File name:

Setup IPCambruter v3.3.2.exe

Full analysis: https://app.any.run/tasks/fff47618-5e40-414f-9d07-226f2a2f8454
Verdict: Malicious activity
Analysis date: August 23, 2024, 16:14:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

176F1E90E7BD50D92273A29F87ED2B38

SHA1:

8F6A737C55631AF4C392229DE31B848474051613

SHA256:

036A8F30121F79ACEAFC86692FECAC4645CFF48051E86FDB39980AE50A65DC17

SSDEEP:

1536:ACND2xRQOgVCXLMwUrsQgjsonVfk5fPOXebMRgTEJDDQ4+pViOqE+uXPWH:ixOOL0rPgjjVfkcObMKIr+pMOqluXPg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Executes application which crashes

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Checks for external IP

      • svchost.exe (PID: 2256)
      • Setup IPCambruter v3.3.2.exe (PID: 6660)
  • INFO

    • Checks supported languages

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Reads the computer name

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Reads Environment values

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Checks proxy server information

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
      • WerFault.exe (PID: 6972)
    • Reads the machine GUID from the registry

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Reads the software policy settings

      • WerFault.exe (PID: 6972)
    • Disables trace logs

      • Setup IPCambruter v3.3.2.exe (PID: 6660)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:23 14:08:18+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 74752
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1435e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: Setup IPCambruter v3.3.2.exe
LegalCopyright:
OriginalFileName: Setup IPCambruter v3.3.2.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start setup ipcambruter v3.3.2.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6660"C:\Users\admin\AppData\Local\Temp\Setup IPCambruter v3.3.2.exe" C:\Users\admin\AppData\Local\Temp\Setup IPCambruter v3.3.2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
2148734499
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\setup ipcambruter v3.3.2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6972C:\WINDOWS\system32\WerFault.exe -u -p 6660 -s 1792C:\Windows\System32\WerFault.exe
Setup IPCambruter v3.3.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
Total events
5 317
Read events
5 303
Write events
14
Delete events
0

Modification events

(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6660) Setup IPCambruter v3.3.2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Setup IPCambruter v3_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
3
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Setup IPCambrute_2c18637b5d4236368eb4603bd537e2371bd86624_39807fc5_73f38415-b777-4fa8-a7ec-f9c85438101a\Report.wer
MD5:
SHA256:
6972WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Setup IPCambruter v3.3.2.exe.6660.dmp
MD5:
SHA256:
6972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF365.tmp.dmpbinary
MD5:EAC8555465D7A6CA6478C57C256D3CF6
SHA256:60006AA7FEB4195079DBCAEDFFFCE4076B9ED9546FEAB73BA7BDA37D8001E4A7
6972WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:82C30E45BF5F93A5DB1D5E47F913053B
SHA256:2C6BBFF9207065E8800C4AF0CB2748818ABB3CFFC0D6D518FE17F76A232F8967
6972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF50C.tmp.WERInternalMetadata.xmlxml
MD5:9A6470FD0A618A79E42C2D6DF562B2D2
SHA256:2207C5C6FCD54303E083B5F8A4248C54E35D63F10254E561BBDB2FEDE87F190D
6972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF52D.tmp.xmlxml
MD5:BFC487AB0510B9DA5D6AC3C5D4593EEA
SHA256:50BB3AB20CD278AE0F5828B4B3D52A616F72F100B12AE980DA32A65B7B45E0DB
6972WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:FB64A9EBEDF48D3895381D5B7D80743D
SHA256:EA21D495930AD76F267A33A0F593DBF0C7EA75E457FCAE49A29DAAD8BD920F42
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
30
DNS requests
16
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6660
Setup IPCambruter v3.3.2.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
7088
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2068
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6996
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
888
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5880
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6660
Setup IPCambruter v3.3.2.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
6972
WerFault.exe
20.189.173.20:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2068
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2068
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5880
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.142
whitelisted
ip-api.com
  • 208.95.112.1
shared
watson.events.data.microsoft.com
  • 20.189.173.20
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.64
  • 40.126.31.67
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.71
  • 20.190.159.2
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
6660
Setup IPCambruter v3.3.2.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
6660
Setup IPCambruter v3.3.2.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2256
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
Process
Message
Setup IPCambruter v3.3.2.exe
CLR: Managed code called FailFast without specifying a reason.