File name:

Everything-1.4.1.1026.x64-Setup.exe

Full analysis: https://app.any.run/tasks/1596da00-f857-4572-8847-c51f896d022f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: October 26, 2024, 05:18:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

D421FFD2BA591F56D43F601DEEEC09C5

SHA1:

39C58FE62E2E6110D46A51EFF235D69CAE92E034

SHA256:

DAE32A49B6052F0EC70895DD4E35B2B26222F7F4C19C36D9D309033E2FB622BC

SSDEEP:

98304:OJ8W8kCcDrT18Q+/A3oGgJHu/wtlXk+9nRgyMUWMwaVVx0U97kl8v+lX67XAZsPd:Orbav9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Everything.exe (PID: 6176)
    • Actions looks like stealing of personal data

      • Everything.exe (PID: 2632)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
    • The process creates files with name similar to system file names

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
    • Executable content was dropped or overwritten

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
      • everything.exe (PID: 3972)
    • Reads security settings of Internet Explorer

      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
    • Reads the date of Windows installation

      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
    • Application launched itself

      • everything.exe (PID: 1376)
    • Creates a software uninstall entry

      • everything.exe (PID: 3972)
    • Starts itself from another location

      • everything.exe (PID: 3972)
    • Executes as Windows Service

      • Everything.exe (PID: 6200)
  • INFO

    • Create files in a temporary directory

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
    • Checks supported languages

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
      • Everything.exe (PID: 6176)
      • Everything.exe (PID: 6200)
      • Everything.exe (PID: 7148)
      • Everything.exe (PID: 2632)
    • Reads the computer name

      • Everything-1.4.1.1026.x64-Setup.exe (PID: 6564)
      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
      • Everything.exe (PID: 6176)
      • Everything.exe (PID: 6200)
      • Everything.exe (PID: 2632)
      • Everything.exe (PID: 7148)
    • The process uses the downloaded file

      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
    • Process checks computer location settings

      • everything.exe (PID: 1376)
      • everything.exe (PID: 3972)
    • Creates files in the program directory

      • everything.exe (PID: 3972)
      • Everything.exe (PID: 6176)
    • Creates files or folders in the user directory

      • Everything.exe (PID: 7148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.1.1026
ProductVersionNumber: 1.4.1.1026
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Everything Setup
FileVersion: 1.4.1.1026
LegalCopyright: Copyright (c) 2024 voidtools
LegalTrademarks: -
ProductName: Everything
ProductVersion: 1.4.1.1026
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start everything-1.4.1.1026.x64-setup.exe everything.exe no specs everything.exe everything.exe everything.exe no specs everything.exe no specs everything.exe

Process information

PID
CMD
Path
Indicators
Parent process
1376"C:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\Everything.exe" -install "C:\Program Files\Everything" -install-options " -app-data -install-run-on-system-startup -install-service -disable-run-as-admin -uninstall-folder-context-menu -install-start-menu-shortcuts -uninstall-desktop-shortcut -uninstall-url-protocol -install-efu-association -install-language 1033 -save-install-options 0"C:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\everything.exeEverything-1.4.1.1026.x64-Setup.exe
User:
admin
Company:
voidtools
Integrity Level:
MEDIUM
Description:
Everything
Exit code:
0
Version:
1.4.1.1026
Modules
Images
c:\users\admin\appdata\local\temp\nsec4c2.tmp\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
2632"C:\Program Files\Everything\Everything.exe"C:\Program Files\Everything\Everything.exe
Everything-1.4.1.1026.x64-Setup.exe
User:
admin
Company:
voidtools
Integrity Level:
MEDIUM
Description:
Everything
Version:
1.4.1.1026
Modules
Images
c:\program files\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
3972"C:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\Everything.exe" -isrunas -install "C:\Program Files\Everything" -install-options " -app-data -install-run-on-system-startup -install-service -disable-run-as-admin -uninstall-folder-context-menu -install-start-menu-shortcuts -uninstall-desktop-shortcut -uninstall-url-protocol -install-efu-association -install-language 1033 -save-install-options 0"C:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\everything.exe
everything.exe
User:
admin
Company:
voidtools
Integrity Level:
HIGH
Description:
Everything
Exit code:
0
Version:
1.4.1.1026
Modules
Images
c:\users\admin\appdata\local\temp\nsec4c2.tmp\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
6176"C:\Program Files\Everything\Everything.exe" -app-data -install-run-on-system-startup -install-service -disable-run-as-admin -uninstall-folder-context-menu -install-start-menu-shortcuts -uninstall-desktop-shortcut -uninstall-url-protocol -install-efu-association -install-language 1033 -save-install-options 0C:\Program Files\Everything\Everything.exe
everything.exe
User:
admin
Company:
voidtools
Integrity Level:
HIGH
Description:
Everything
Exit code:
0
Version:
1.4.1.1026
Modules
Images
c:\program files\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
6200"C:\Program Files\Everything\Everything.exe" -svcC:\Program Files\Everything\Everything.exeservices.exe
User:
SYSTEM
Company:
voidtools
Integrity Level:
SYSTEM
Description:
Everything
Version:
1.4.1.1026
Modules
Images
c:\program files\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
6564"C:\Users\admin\Desktop\Everything-1.4.1.1026.x64-Setup.exe" C:\Users\admin\Desktop\Everything-1.4.1.1026.x64-Setup.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Everything Setup
Exit code:
0
Version:
1.4.1.1026
Modules
Images
c:\users\admin\desktop\everything-1.4.1.1026.x64-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7148"C:\Program Files\Everything\Everything.exe" -disable-update-notification -uninstall-quick-launch-shortcut -no-choose-volumes -language 1033C:\Program Files\Everything\Everything.exeEverything-1.4.1.1026.x64-Setup.exe
User:
admin
Company:
voidtools
Integrity Level:
MEDIUM
Description:
Everything
Exit code:
0
Version:
1.4.1.1026
Modules
Images
c:\program files\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
Total events
1 781
Read events
1 745
Write events
33
Delete events
3

