File name:

DZKJ-1.0.0.52.exe

Full analysis: https://app.any.run/tasks/3fec6502-ecfc-413a-8503-018f91aa9d11
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 16, 2025, 05:04:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

7D94503119588F1E769D1A871A949969

SHA1:

D31A2FCB9FA635B7CA9CDA8B6A239815A6645DCD

SHA256:

DCB378E8645ACB7A8C2BE0F51F9C9C125044659A73390D524ACCB96772F79A16

SSDEEP:

98304:ya/OLohFTB8RJjfwllod1zonZX1fL7quPYZ8n+romGILeB89iyGtmuoYj0KaEq2P:9oedS8KLd+AViu27fo/zwjtn7czvy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • DZKJ-1.0.0.52.exe (PID: 3268)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the BIOS version

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Potential Corporate Privacy Violation

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Executable content was dropped or overwritten

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 5392)
    • Reads Microsoft Outlook installation path

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads Internet Explorer settings

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Process requests binary or script from the Internet

      • DZKJ-1.0.0.52.exe (PID: 3268)
  • INFO

    • Process checks whether UAC notifications are on

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • The sample compiled with chinese language support

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the computer name

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the machine GUID from the registry

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Creates files or folders in the user directory

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Checks supported languages

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Checks proxy server information

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Create files in a temporary directory

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads CPU info

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • The sample compiled with english language support

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the software policy settings

      • DZKJ-1.0.0.52.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:17 15:04:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 1486848
InitializedDataSize: 11128832
UninitializedDataSize: -
EntryPoint: 0x1284f64
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.52
ProductVersionNumber: 1.0.0.52
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 1.0.0.52
FileDescription: DZKJ Schematics & PCB Layout
ProductName: 东震科技电子图
ProductVersion: 1.0.0.52
CompanyName: DZKJ Schematics
LegalCopyright: DZKJ Schematics
Comments: DZKJ Schematics & PCB Layout
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dzkj-1.0.0.52.exe regsvr32.exe no specs dzkj-1.0.0.52.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2320"C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe" C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exeexplorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
MEDIUM
Description:
DZKJ Schematics & PCB Layout
Exit code:
3221226540
Version:
1.0.0.52
Modules
Images
c:\users\admin\appdata\local\temp\dzkj-1.0.0.52.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3268"C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe" C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe
explorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
HIGH
Description:
DZKJ Schematics & PCB Layout
Version:
1.0.0.52
Modules
Images
c:\users\admin\appdata\local\temp\dzkj-1.0.0.52.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
5392regsvr32 C:\Users\admin\AppData\Local\Temp\DZPdf.dll /sC:\Windows\SysWOW64\regsvr32.exeDZKJ-1.0.0.52.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
1 619
Read events
1 611
Write events
8
Delete events
0

Modification events

(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
Executable files
2
Suspicious files
19
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\main[1].htmhtml
MD5:85F83EAE55DA0992F4CCF209B2892AAD
SHA256:2D034A316A785E7389B689CE4C7F6E5C408FC6CF976A45F8CC29B359D76A8D97
3268DZKJ-1.0.0.52.exeC:\Users\admin\Desktop\DZKJ Schematics.lnkbinary
MD5:C8A773EC7AF77F58E5772795F57A293C
SHA256:A80C5691482D532AB8CEB3A5F6FF24886429F50A1266884C0D6B6A87673E45D5
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Roaming\DZKJ\DZClient.exeexecutable
MD5:7D94503119588F1E769D1A871A949969
SHA256:DCB378E8645ACB7A8C2BE0F51F9C9C125044659A73390D524ACCB96772F79A16
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\banner[1].htmhtml
MD5:C5792FF8E8F584BB178DAEE12F1AFFA2
SHA256:5502B590C0E9D6631B271D67A2D75BEBC67E6F036693D67B5B522D54FA7AA74A
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\vip[1].jpgimage
MD5:846E9D6E9EDC2C85EC82FEB6F2996226
SHA256:0874F886D97F59A375555E93BD6EC6AFAA9D9C78F266E5D46792DF85107384E8
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\p[1].pngimage
MD5:51578862CCA0763CABD94242D859903B
SHA256:3A3DF91165577241A2346D04AB44B4D295B443C65FF5AB994EA212D1BAE8D8E2
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\f[1].pngimage
MD5:A7B1D0D1EF63B09218812F0A83BEC4B9
SHA256:747EC9E2C62A2E882A92E885DD05BE13DA92903DD58C43F77772BD29CAE1BE39
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\stat[1].htmtext
MD5:E34338FC2AF349780916778A2C15CA1F
SHA256:1EC816F4DD4EF78A4556E30187D131D78B6E32739639D9D182FA8847588F7F5A
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\layer[1].jsbinary
MD5:6E80F0CFF749C82653B9CDDE9EEAB937
SHA256:1CE6649D82D2DB0F8E4823F701DDFCFD9C7F107CB446C907E46EC7E57171A2A3
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Roaming\DZKJ\pz.initext
MD5:73E71555D444CBE8AC5E359A73B77C84
SHA256:22A67F42C9E5546F9D6BE103886942BB81DD02BC541E87C52E5ACE6AA28ADA11
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
32
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/one.css
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/layer/layer.js
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/vip.jpg
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/main/js/stat.php
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/f.png
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/whatapp.jpg
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/layer/theme/default/layer.css?v=3.1.1
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/p.png
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
90.84.161.15:80
http://sdk.51.la/js-sdk-pro.min.js
unknown
unknown
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3268
DZKJ-1.0.0.52.exe
3.72.182.186:80
www.dzkj16888.com
AMAZON-02
DE
suspicious
3268
DZKJ-1.0.0.52.exe
157.240.253.1:443
connect.facebook.net
FACEBOOK
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
www.dzkj16888.com
  • 3.72.182.186
unknown
down.dzkj16888.com
  • 3.72.182.186
unknown
connect.facebook.net
  • 157.240.253.1
whitelisted
sdk.51.la
  • 90.84.161.15
  • 90.84.161.16
  • 90.84.161.19
  • 148.153.240.68
unknown
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

PID
Process
Class
Message
3268
DZKJ-1.0.0.52.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
3268
DZKJ-1.0.0.52.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
No debug info