File name:

Solar-PuTTY.exe

Full analysis: https://app.any.run/tasks/cad34a92-dfe3-491f-805e-d318226fb012
Verdict: Malicious activity
Analysis date: November 20, 2024, 04:48:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

165CEF7991E3674C76E97F5C3D35E38E

SHA1:

B46D4A4D238A45F72260414C9EF1BA34BE23E01A

SHA256:

04AD4E42029AB11D81F82BBFDCBEB77FFCB3662B623DF1C744CA0F30E6B8DFD9

SSDEEP:

98304:3Gf77brsFUghfN4vgYXBf9uyoCsKSmimaO/A3248PZY8zLAvnyPNyo9YkQCjpNhY:q4SB4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Solar-PuTTY.exe (PID: 4420)
      • Solar-PuTTY.exe (PID: 5780)
    • The process creates files with name similar to system file names

      • Solar-PuTTY.exe (PID: 5780)
    • Executable content was dropped or overwritten

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Solar-PuTTY.exe (PID: 5780)
    • Process drops legitimate windows executable

      • Solar-PuTTY.exe (PID: 5780)
  • INFO

    • Create files in a temporary directory

      • Solar-PuTTY.exe (PID: 5780)
    • Creates files in the program directory

      • Solar-PuTTY.exe (PID: 4420)
    • Checks supported languages

      • Solar-PuTTY.exe (PID: 5780)
      • pageant.exe (PID: 2536)
      • Solar-PuTTY.exe (PID: 4420)
    • Creates files or folders in the user directory

      • Solar-PuTTY.exe (PID: 5780)
    • The process uses the downloaded file

      • Solar-PuTTY.exe (PID: 5780)
      • Solar-PuTTY.exe (PID: 4420)
    • Reads the computer name

      • pageant.exe (PID: 2536)
      • Solar-PuTTY.exe (PID: 4420)
      • Solar-PuTTY.exe (PID: 5780)
    • Process checks computer location settings

      • Solar-PuTTY.exe (PID: 4420)
      • Solar-PuTTY.exe (PID: 5780)
    • Sends debugging messages

      • Solar-PuTTY.exe (PID: 4420)
    • Reads the machine GUID from the registry

      • Solar-PuTTY.exe (PID: 4420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:30 03:57:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 162816
UninitializedDataSize: 1024
EntryPoint: 0x320c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.2.0.0
ProductVersionNumber: 4.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: Installs Solar-PuTTY
FileVersion: 4.2.0.0
LegalCopyright: Copyright SolarWinds Worldwide, LLC. All rights reserved.
ProductName: Solar-PuTTY
ProductVersion: 4.2.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start solar-putty.exe solar-putty.exe pageant.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2536"C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exe" C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exeSolar-PuTTY.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
PuTTY SSH authentication agent
Version:
Release 0.81 (without embedded help)
Modules
Images
c:\users\admin\appdata\roaming\solar-putty-v4.2\pageant.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4420"C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Solar-PuTTY.exe" C:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Solar-PuTTY.exe
Solar-PuTTY.exe
User:
admin
Company:
SolarWinds Worldwide, LLC.
Integrity Level:
MEDIUM
Description:
Solar-PuTTY
Version:
4.2.0.0
Modules
Images
c:\users\admin\appdata\roaming\solar-putty-v4.2\solar-putty.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5780"C:\Users\admin\AppData\Local\Temp\Solar-PuTTY.exe" C:\Users\admin\AppData\Local\Temp\Solar-PuTTY.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Installs Solar-PuTTY
Version:
4.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\solar-putty.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
4 106
Read events
4 086
Write events
20
Delete events
0

Modification events

(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:eula
Value:
True
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:puttyimport
Value:
True
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_CURRENT_USER\SOFTWARE\SolarWinds\Solar-PuTTY
Operation:writeName:hotKeysDisabled
Value:
False
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4420) Solar-PuTTY.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Solar-PuTTY_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
19
Suspicious files
6
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
5780Solar-PuTTY.exeC:\Users\admin\AppData\Local\Temp\nsz9382.tmp\System.dllexecutable
MD5:B0C77267F13B2F87C084FD86EF51CCFC
SHA256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\CommonServiceLocator.dllexecutable
MD5:181FA402215022DD2E5A19D89DB1392D
SHA256:0901248381ECD6CB362727A7905F0EBE7B791317B4502F39A8CAAACA3326A244
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\System.Windows.Interactivity.dllexecutable
MD5:580244BC805220253A87196913EB3E5E
SHA256:93FBC59E4880AFC9F136C3AC0976ADA7F3FAA7CACEDCE5C824B337CBCA9D2EBF
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\System.Reflection.TypeExtensions.dllexecutable
MD5:6F9137AA51DBCB7E0A60C8E9B37078E1
SHA256:321A1F04E0B951379BE9CC9D02ED2A570261B0D631B080D78D0FF47FF42F1AF2
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\pageant.exeexecutable
MD5:FB66D534FA8011E46A12B8C842E3BFA1
SHA256:3E2A617EDE5DABA5A4D532F355206916881FE41925A73D18C8A2C57FC9B3F26E
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\putty.exeexecutable
MD5:B1BB62574146FBA056208F8D8B9EA5FD
SHA256:0F7B2F3003C37339676681D8026E124157AD453DE9532AC795D0950447233F4C
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\log4net.dllexecutable
MD5:F64B733EAE44C8C66217386D5A0F2BF0
SHA256:AF5610C515D2244DB98C662636264C8177E89B1AFE407F88FD18A41D66F6E7E2
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\Solar-PuTTY.exe.configxml
MD5:DFDE5677049A5C2AD672AC7B044750AD
SHA256:C75B9760A1FE07D4C9C27EFDFFDAFFCD43A21097B8B566D0CBBFECF5D7256E60
5780Solar-PuTTY.exeC:\Users\admin\Desktop\Solar-PuTTY.lnklnk
MD5:78A9F8BB68C4A5A714DE02B87673B200
SHA256:CB5C41D07679F84002A54D42C04330E928D445A10CD42E6159DEF141BDF6E9FB
5780Solar-PuTTY.exeC:\Users\admin\AppData\Roaming\Solar-PuTTY-v4.2\solar-putty.jsonini
MD5:1C33621EB4E751AD9D9067473E7D3DA5
SHA256:6F935E3C67853D8FD8AE42B32401AA2FE1E7A5A62D2952DE3BF7BF1D7A54593B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4932
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4932
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6628
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6628
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
748
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4932
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5752
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
104.126.37.176:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4932
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4932
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4932
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.bing.com
  • 104.126.37.176
  • 104.126.37.152
  • 104.126.37.162
  • 104.126.37.145
  • 104.126.37.160
  • 104.126.37.169
  • 104.126.37.161
  • 104.126.37.163
  • 104.126.37.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
servedbyadbutler.com
  • 141.95.124.137
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.73
  • 40.126.31.71
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
Process
Message
Solar-PuTTY.exe
log4net:WARN Unable to set property [LockingModel] on object [log4net.Appender.RollingFileAppender] using value [log4net.Appender.FileAppender+MinimalLock] (with acceptable conversion types)