File name:

Fantom.exe

Full analysis: https://app.any.run/tasks/4ee3444a-a86e-4578-8a59-ab6d53ab9aca
Verdict: Malicious activity
Analysis date: April 29, 2025, 21:07:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

7D80230DF68CCBA871815D68F016C282

SHA1:

E10874C6108A26CEEDFC84F50881824462B5B6B6

SHA256:

F4234A501EDCD30D3BC15C983692C9450383B73BDD310059405C5E3A43CC730B

SSDEEP:

6144:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi:rh1Lk70TnvjcbphQi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Modifies files in the Chrome extension folder

      • Fantom.exe (PID: 2384)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Fantom.exe (PID: 2384)
    • Reads security settings of Internet Explorer

      • Fantom.exe (PID: 2384)
  • INFO

    • Reads the computer name

      • Fantom.exe (PID: 2384)
      • WindowsUpdate.exe (PID: 1672)
    • .NET Reactor protector has been detected

      • Fantom.exe (PID: 2384)
    • Reads the machine GUID from the registry

      • Fantom.exe (PID: 2384)
      • WindowsUpdate.exe (PID: 1672)
    • Checks supported languages

      • Fantom.exe (PID: 2384)
      • WindowsUpdate.exe (PID: 1672)
    • Process checks computer location settings

      • Fantom.exe (PID: 2384)
    • Create files in a temporary directory

      • Fantom.exe (PID: 2384)
    • Disables trace logs

      • Fantom.exe (PID: 2384)
    • Checks proxy server information

      • Fantom.exe (PID: 2384)
      • slui.exe (PID: 5576)
    • Creates files or folders in the user directory

      • Fantom.exe (PID: 2384)
    • Reads the software policy settings

      • slui.exe (PID: 5376)
      • slui.exe (PID: 5576)
    • Creates files in the program directory

      • Fantom.exe (PID: 2384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:07:13 22:47:16+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 104448
InitializedDataSize: 162304
UninitializedDataSize: -
EntryPoint: 0xcd2f
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 3.2.1.0
ProductVersionNumber: 3.2.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: system critical updates
CompanyName: Microsoft
FileDescription: critical update
FileVersion: 3.2.1.0
InternalName: criticalupdate01.exe
LegalCopyright: Copyright Microsoft © 2016
LegalTrademarks: Microsoft corporation ©
OriginalFileName: criticalupdate01.exe
ProductName: critical update kb01
ProductVersion: 3.2.1.0
AssemblyVersion: 3.2.1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start fantom.exe sppextcomobj.exe no specs slui.exe windowsupdate.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1672"C:\Users\admin\AppData\Local\Temp\WindowsUpdate.exe" C:\Users\admin\AppData\Local\Temp\WindowsUpdate.exeFantom.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WindowsFormsApplication5
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\windowsupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2384"C:\Users\admin\AppData\Local\Temp\Fantom.exe" C:\Users\admin\AppData\Local\Temp\Fantom.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
critical update
Version:
3.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\fantom.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
5376"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5576C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6816C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
7 794
Read events
7 780
Write events
14
Delete events
0

Modification events

(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2384) Fantom.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fantom_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
618
Text files
416
Unknown types
0

Dropped files

PID
Process
Filename
Type
2384Fantom.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcroRdrDCx64Upd2300820470_MUI.msp
MD5:
SHA256:
2384Fantom.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcroRdrDCx64Upd2300820470_MUI.msp.fantom
MD5:
SHA256:
2384Fantom.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\DECRYPT_YOUR_FILES.HTMLhtml
MD5:0BB2CECB8368C6DB50D9E7D755B74BEE
SHA256:DD81D6873C9B25ED41917272D4223E4F17B1868D391A6FB4F6A4FD29CF7C6C6B
2384Fantom.exeC:\Users\admin\AppData\Local\Temp\WindowsUpdate.exeexecutable
MD5:FEC89E9D2784B4C015FED6F5AE558E08
SHA256:489F2546A4AD1E0E0147D1CA2FD8801785689F67FB850171CCBAA6306A152065
2384Fantom.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.jsontext
MD5:B16F3538DC0DD837025782EDADD6420B
SHA256:F00F203D3005977600FB1AE4B154107174345CA592398DD5EA7DCB7A76BEA471
2384Fantom.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\officesvcmgrschedule.xmlbinary
MD5:B7A980DD08F1291212FDAB29FD7B1619
SHA256:C753B7BED25DFBAFE6BB62EBB213EFC4245CF906AD22FE3A83D75188F0341276
2384Fantom.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.manbinary
MD5:B7BF19687F8A9F4EF0762EC6473C0D67
SHA256:6FD7F82D165C800E2DA87D1B1759D1495C3D57E322CC90975D26408EBB8DC9C3
2384Fantom.exeC:\ProgramData\Adobe\ARM\S\388\DECRYPT_YOUR_FILES.HTMLhtml
MD5:0BB2CECB8368C6DB50D9E7D755B74BEE
SHA256:DD81D6873C9B25ED41917272D4223E4F17B1868D391A6FB4F6A4FD29CF7C6C6B
2384Fantom.exeC:\ProgramData\Adobe\Temp\DECRYPT_YOUR_FILES.HTMLhtml
MD5:0BB2CECB8368C6DB50D9E7D755B74BEE
SHA256:DD81D6873C9B25ED41917272D4223E4F17B1868D391A6FB4F6A4FD29CF7C6C6B
2384Fantom.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\DECRYPT_YOUR_FILES.HTMLhtml
MD5:0BB2CECB8368C6DB50D9E7D755B74BEE
SHA256:DD81D6873C9B25ED41917272D4223E4F17B1868D391A6FB4F6A4FD29CF7C6C6B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
43
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2384
Fantom.exe
GET
404
49.13.77.253:80
http://powertoolsforyou.com/themes/prestashop/cache/stats.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5404
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5404
backgroundTaskHost.exe
20.223.35.26:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.130
  • 20.190.159.2
  • 20.190.159.129
  • 40.126.31.131
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.73
  • 20.190.160.3
  • 40.126.32.136
  • 20.190.160.5
  • 40.126.32.68
  • 20.190.160.132
  • 20.190.160.65
  • 20.190.160.131
  • 40.126.32.140
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
  • 2603:1030:7::106
whitelisted
206.23.85.13.in-addr.arpa
unknown
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown

Threats

No threats detected
No debug info