BF293FA9A9B597661B9
SHA256:112CC7A73C7FFCF4192433D2D5C4922EB326986190E2281A7B35B6856F6BE646
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Directories.txttext
MD5:8CCC9E1A4BCF2705C6427128735EB7BF
SHA256:A88F1BD0DEA51455C1AB03552A57BCF36039C747881C6B1AEAC9812AEFAA91C2
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\FileGrabber\Users\admin\Desktop\benefitcause.rtftext
MD5:37673C4593BA6514D68DC75AB9A9290A
SHA256:8B1B3E3002846E3D15041219AA6D007B74E73E82E16AC08C6224F00FAD8DF318
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
25
DNS requests
15
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.48.23.189:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
436
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
1268
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3488
test.exe
GET
404
185.156.72.8:80
http://185.156.72.8/4ss.exe
unknown
unknown
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
1204
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1204
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
592
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3488
test.exe
185.156.72.89:27015
Tov Vaiz Partner
RU
malicious
4
System
192.168.100.255:138
whitelisted
3488
test.exe
185.156.72.89:80
Tov Vaiz Partner
RU
malicious
3488
test.exe
185.156.72.8:80
Tov Vaiz Partner
RU
unknown
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.48.23.189:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 23.48.23.189
  • 23.48.23.185
  • 23.48.23.184
  • 23.48.23.178
  • 23.48.23.180
  • 23.48.23.190
  • 23.48.23.186
  • 23.48.23.181
  • 23.48.23.191
whitelisted
www.microsoft.com
  • 69.192.161.161
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.160.67
  • 20.190.160.20
  • 20.190.160.66
  • 20.190.160.130
  • 20.190.160.22
  • 20.190.160.132
  • 20.190.160.5
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
3488
test.exe
Malware Command and Control Activity Detected
ET MALWARE SVCStealer CnC Checkin Confirmation
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info