File name:

MWFLAGIDK-ezgif.com-gif-maker.gif

Full analysis: https://app.any.run/tasks/921e7f32-98f3-4e3e-a8c1-1a8a9716d530
Verdict: Malicious activity
Analysis date: April 19, 2025, 06:19:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
Indicators:
MIME: image/gif
File info: GIF image data, version 89a, 512 x 512
MD5:

E83D22AE55D88D9F91837E654F8F30F3

SHA1:

98740061032B9B25B8BB87B96699259E2BA431AB

SHA256:

E172153E7BB84CB4BD5CDF364136F3EC98A5C46B734340D409C60BECC59F595A

SSDEEP:

98304:/WqRMnBZR3riRwYevOci7zhk2mJlpFripjPFqwJUZ56Fio7BMhOTMHPVcoOEdM/7:3tuDn6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 1672)
  • SUSPICIOUS

    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 1672)
      • choco.exe (PID: 1328)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 1672)
    • The process creates files with name similar to system file names

      • powershell.exe (PID: 1672)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 1672)
    • Drops 7-zip archiver for unpacking

      • powershell.exe (PID: 1672)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 1672)
    • The system shut down or reboot

      • choco.exe (PID: 1328)
    • Reads security settings of Internet Explorer

      • choco.exe (PID: 1328)
    • Searches for installed software

      • choco.exe (PID: 1328)
  • INFO

    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Disables trace logs

      • powershell.exe (PID: 1672)
      • choco.exe (PID: 1328)
    • Checks proxy server information

      • powershell.exe (PID: 1672)
      • choco.exe (PID: 1328)
      • slui.exe (PID: 6576)
    • Manual execution by a user

      • powershell.exe (PID: 1672)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 1672)
    • The sample compiled with english language support

      • powershell.exe (PID: 1672)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Creates files in the program directory

      • powershell.exe (PID: 1672)
      • choco.exe (PID: 8068)
      • choco.exe (PID: 1328)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 1672)
    • Reads the computer name

      • choco.exe (PID: 8068)
      • choco.exe (PID: 5576)
      • choco.exe (PID: 1328)
      • choco.exe (PID: 7476)
      • choco.exe (PID: 1228)
    • Checks supported languages

      • choco.exe (PID: 5576)
      • choco.exe (PID: 8068)
      • choco.exe (PID: 1328)
      • choco.exe (PID: 7476)
      • choco.exe (PID: 1228)
    • Reads the machine GUID from the registry

      • choco.exe (PID: 8068)
      • choco.exe (PID: 1328)
      • choco.exe (PID: 1228)
    • Reads Environment values

      • choco.exe (PID: 1328)
      • choco.exe (PID: 1228)
    • Reads the software policy settings

      • choco.exe (PID: 1328)
      • slui.exe (PID: 6576)
      • slui.exe (PID: 7588)
    • Create files in a temporary directory

      • choco.exe (PID: 1328)
    • Process checks Powershell version

      • choco.exe (PID: 1328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.gif | GIF animated bitmap (59.1)
.gif | GIF89a bitmap (24.4)
.gif | GIF bitmap (generic) (12.2)
.bs/bin | PrintFox (C64) bitmap (4)

EXIF

GIF

GIFVersion: 89a
ImageWidth: 512
ImageHeight: 512
HasColorMap: Yes
ColorResolutionDepth: 1
BitsPerPixel: 1
BackgroundColor: -
AnimationIterations: Infinite
TransparentColor: -
FrameCount: 181
Duration: 3.62 s

Composite

ImageSize: 512x512
Megapixels: 0.262
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
19
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rundll32.exe no specs sppextcomobj.exe no specs slui.exe powershell.exe conhost.exe no specs setx.exe no specs setx.exe no specs setx.exe no specs setx.exe no specs choco.exe no specs choco.exe no specs choco.exe slui.exe setx.exe no specs setx.exe no specs shutdown.exe no specs conhost.exe no specs choco.exe no specs choco.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\ProgramData\chocolatey\choco.exe" show winfetchC:\ProgramData\chocolatey\choco.exechoco.exe
User:
admin
Company:
Chocolatey Software, Inc.
Integrity Level:
HIGH
Description:
Exit code:
1
Version:
2.4.3.0
Modules
Images
c:\programdata\chocolatey\choco.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1276\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328"C:\ProgramData\chocolatey\choco.exe" install winfetchC:\ProgramData\chocolatey\choco.exe
choco.exe
User:
admin
Company:
Chocolatey Software, Inc.
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
2.4.3.0
Modules
Images
c:\programdata\chocolatey\choco.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1672"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1073807364
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4608"C:\WINDOWS\System32\setx.exe" ChocolateyLastPathUpdate 133895172902780322C:\Windows\System32\setx.exechoco.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setx - Sets environment variables
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\setx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
5084"C:\WINDOWS\System32\setx.exe" ChocolateyLastPathUpdate 133895172904967616C:\Windows\System32\setx.exechoco.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setx - Sets environment variables
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\setx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
5576"C:\ProgramData\chocolatey\bin\choco.exe" install winfetchC:\ProgramData\chocolatey\bin\choco.exepowershell.exe
User:
admin
Company:
Chocolatey Software, Inc.
Integrity Level:
HIGH
Description:
chocolatey - Chocolatey Shim
Exit code:
0
Version:
0.12.1.0
Modules
Images
c:\programdata\chocolatey\bin\choco.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6576C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7444"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\AppData\Local\Temp\MWFLAGIDK-ezgif.com-gif-maker.gifC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7476"C:\ProgramData\chocolatey\bin\choco.exe" show winfetchC:\ProgramData\chocolatey\bin\choco.exepowershell.exe
User:
admin
Company:
Chocolatey Software, Inc.
Integrity Level:
HIGH
Description:
chocolatey - Chocolatey Shim
Exit code:
1
Version:
0.12.1.0
Modules
Images
c:\programdata\chocolatey\bin\choco.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
17 037
Read events
17 014
Write events
22
Delete events
1

