File name:

SecuriteInfo.com.Variant.Jaik.288054.15107.11058

Full analysis: https://app.any.run/tasks/bce5d855-623b-4f21-8991-23b223da8e28
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 20, 2025, 16:43:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autohotkey
ahk
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 3 sections
MD5:

F6C0D96873A31B60888A3FA59411DD2E

SHA1:

BEC39BD8A157541450FB24DAC656D57A22D9423F

SHA256:

D2A33154059FDEAB2B1C249E6325193CAA90E034DA6930D4CAC7875C700972E2

SSDEEP:

12288:F4eTpmR1DKuvNvu8RCRkLv9TWN/d5hXbSlLVvBmCM2SnE3KHS:F4FRNKuvNvu8RFLvsF5NbiLVpmCM2kE7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AHK has been detected (YARA)

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Executable content was dropped or overwritten

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • AUTOHOTKEY mutex has been found

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • There is functionality for taking screenshot (YARA)

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
  • INFO

    • Creates files or folders in the user directory

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Reads the software policy settings

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
      • slui.exe (PID: 7456)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Checks proxy server information

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Reads the computer name

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Checks supported languages

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • The sample compiled with english language support

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Create files in a temporary directory

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
    • Detects AutoHotkey samples (YARA)

      • SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe (PID: 7284)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:16 06:02:54+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit, No debug
PEType: PE32
LinkerVersion: 10
CodeSize: 622592
InitializedDataSize: 385024
UninitializedDataSize: -
EntryPoint: 0xfe303
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.1.37.2
ProductVersionNumber: 1.1.37.2
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: -
FileVersion: 1.1.37.02
InternalName: -
LegalCopyright: -
CompanyName: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.1.37.02
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AUTOHOTKEY securiteinfo.com.variant.jaik.288054.15107.11058.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7276C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7284"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.1.37.02
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.variant.jaik.288054.15107.11058.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7424C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7456"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 185
Read events
1 185
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
13
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Audiodateien\enemy.wavwav
MD5:5675454CEBAC97B457904812200EC116
SHA256:CC7E5CFFA191CDB6F7ADC3B7AE653E4CD971D612CEE700B7FF692EF87A4D6B64
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:02C3E4A8C89270E42460FBF8C51F082D
SHA256:05F58DB831301183941B62593B1BB2D68D2E280D53B4AB1ECB60DA48A6B4351D
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:DDF242CF58E9D9B96ECF230B702A4DD7
SHA256:2B5CB86C2D35FDB4FB3055957F27A7AE765ECB100C436693572152A9D6F1017B
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Audiodateien\hitsound.wavbinary
MD5:48D07084F86887276D49E7AFE6B2FAFE
SHA256:324272EF617E9D850D4A36E220B4E91D976716A985C78F08B254131F6976FA8D
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Audiodateien\she.wavbinary
MD5:2EA954C753CBA7886B117E0362495095
SHA256:3628271B1E045AB05C2A3052C1D1CCC80066BA24D402F4B86CE888399C3421E7
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:E192462F281446B5D1500D474FBACC4B
SHA256:F1BA9F1B63C447682EBF9DE956D0DA2A027B1B779ABEF9522D347D3479139A60
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Pictures\cardes.pngbinary
MD5:88D97F3A64C858035F5173EF7323BCA6
SHA256:B91D241C2B30DB4AB99F93565F131E4500ED392F55C351CFA195BE2A95BAF256
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Pictures\hintergrund.pngbinary
MD5:186825E35363C9FDEA5F994CE111D24E
SHA256:EC4E8B9F32E62FF922B63C2D7A9FF7266C3D2CC02D22F47EAFC89AE4F5C825A1
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\Files\Audiodateien\full.wavbinary
MD5:7270CCD8FF6C2B2E28F4D2A59D9A459F
SHA256:43278745CEE4440A26910EFDB0A7C399CEC550F12C672FDCAEB621496FB113BB
7284SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exeC:\Users\admin\AppData\Local\Temp\dll\sampcac-loader.dllexecutable
MD5:22B89B54FB8FED7DF6FC0C60FFC9D3AE
SHA256:EA32D0548DFFC8A6F58FFEF4C850E2D5613EACDF2012BF4321ECF49BF69F2025
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
26
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
GET
200
172.217.23.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
GET
200
172.217.23.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
8104
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8104
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
GET
200
18.245.60.99:80
http://e5.c.lencr.org/54.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
188.114.97.3:443
cardes.xyz
CLOUDFLARENET
NL
unknown
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
172.217.23.99:80
c.pki.goog
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
45.84.199.240:443
api.cardes.xyz
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
cardes.xyz
  • 188.114.97.3
  • 188.114.96.3
unknown
c.pki.goog
  • 172.217.23.99
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.1
  • 40.126.31.71
  • 20.190.159.2
  • 20.190.159.0
  • 40.126.31.130
  • 20.190.159.64
  • 40.126.31.2
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
api.cardes.xyz
  • 45.84.199.240
unknown
x1.c.lencr.org
  • 23.209.209.135
whitelisted

Threats

PID
Process
Class
Message
7284
SecuriteInfo.com.Variant.Jaik.288054.15107.11058.exe
Potentially Bad Traffic
ET HUNTING Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)
No debug info