File name:

DZKJ-1.0.0.52.exe

Full analysis: https://app.any.run/tasks/3fec6502-ecfc-413a-8503-018f91aa9d11
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 16, 2025, 05:04:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

7D94503119588F1E769D1A871A949969

SHA1:

D31A2FCB9FA635B7CA9CDA8B6A239815A6645DCD

SHA256:

DCB378E8645ACB7A8C2BE0F51F9C9C125044659A73390D524ACCB96772F79A16

SSDEEP:

98304:ya/OLohFTB8RJjfwllod1zonZX1fL7quPYZ8n+romGILeB89iyGtmuoYj0KaEq2P:9oedS8KLd+AViu27fo/zwjtn7czvy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • DZKJ-1.0.0.52.exe (PID: 3268)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the BIOS version

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Potential Corporate Privacy Violation

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 5392)
    • Reads Microsoft Outlook installation path

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads Internet Explorer settings

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Executable content was dropped or overwritten

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Process requests binary or script from the Internet

      • DZKJ-1.0.0.52.exe (PID: 3268)
  • INFO

    • The sample compiled with chinese language support

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Checks supported languages

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Process checks whether UAC notifications are on

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the machine GUID from the registry

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Creates files or folders in the user directory

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Create files in a temporary directory

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the computer name

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Checks proxy server information

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • The sample compiled with english language support

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads the software policy settings

      • DZKJ-1.0.0.52.exe (PID: 3268)
    • Reads CPU info

      • DZKJ-1.0.0.52.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:17 15:04:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 1486848
InitializedDataSize: 11128832
UninitializedDataSize: -
EntryPoint: 0x1284f64
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.52
ProductVersionNumber: 1.0.0.52
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 1.0.0.52
FileDescription: DZKJ Schematics & PCB Layout
ProductName: 东震科技电子图
ProductVersion: 1.0.0.52
CompanyName: DZKJ Schematics
LegalCopyright: DZKJ Schematics
Comments: DZKJ Schematics & PCB Layout
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dzkj-1.0.0.52.exe regsvr32.exe no specs dzkj-1.0.0.52.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2320"C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe" C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exeexplorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
MEDIUM
Description:
DZKJ Schematics & PCB Layout
Exit code:
3221226540
Version:
1.0.0.52
Modules
Images
c:\users\admin\appdata\local\temp\dzkj-1.0.0.52.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3268"C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe" C:\Users\admin\AppData\Local\Temp\DZKJ-1.0.0.52.exe
explorer.exe
User:
admin
Company:
DZKJ Schematics
Integrity Level:
HIGH
Description:
DZKJ Schematics & PCB Layout
Version:
1.0.0.52
Modules
Images
c:\users\admin\appdata\local\temp\dzkj-1.0.0.52.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
5392regsvr32 C:\Users\admin\AppData\Local\Temp\DZPdf.dll /sC:\Windows\SysWOW64\regsvr32.exeDZKJ-1.0.0.52.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
1 619
Read events
1 611
Write events
8
Delete events
0

Modification events

(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3268) DZKJ-1.0.0.52.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5392) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
Executable files
2
Suspicious files
19
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Roaming\DZKJ\DZClient.exeexecutable
MD5:7D94503119588F1E769D1A871A949969
SHA256:DCB378E8645ACB7A8C2BE0F51F9C9C125044659A73390D524ACCB96772F79A16
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\one[1].csstext
MD5:4E1D9743FF53B993526A039086B5E1D0
SHA256:C29F839B236898321005CEB3BF7A435FBA316905E4D60510B09CD3D2BEF440E5
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Roaming\DZKJ\pz.initext
MD5:73E71555D444CBE8AC5E359A73B77C84
SHA256:22A67F42C9E5546F9D6BE103886942BB81DD02BC541E87C52E5ACE6AA28ADA11
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Temp\DZPdf.dllexecutable
MD5:35D66DB087DE03B967AD8D62FA22DBB9
SHA256:A42A1B5CAF838B3D211C5E4C3AEF41AA4B60D0A9394264810A0768F60C330E2C
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\main[1].htmhtml
MD5:85F83EAE55DA0992F4CCF209B2892AAD
SHA256:2D034A316A785E7389B689CE4C7F6E5C408FC6CF976A45F8CC29B359D76A8D97
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\banner[1].htmhtml
MD5:C5792FF8E8F584BB178DAEE12F1AFFA2
SHA256:5502B590C0E9D6631B271D67A2D75BEBC67E6F036693D67B5B522D54FA7AA74A
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\whatapp[1].jpgimage
MD5:3EBE312093AEFF69CBF831FC6998B521
SHA256:B2F61C8F603823C2137BE1651912672880AA9AE97C02A1AF571A94D43A880C38
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\layui[1].csstext
MD5:8E7BB0928DBB67E3DE4559A17949923B
SHA256:6458791D1EA9378D871A09DCDB1F9382858F210B1DDB4123B6A57F7B14DFDD03
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\jquery-1.11.1.min[1].jsbinary
MD5:8101D596B2B8FA35FE3A634EA342D7C3
SHA256:540BC6DEC1DD4B92EA4D3FB903F69EABF6D919AFD48F4E312B163C28CFF0F441
3268DZKJ-1.0.0.52.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\layer[1].jsbinary
MD5:6E80F0CFF749C82653B9CDDE9EEAB937
SHA256:1CE6649D82D2DB0F8E4823F701DDFCFD9C7F107CB446C907E46EC7E57171A2A3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
32
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/layer/layer.js
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/vip.jpg
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/layui/css/layui.css
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/main/js/stat.php
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/whatapp.jpg
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/f.png
unknown
unknown
3268
DZKJ-1.0.0.52.exe
GET
200
3.72.182.186:80
http://www.dzkj16888.com/img/p.png
unknown
unknown
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3268
DZKJ-1.0.0.52.exe
3.72.182.186:80
www.dzkj16888.com
AMAZON-02
DE
suspicious
3268
DZKJ-1.0.0.52.exe
157.240.253.1:443
connect.facebook.net
FACEBOOK
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
www.dzkj16888.com
  • 3.72.182.186
unknown
down.dzkj16888.com
  • 3.72.182.186
unknown
connect.facebook.net
  • 157.240.253.1
whitelisted
sdk.51.la
  • 90.84.161.15
  • 90.84.161.16
  • 90.84.161.19
  • 148.153.240.68
unknown
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

PID
Process
Class
Message
3268
DZKJ-1.0.0.52.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
3268
DZKJ-1.0.0.52.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
No debug info