Modification events

(PID) Process:(7444) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Photo Viewer\Viewer
Operation:writeName:MainWndPos
Value:
6000000033000000A00400007502000000000000
(PID) Process:(7744) setx.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:ChocolateyLastPathUpdate
Value:
133895172584764320
(PID) Process:(1672) powershell.exeKey:HKEY_CURRENT_USER\Environment
Operation:delete valueName:ChocolateyInstall
Value:
(PID) Process:(7980) setx.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:ChocolateyLastPathUpdate
Value:
133895172579922137
(PID) Process:(7732) setx.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:ChocolateyLastPathUpdate
Value:
133895172589298474
(PID) Process:(7696) setx.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:ChocolateyLastPathUpdate
Value:
133895172598203153
(PID) Process:(1328) choco.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\choco_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1328) choco.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\choco_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1328) choco.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\choco_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1328) choco.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\choco_RASAPI32
Operation:writeName:FileTracingMask
Value:
Executable files
15
Suspicious files
10
Text files
148
Unknown types
0

Dropped files

PID
Process
Filename
Type
1672powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ipthnqoj.xiy.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\choco.exeexecutable
MD5:C55851E6BB0578E19C16F48A531F99C0
SHA256:39B3C01845B3FE22B2577B62672437D3EE9C372C085A657BCB82C189BD7FD11F
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall.ps1text
MD5:DB89FC7120818885D1A1E112AC7BE6C1
SHA256:C46903CFED1D74620630D0653CE057B3079AF5789AFEB1A5F884298A8693B4EC
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\helpers\Chocolatey.PowerShell.dllexecutable
MD5:8ACEAF1C39D30DD5E5630B8E0B6120F3
SHA256:3B4C6954736AF7291A93C9CB5EBB4693ECD9562CE0B16B08E89552F82CA9D9B1
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\LICENSE.txttext
MD5:B4ECFC2FF4822CE40435ADA0A02D4EC5
SHA256:A42AC97C0186E34BDC5F5A7D87D00A424754592F0EC80B522A872D630C1E870A
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\_rels\.relsxml
MD5:FD1D900C4D3CED664DD6397316A4F594
SHA256:CC55A8AD652B47CAC23FF0C02217AC43001B52F613348FCC151DF8D2F800EC9C
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\init.ps1text
MD5:534EDDF59B2A518F5475B44362D9FFF6
SHA256:71C2606BF144C5D697B85BB170D063892D484A87F9F7FB146356BDE827D4264E
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateyInstall\choco.exe.manifestxml
MD5:1B3ED984F60915F976B02BE949E212CB
SHA256:D715D6071E5CDD6447D46ED8E903B9B3AD5952ACC7394EE17593D87A546C17FC
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\tools\chocolateysetup.psm1text
MD5:D082F6FA1357886CA99CFD9EB03FAA04
SHA256:FB8E51208A641C5BEF628629BADAE9E3530A7D71495687BBA75EF88473C64026
1672powershell.exeC:\Users\admin\AppData\Local\Temp\chocolatey\chocoInstall\chocolatey.nuspecxml
MD5:A4E0034972F8F29B70847FE6F04593DD
SHA256:B243F33B776F1E24492629350FBA09E0105A862B53CB5253852CF22A0023C4DC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
38
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3332
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3332
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2924
SearchApp.exe
2.16.241.218:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2924
SearchApp.exe
204.79.197.222:443
fp.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
google.com
  • 142.250.185.238
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.67
  • 40.126.32.136
  • 20.190.160.66
  • 20.190.160.64
  • 20.190.160.128
  • 20.190.160.132
  • 20.190.160.14
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.201
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
th.bing.com
  • 2.16.204.148
  • 2.16.204.161
  • 2.16.204.134
  • 2.16.204.135
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

PID
Process
Class
Message
1672
powershell.exe
Potentially Bad Traffic
ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI)
1328
choco.exe
Potentially Bad Traffic
ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI)
No debug info