Modification events

(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:DisplayName
Value:
Everything 1.4.1.1026 (x64)
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:UninstallString
Value:
C:\Program Files\Everything\Uninstall.exe
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:NoModify
Value:
1
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:NoRepair
Value:
1
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:Publisher
Value:
voidtools
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:EstimatedSize
Value:
3072
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Everything\Everything.exe
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:DisplayVersion
Value:
1.4.1.1026
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Everything
Operation:writeName:InstallLocation
Value:
C:\Program Files\Everything
(PID) Process:(3972) everything.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\voidtools\Everything
Operation:writeName:InstallLocation
Value:
C:\Program Files\Everything
Executable files
10
Suspicious files
4
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\InstallOptions2.initext
MD5:2D388F85F070760E18EC39C0DF0980DB
SHA256:6003368F4183B166539C96B734C01595A9D1B1494C11F16AEDEFE8AD68E9CFA8
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\Everything.lngbinary
MD5:112F64226EE5A339BBE7AEFBD9E8DEBA
SHA256:D925B044BAA9AF9375B8918758A4CCF12B48C5DC7B4AABA8791B92E77E9233F1
3972everything.exeC:\Program Files\Everything\Changes.txttext
MD5:E3CC8979834C21DDCC26BD94599242F6
SHA256:9871A374B9E6B8660004450F2E735DDA01025D4CB51EAE0C296FEE3FC285D9DF
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\LangDLL.dllexecutable
MD5:68B287F4067BA013E34A1339AFDB1EA8
SHA256:18E8B40BA22C7A1687BD16E8D585380BC2773FFF5002D7D67E9485FCC0C51026
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\Everything\Changes.txttext
MD5:E3CC8979834C21DDCC26BD94599242F6
SHA256:9871A374B9E6B8660004450F2E735DDA01025D4CB51EAE0C296FEE3FC285D9DF
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\InstallOptions.initext
MD5:F4B7EA54A35FE41EB4ABB5F9E53CD9DD
SHA256:B520532CE65105E5414423491084A05EEC67ADD6CA5FEF67B56BB9866C07BB95
6564Everything-1.4.1.1026.x64-Setup.exeC:\Users\admin\AppData\Local\Temp\nseC4C2.tmp\ioSpecial.initext
MD5:E2D5070BC28DB1AC745613689FF86067
SHA256:D95AED234F932A1C48A2B1B0D98C60CA31F962310C03158E2884AB4DDD3EA1E0
3972everything.exeC:\Program Files\Everything\License.txttext
MD5:3CA499E57472869658D7E877E1EF7ABA
SHA256:4F066C930DB22DA8BF0A940F4F9ECD43A208B4697288ADEA26AB5EB7DAEAAA81
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2464
RUXIMICS.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2464
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
204
184.86.251.22:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2464
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.86.251.19:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2464
RUXIMICS.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2464
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
www.bing.com
  • 184.86.251.19
  • 184.86.251.22
  • 184.86.251.27
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
self.events.data.microsoft.com
  • 20.189.173.4
whitelisted

Threats

No threats detected
No debug info