File name:

test.exe

Full analysis: https://app.any.run/tasks/db17a190-a552-4219-b6f3-13b7ae110749
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 25, 2025, 19:51:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
stealer
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
MD5:

F2DE88E97571916CDF58022C9BCC7E3C

SHA1:

FC9006D3F052EDD0A9AC08AEEFF36A51DE1A0BAE

SHA256:

C321BF94E224639ED1EA3849796F2DCFAAE6D9A8194F3575ABFD445667048352

SSDEEP:

49152:bvdTspgqiLyRshRcvnOsnbH9VU8x5Yofke8LYqjdOH/IccmwTbHMaZuNhoFlBdBj:blYpluxhRaOsn79Vz5H58LYqjdQJYbMn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • test.exe (PID: 3488)
    • Actions looks like stealing of personal data

      • test.exe (PID: 3488)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • test.exe (PID: 3488)
    • Reads the date of Windows installation

      • test.exe (PID: 3488)
    • Connects to unusual port

      • test.exe (PID: 3488)
    • Contacting a server suspected of hosting an CnC

      • test.exe (PID: 3488)
    • Process requests binary or script from the Internet

      • test.exe (PID: 3488)
    • Connects to the server without a host name

      • test.exe (PID: 3488)
  • INFO

    • Reads the computer name

      • test.exe (PID: 3488)
    • Creates files in the program directory

      • test.exe (PID: 3488)
    • Process checks computer location settings

      • test.exe (PID: 3488)
    • Checks proxy server information

      • test.exe (PID: 3488)
    • Creates files or folders in the user directory

      • test.exe (PID: 3488)
    • Checks supported languages

      • test.exe (PID: 3488)
    • Create files in a temporary directory

      • test.exe (PID: 3488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:25 19:53:28+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 55808
InitializedDataSize: 1310208
UninitializedDataSize: -
EntryPoint: 0x1e78
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start test.exe

Process information

PID
CMD
Path
Indicators
Parent process
3488"C:\Users\admin\AppData\Local\Temp\test.exe" C:\Users\admin\AppData\Local\Temp\test.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\test.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 041
Read events
1 038
Write events
3
Delete events
0

Modification events

(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3488) test.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
15
Unknown types
7

Dropped files

PID
Process
Filename
Type
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Chrome_History.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Edge_History.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Chrome_Downloads.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Edge_Downloads.txt
MD5:
SHA256:
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Chrome_Historysqlite
MD5:15689BCA2327BD6439BB5A321BFF1115
SHA256:1513329660C876E166FDE7919D705ECFA5339732849159685C59847BE92B7478
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Directories.txttext
MD5:8CCC9E1A4BCF2705C6427128735EB7BF
SHA256:A88F1BD0DEA51455C1AB03552A57BCF36039C747881C6B1AEAC9812AEFAA91C2
3488test.exeC:\Users\admin\AppData\Local\Temp\Historysqlite
MD5:15689BCA2327BD6439BB5A321BFF1115
SHA256:1513329660C876E166FDE7919D705ECFA5339732849159685C59847BE92B7478
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Browsers\Edge_Historysqlite
MD5:EBBC802F3BC61B4350134E595337F997
SHA256:845DE58DF0FF490E3F313972A4A033E37EEE98FD4E4372A83DCFAB3946ACE16C
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\Software_Info.txttext
MD5:AAB1B59AF386F4F63F9007EF79B3D07A
SHA256:1EB2569F1A69183A48F7D93B4AFB8BFF9D7972FB160D3649EEBD67B2C986ED1F
3488test.exeC:\ProgramData\{65b178c1-239c-11ed-b4aa-806e6f6e6963}\FTP Clients\FileZilla\layout.xmlxml
MD5:4526724CD149C14EF9D37D86F825B9F7
SHA256:138167D8F03D48E88DA0AEC3DF38F723BC1895822F75660CCCB5E994814BEE90
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
25
DNS requests
15
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
3488
test.exe
GET
404
185.156.72.8:80
http://185.156.72.8/4ss.exe
unknown
unknown
1268
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.48.23.189:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
436
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1204
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1204
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3488
test.exe
POST
200
185.156.72.89:80
http://185.156.72.89/jetzsaqd/data.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
592
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3488
test.exe
185.156.72.89:27015
Tov Vaiz Partner
RU
malicious
4
System
192.168.100.255:138
whitelisted
3488
test.exe
185.156.72.89:80
Tov Vaiz Partner
RU
malicious
3488
test.exe
185.156.72.8:80
Tov Vaiz Partner
RU
unknown
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.48.23.189:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 23.48.23.189
  • 23.48.23.185
  • 23.48.23.184
  • 23.48.23.178
  • 23.48.23.180
  • 23.48.23.190
  • 23.48.23.186
  • 23.48.23.181
  • 23.48.23.191
whitelisted
www.microsoft.com
  • 69.192.161.161
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.160.67
  • 20.190.160.20
  • 20.190.160.66
  • 20.190.160.130
  • 20.190.160.22
  • 20.190.160.132
  • 20.190.160.5
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
3488
test.exe
Malware Command and Control Activity Detected
ET MALWARE SVCStealer CnC Checkin Confirmation
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
3488
test.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info