File name:

Solar-PuTTY.exe

Full analysis: https://app.any.run/tasks/cad34a92-dfe3-491f-805e-d318226fb012
Verdict: Malicious activity
Analysis date: November 20, 2024, 04:48:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

165CEF7991E3674C76E97F5C3D35E38E

SHA1:

B46D4A4D238A45F72260414C9EF1BA34BE23E01A

SHA256:

04AD4E42029AB11D81F82BBFDCBEB77FFCB3662B623DF1C744CA0F30E6B8DFD9

SSDEEP:

98304:3Gf77brsFUghfN4vgYXBf9uyoCsKSmimaO/A3248PZY8zLAvnyPNyo9YkQCjpNhY:q4SB4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Solar-PuTTY.exe (PID: 5780)
    • The process creates files with name similar to system file names

      • Solar-PuTTY.exe (PID: 5780)
    • Process drops legitimate windows executable

      • Solar-PuTTY.exe (PID: 5780)
    • Executable content was dropped or overwritten

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
    • Reads security settings of Internet Explorer

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
  • INFO

    • The process uses the downloaded file

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
    • Creates files or folders in the user directory

      • Solar-PuTTY.exe (PID: 5780)
    • Reads the computer name

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
      • pageant.exe (PID: 2536)
    • Create files in a temporary directory

      • Solar-PuTTY.exe (PID: 5780)
    • Checks supported languages

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
      • pageant.exe (PID: 2536)
    • Process checks computer location settings

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
    • Sends debugging messages

      • Solar-PuTTY.exe (PID: 4420)
    • Creates files in the program directory

      • Solar-PuTTY.exe (PID: 4420)
    • Reads the machine GUID from the registry

      • Solar-PuTTY.exe (PID: 4420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:30 03:57:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 162816
UninitializedDataSize: 1024
EntryPoint: 0x320c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.2.0.0
ProductVersionNumber: 4.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: Installs Solar-PuTTY
FileVersion: 4.2.0.0
LegalCopyright: Copyright SolarWinds Worldwide, LLC. All rights reserved.
ProductName: Solar-PuTTY
ProductVersion: 4.2.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start solar-putty.exe solar-putty.exe pageant.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2536"C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exe" C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exeSolar-PuTTY.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
PuTTY SSH authentication agent
Version:
Release 0.81 (without embedded help)
Modules
Images
c:\users\admin\appdata\roaming\solar-putty-v4.2\pageant.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4420"C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Solar-PuTTY.exe" C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Solar-PuTTY.exe
Solar-PuTTY.exe
User:
admin
Company:
SolarWinds Worldwide, LLC.
Integrity Level:
MEDIUM
Description:
Solar-PuTTY
Version:
4.2.0.0
Modules
Images
c:\users\admin\appdata\roaming\solar-putty-v4.2\solar-putty.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5780"C:\Users\admin\AppData\Local\Temp\Solar-PuTTY.exe" C:\Users\admin\AppData\Local\Temp\Solar-PuTTY.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Installs Solar-PuTTY
Version:
4.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\solar-putty.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
4 106
Read events
4 086
Write events
20
Delete events
0

Modification events

(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:eula
Value:
True
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:puttyimport
Value:
True
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:hotKeysDisabled
Value:
False
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
19
Suspicious files
6
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
5780Solar-PuTTY.exeC:\Users\admin\AppData\Local\Temp\nsz9382.tmp\System.dllexecutable
MD5:B0C77267F13B2F87C084FD86EF51CCFC
SHA256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\CommonServiceLocator.dllexecutable
MD5:181FA402215022DD2E5A19D89DB1392D
SHA256:0901248381ECD6CB362727A7905F0EBE7B791317B4502F39A8CAAACA3326A244
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\GalaSoft.MvvmLight.dllexecutable
MD5:AF04687248DA9E95A7FF65AB538D0BCF
SHA256:B097FCA120A9E76FA870D82662BDD233ADBF08FC34A3C509F31CC5CED0AC1ECF
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\HtmlAgilityPack.dllexecutable
MD5:AA19161141E04FFB5A7429A3694FBDA6
SHA256:A6A114B9C355E4ECB5FE46FFF880C1446398603FCA80B19328C2A7853AC1C25A
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\ChromeTabs.dllexecutable
MD5:0F3328B8E46908438615756585D6BD4E
SHA256:33E208CD7EC1AEBAF1930788D536A25CB648E9871479B2CFF2479F67FF3E21CF
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Newtonsoft.Json.dllexecutable
MD5:C53737821B861D454D5248034C3C097C
SHA256:575E30F98E4EA42C9E516EDC8BBB29AD8B50B173A3E6B36B5BA39E133CCE9406
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\log4net.dllexecutable
MD5:F64B733EAE44C8C66217386D5A0F2BF0
SHA256:AF5610C515D2244DB98C662636264C8177E89B1AFE407F88FD18A41D66F6E7E2
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SolarWinds\Solar-Putty\Solar-PuTTY.lnklnk
MD5:EB67D23E312FA85EBE9A038F491BC65D
SHA256:1746D2680C4AF0B610B454369E90C05E74E2C0B5DDD4D530788F5F677256D8AB
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\System.Windows.Interactivity.dllexecutable
MD5:580244BC805220253A87196913EB3E5E
SHA256:93FBC59E4880AFC9F136C3AC0976ADA7F3FAA7CACEDCE5C824B337CBCA9D2EBF
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exeexecutable
MD5:FB66D534FA8011E46A12B8C842E3BFA1
SHA256:3E2A617EDE5DABA5A4D532F355206916881FE41925A73D18C8A2C57FC9B3F26E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4932
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4932
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6628
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6628
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
748
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4932
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5752
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
104.126.37.176:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4932
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4932
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4932
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.bing.com
  • 104.126.37.176
  • 104.126.37.152
  • 104.126.37.162
  • 104.126.37.145
  • 104.126.37.160
  • 104.126.37.169
  • 104.126.37.161
  • 104.126.37.163
  • 104.126.37.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
servedbyadbutler.com
  • 141.95.124.137
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.73
  • 40.126.31.71
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
Process
Message
Solar-PuTTY.exe
log4net:WARN Unable to set property [LockingModel] on object [log4net.Appender.RollingFileAppender] using value [log4net.Appender.FileAppender+MinimalLock] (with acceptable conversion types)