File name:

BlockyRush.exe

Full analysis: https://app.any.run/tasks/79fea11d-b907-4617-a5e5-d88785cfeafb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 19, 2025, 15:42:55
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
crypto-regex
fsg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections
MD5:

F4975F8D0BC8B24C0231B8449F81B1A6

SHA1:

6DC8E052417A298B7DD685EBC508F64776078F8D

SHA256:

FEA3F380BE23E287C895E2D47B3DD173345A5E6BEA9DE6335DA8216A0A3AD066

SSDEEP:

393216:ltNkjE2miRzRAEk4EpJ96EnAqnlOIWNNhKtdy/gDG:7N8NhGLmaGD6zG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • BlockyRush.exe (PID: 4380)
    • Actions looks like stealing of personal data

      • BlockyRush.exe (PID: 4380)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • BlockyRush.exe (PID: 1020)
    • The process checks if it is being run in the virtual environment

      • BlockyRush.exe (PID: 1020)
      • BlockyRush.exe (PID: 4380)
    • Reads the date of Windows installation

      • BlockyRush.exe (PID: 1020)
    • Application launched itself

      • BlockyRush.exe (PID: 1020)
    • Executes application which crashes

      • BlockyRush.exe (PID: 4380)
    • Found regular expressions for crypto-addresses (YARA)

      • BlockyRush.exe (PID: 1020)
  • INFO

    • Reads the computer name

      • BlockyRush.exe (PID: 1020)
      • BlockyRush.exe (PID: 4380)
    • Checks supported languages

      • BlockyRush.exe (PID: 4380)
      • BlockyRush.exe (PID: 1020)
    • Process checks computer location settings

      • BlockyRush.exe (PID: 1020)
    • FSG packer has been detected

      • BlockyRush.exe (PID: 1020)
    • Checks proxy server information

      • slui.exe (PID: 6576)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 5324)
    • Reads the software policy settings

      • slui.exe (PID: 6576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:18 18:10:06+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 1674240
InitializedDataSize: 30008320
UninitializedDataSize: 1024
EntryPoint: 0x1410
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start blockyrush.exe no specs conhost.exe no specs blockyrush.exe conhost.exe no specs werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
900\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBlockyRush.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1020"C:\Users\admin\AppData\Local\Temp\BlockyRush.exe" C:\Users\admin\AppData\Local\Temp\BlockyRush.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\blockyrush.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
4212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBlockyRush.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4380"C:\Users\admin\AppData\Local\Temp\BlockyRush.exe" C:\Users\admin\AppData\Local\Temp\BlockyRush.exe
BlockyRush.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\local\temp\blockyrush.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
5324C:\WINDOWS\system32\WerFault.exe -u -p 4380 -s 540C:\Windows\System32\WerFault.exeBlockyRush.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
6576C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 637
Read events
2 631
Write events
3
Delete events
3

Modification events

(PID) Process:(5324) WerFault.exeKey:\REGISTRY\A\{effa5a24-7e19-cb34-abf1-347907a2e237}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(5324) WerFault.exeKey:\REGISTRY\A\{effa5a24-7e19-cb34-abf1-347907a2e237}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BlockyRush.exe_8bbc9af438d26814992e67d81f145c489232bef_a3e58fa0_3cbab88c-8144-4ee0-b743-04702131c28f\Report.wer
MD5:
SHA256:
5324WerFault.exeC:\Windows\appcompat\Programs\Amcache.hvebinary
MD5:81A75608186BCFC888D566F6CBB0BD33
SHA256:18FEEAF83485204C71C9E68DA7E69E8D00872F7DBB9192706DAE6C05C2D3545F
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE3DC.tmp.xmlxml
MD5:4F917931F698D111739529836795571C
SHA256:6727EEAA7C698C7EC9D2C9D72A5DA76483B7F3C772565F32FDEEC90F3C2E5D73
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE31E.tmp.dmpbinary
MD5:95B88C7D70C54094FC4CDB053E4FA2A9
SHA256:31EA2763CCC46E3B09CF07335A65BA6E5D9C451328E6F8F72288925DB75D7008
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE3BC.tmp.WERInternalMetadata.xmlbinary
MD5:71E8C04CF6260A8FEF94758365DCC087
SHA256:3342172749F452135DC3A438590858C4FFC1BFEF8D5A7B5EC0C2BF4057176ADB
5324WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\BlockyRush.exe.4380.dmpbinary
MD5:010DF240F0381C60FFA2AF4A220DC26C
SHA256:73DF5CDBF24045CAFEC7B842FD07D18C4E7A2847D13EA4B6AE5DF57F61F4D019
4380BlockyRush.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5008
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5008
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.26
  • 23.216.77.28
  • 23.216.77.31
  • 23.216.77.30
  • 23.216.77.25
  • 23.216.77.20
  • 23.216.77.37
  • 23.216.77.36
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.4
  • 40.126.31.69
  • 20.190.159.130
  • 20.190.159.71
  • 20.190.159.23
  • 40.126.31.67
  • 40.126.31.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info