File name:

aida64-extreme-7-key-rus_id891614ids1s.exe

Full analysis: https://app.any.run/tasks/821606e7-debe-4939-b603-aa61478bb50d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 08, 2025, 15:49:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

A9D291B7640244FA347ACDDE042B0141

SHA1:

978875A000557AE9F592B07D3496CF0932C0AF80

SHA256:

C729612B7B9CA8B1EFA0A014DCC55BCB15228398907CA9746BFE6BE9AA0F1ACC

SSDEEP:

98304:Ns0dqFRzbbCJ2nEvjwQk3FznfVPp2+MQzzB5w/OY+/vgCbUfEuDPdp7ZXusY7IKl:KlIgwFdy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • Reads Internet Explorer settings

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • Reads Microsoft Outlook installation path

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
  • INFO

    • Create files in a temporary directory

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • Checks supported languages

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • Reads the computer name

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • The sample compiled with english language support

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
    • Checks proxy server information

      • aida64-extreme-7-key-rus_id891614ids1s.exe (PID: 6208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:11 16:06:37+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2467328
InitializedDataSize: 2371072
UninitializedDataSize: -
EntryPoint: 0x229618
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1
InternalName: -
LegalCopyright: -
OriginalFileName: -
ProductName: -
ProductVersion: 1
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start aida64-extreme-7-key-rus_id891614ids1s.exe aida64-extreme-7-key-rus_id891614ids1s.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2940"C:\Users\admin\AppData\Local\Temp\aida64-extreme-7-key-rus_id891614ids1s.exe" C:\Users\admin\AppData\Local\Temp\aida64-extreme-7-key-rus_id891614ids1s.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\aida64-extreme-7-key-rus_id891614ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6208"C:\Users\admin\AppData\Local\Temp\aida64-extreme-7-key-rus_id891614ids1s.exe" C:\Users\admin\AppData\Local\Temp\aida64-extreme-7-key-rus_id891614ids1s.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\aida64-extreme-7-key-rus_id891614ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
1 931
Read events
1 925
Write events
6
Delete events
0

Modification events

(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Media Get LLC\MediaGet2-systemScope\mediaget_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(6208) aida64-extreme-7-key-rus_id891614ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
Executable files
0
Suspicious files
2
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6208aida64-extreme-7-key-rus_id891614ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\curl-ca-bundle.crttext
MD5:BE2B0736EA029FFF398559FA7DF4E646
SHA256:C05A79296D61E3B2A2EBAF5AF476839B976D69A5ACB6F581A667E60E681049A2
6208aida64-extreme-7-key-rus_id891614ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\preloader.htmlhtml
MD5:A03BFDC6FBC9F051E37F8050E0E6B305
SHA256:93295EF076AD43849ED5A4389990C86002B7ECD78C675EEB62932809A8B9248F
6208aida64-extreme-7-key-rus_id891614ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\page-wait.pngimage
MD5:A8210694C45753A7A027296EF745E316
SHA256:14DE6662062ADC45202E2021AA4D60E98637DC892A22ACB2C7CC16DA3344C14D
6208aida64-extreme-7-key-rus_id891614ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\Montserrat-Regular.eotbinary
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
6208aida64-extreme-7-key-rus_id891614ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\translations.jsonbinary
MD5:28AA84D5ACDFF22EA8F5834721E78FF7
SHA256:DB24A9E9715861D73106D3B36D93EB2C38E04934BBDA559F747F1C253241691F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
26
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6532
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6996
SIHClient.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6996
SIHClient.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6208
aida64-extreme-7-key-rus_id891614ids1s.exe
51.158.227.48:443
mediaget.com
Online S.a.s.
FR
suspicious
4
System
192.168.100.255:137
whitelisted
4500
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6996
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
mediaget.com
  • 51.158.227.48
  • 51.158.129.110
unknown
login.live.com
  • 40.126.32.72
  • 40.126.32.134
  • 20.190.160.3
  • 20.190.160.5
  • 40.126.32.74
  • 20.190.160.64
  • 20.190.160.132
  • 20.190.160.66
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info