File name:

2d5ad.exe

Full analysis: https://app.any.run/tasks/bee366fd-6d24-4f4c-99bb-f0966b7ff1f2
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 29, 2025, 09:52:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
socelars
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

97D59B6BF9A77D248B1A1175FFCE5191

SHA1:

01A1AB71343FBB007D5C137821D27E38F7D8AA0C

SHA256:

D87805D6E7F3B56D268E887B97C3C4FC1A8C4A0A2614867E17677E125462D5AD

SSDEEP:

49152:3ta8Aq25opxQDm1S7zdjqrnJbOBTVSBSHDeonCPqrzVvQ2CQl5lCD:3ta8AqHxQwSPdqrnJbOBTVSBSHDeonC8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SOCELARS mutex has been found

      • 2d5ad.exe (PID: 4300)
    • Known privilege escalation attack

      • dllhost.exe (PID: 6516)
  • SUSPICIOUS

    • Executes application which crashes

      • 2d5ad.exe (PID: 4300)
    • Reads security settings of Internet Explorer

      • 2d5ad.exe (PID: 4300)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • 2d5ad.exe (PID: 4300)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2196)
      • 2d5ad.exe (PID: 4300)
  • INFO

    • Reads the machine GUID from the registry

      • 2d5ad.exe (PID: 7000)
      • 2d5ad.exe (PID: 4300)
    • Reads the computer name

      • 2d5ad.exe (PID: 7000)
      • 2d5ad.exe (PID: 4300)
    • The sample compiled with english language support

      • 2d5ad.exe (PID: 7000)
    • Checks supported languages

      • 2d5ad.exe (PID: 7000)
      • 2d5ad.exe (PID: 4300)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 6516)
    • Checks proxy server information

      • 2d5ad.exe (PID: 4300)
    • Creates files or folders in the user directory

      • 2d5ad.exe (PID: 4300)
      • WerFault.exe (PID: 6036)
    • Reads the software policy settings

      • 2d5ad.exe (PID: 4300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:27 06:03:37+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.35
CodeSize: 1220096
InitializedDataSize: 309760
UninitializedDataSize: -
EntryPoint: 0xf5603
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 1.0.0.1
LegalCopyright: Copyright (C) 2019
ProductVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2d5ad.exe no specs CMSTPLUA #SOCELARS 2d5ad.exe svchost.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1184C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4300"C:\Users\admin\AppData\Local\Temp\2d5ad.exe" C:\Users\admin\AppData\Local\Temp\2d5ad.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\2d5ad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
5508"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6036C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4300 -s 1316C:\Windows\SysWOW64\WerFault.exe2d5ad.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6516C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
7000"C:\Users\admin\AppData\Local\Temp\2d5ad.exe" C:\Users\admin\AppData\Local\Temp\2d5ad.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\2d5ad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
2 970
Read events
2 944
Write events
23
Delete events
3

Modification events

(PID) Process:(6516) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:ProgramId
Value:
00068b4116e3c35915b2a524a2633a74057d00000904
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:FileId
Value:
000001a1ab71343fbb007d5c137821d27e38f7d8aa0c
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:LowerCaseLongPath
Value:
c:\users\admin\appdata\local\temp\2d5ad.exe
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:LongPathHash
Value:
2d5ad.exe|95068eef54aef3c4
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:Name
Value:
2d5ad.exe
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:OriginalFileName
Value:
(PID) Process:(6036) WerFault.exeKey:\REGISTRY\A\{a31d92c7-f299-dfbc-1314-6677b040e4d8}\Root\InventoryApplicationFile\2d5ad.exe|95068eef54aef3c4
Operation:writeName:Publisher
Value:
Executable files
0
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2d5ad.exe_1a54ff8a787c9750704a74d9ea18277d873ae3f_b4a88603_cb48f733-3a5b-435e-a27f-a50bd2d31e95\Report.wer
MD5:
SHA256:
43002d5ad.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5
SHA256:6FB1B8E593CB0388F67EAD35313A230F524657317EA86271B3A97362E5EC6AD9
6036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDA35.tmp.dmpbinary
MD5:D4DDB842ADA1EF57041737CE44117619
SHA256:6612CF72341FF86AEDD44B7D38BAD9151D70AFB77D8CD680C3675B7DFD34ED0D
43002d5ad.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:F752F8B10B2B2FE76B9540BA51F65B8B
SHA256:8407FDDC629FB57E9845F1D1060017FBB95311876A31280D67762A7494ACB07E
6036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDD82.tmp.WERInternalMetadata.xmlbinary
MD5:44E5AF5B79775931CDB4D67BFFD5C1D1
SHA256:2D51F83183B8300AFAC10377D770B50770414CF7EF76BF60CBFAEC3036121FE4
6036WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\2d5ad.exe.4300.dmpbinary
MD5:4D5DBDE6CC5B8644C9A79E571FE98DE1
SHA256:2CA48F88A7F96E5F454C9AC7D8A9BEC46185CC610E8D75E7A04A6B087D868655
6036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDDF0.tmp.xmlxml
MD5:DD8557746E4BE26E4A68A43DC3B4138D
SHA256:F78AF3992CE1AF269B6DEA1BBC469D80917B7F1E43DFCF330C6CD72565C6BEBD
43002d5ad.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:FB6A7C3EDCD7B97FABC18855102A39FC4D6D3F82C0FDD39B1667807B71B9C49B
43002d5ad.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:3433D39284B4F6FB476A3BBEA5D3CFE8
SHA256:57A5DE2D58951B7581561519195A9B5FAAC832858E081F5B7DB3DE24CE3A3447
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
16
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4300
2d5ad.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
4300
2d5ad.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6964
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6964
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4300
2d5ad.exe
104.26.2.46:443
iplogger.org
CLOUDFLARENET
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.216.77.20
  • 23.216.77.25
  • 23.216.77.6
  • 23.216.77.28
  • 23.216.77.42
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.128
  • 40.126.31.69
  • 40.126.31.131
  • 40.126.31.71
  • 40.126.31.129
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
www.ippfinfo.top
unknown
iplogger.org
  • 104.26.2.46
  • 104.26.3.46
  • 172.67.74.161
whitelisted
c.pki.goog
  • 142.250.184.227
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in DNS Lookup)
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in TLS SNI)
No debug info