File name:

360mpGui v1.5.0.0.exe

Full analysis: https://app.any.run/tasks/2f52fdab-a99e-478a-9a60-60dbc528f41b
Verdict: Malicious activity
Analysis date: August 04, 2024, 22:59:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

CE20A4FA9956B21DF844AE9A4B2F0437

SHA1:

E2EA1FB9CF0888B1E5D5D886591FC92A499D936E

SHA256:

030C6ABFF1F3556E96BF8DFC1D3EBAC95F105B64FF7D71D5790E0790E216FCDB

SSDEEP:

98304:n7bF01deMcbXlVZHTOqfM1Bn/GcraLq8Me4KKeEnTAy/bIq2hF7Z3o+wmBhBGZNe:ZpomgbDApvx1LA45/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 360mpGui v1.5.0.0.exe (PID: 6584)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Process drops legitimate windows executable

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Reads Microsoft Outlook installation path

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Reads Internet Explorer settings

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Executable content was dropped or overwritten

      • 360mpGui v1.5.0.0.exe (PID: 6584)
  • INFO

    • Checks supported languages

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Reads mouse settings

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Create files in a temporary directory

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Reads the computer name

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Checks proxy server information

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • Process checks Internet Explorer phishing filters

      • 360mpGui v1.5.0.0.exe (PID: 6584)
    • UPX packer has been detected

      • 360mpGui v1.5.0.0.exe (PID: 6584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:16 07:47:33+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 270336
InitializedDataSize: 188416
UninitializedDataSize: 638976
EntryPoint: 0xdebd0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.5.0.0
ProductVersionNumber: 3.3.6.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 1.5.0.0
Comments: 360mpGui
FileDescription: 360mpGui
LegalCopyright: 360mpGui
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT 360mpgui v1.5.0.0.exe

Process information

PID
CMD
Path
Indicators
Parent process
6584"C:\Users\admin\Downloads\360mpGui v1.5.0.0.exe" C:\Users\admin\Downloads\360mpGui v1.5.0.0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
360mpGui
Exit code:
0
Version:
1.5.0.0
Modules
Images
c:\users\admin\downloads\360mpgui v1.5.0.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
8 500
Read events
8 410
Write events
84
Delete events
6

Modification events

(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
04000000030000000E0000000F000000000000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(6584) 360mpGui v1.5.0.0.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4
Operation:writeName:MRUListEx
Value:
040000000000000005000000020000000100000003000000FFFFFFFF
Executable files
6
Suspicious files
12
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\dtpybdrtext
MD5:83FD13ADA78C873E10959783BE31CF9B
SHA256:1C7414A35F9A8E718120B7025B9839EE91C0EA2FD0EEB34DE3216C711EF8B2FA
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\360mpGui\BootLogo.jpgimage
MD5:951662223E04D035BD1C1056C4516EDD
SHA256:F7C722BD68277A078AB50E10FB2E99179666821850FBC56673DDBDEB4DBA1C91
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut52C0.tmpimage
MD5:951662223E04D035BD1C1056C4516EDD
SHA256:F7C722BD68277A078AB50E10FB2E99179666821850FBC56673DDBDEB4DBA1C91
6584360mpGui v1.5.0.0.exeC:\Users\admin\Downloads\360mpTools\ImgBurn.exeexecutable
MD5:48B1EAFDFF8DAEC984224041AF5D4388
SHA256:C496403D68704F5FCE2E2E30033025B3E3C01357452F52E7074DDB2ED94A2496
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut534F.tmpexecutable
MD5:48B1EAFDFF8DAEC984224041AF5D4388
SHA256:C496403D68704F5FCE2E2E30033025B3E3C01357452F52E7074DDB2ED94A2496
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut4E5A.tmpbinary
MD5:310CDF21DFB5854617C7FFD3960DFC52
SHA256:78A7B882FF8E0C30AF5EA489C61EDD5749B67193CD8008AADD836AB04F242DF1
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut532E.tmpbinary
MD5:6C2331581D5359E2FD9A9107604DA006
SHA256:53060A6BF58EF04B1E5FA3DDEFE60BC51F2B9ACF11152CDB4B295B5A68EED3AD
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut541B.tmpbinary
MD5:4952C13A6C2EE32190FCB5CB145B0D4A
SHA256:AF75CDC31EFC365477A6520E65A40E9FD0C5FC553BE5E69608E15DEE005A95F4
6584360mpGui v1.5.0.0.exeC:\Users\admin\AppData\Local\Temp\aut544D.tmpbinary
MD5:227AB27F30CBA7B0330E915082ED711B
SHA256:67B236FFEAC7499BC175C014A7000B04797ECA608EC14636CE61071BC5091ED9
6584360mpGui v1.5.0.0.exeC:\Users\admin\Downloads\360mpTools\ImgBurnStuff\Sounds\Success.wavwav
MD5:FD8177D61C8DD032DD262BF979D852F6
SHA256:8DAE19FC9C722A7FB169F37B5881E74551A8D3B8B43EC6F52B6D5D46E885ED6C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
36
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1928
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1928
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6944
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7000
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4936
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3140
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4936
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5336
SearchApp.exe
95.100.146.8:443
www.bing.com
Akamai International B.V.
CZ
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1928
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 95.100.146.8
  • 95.100.146.34
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.75
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
th.bing.com
  • 95.100.146.32
  • 95.100.146.34
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

No threats detected
No debug info