File name:

123.txt

Full analysis: https://app.any.run/tasks/188657d7-e39c-4be8-809d-46a996fc8f2b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 13, 2024, 23:56:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with very long lines (424), with CRLF line terminators
MD5:

27D782EACCCB2A76774EB1109C03AF6F

SHA1:

C8BF807D0726710911D584225CD5354AE1292CC0

SHA256:

0700FB8950DE3D3C68D60733D69209AB9EA4EE7ACB1E7D87ED68C080B4416AA9

SSDEEP:

24:foV7Pl0o+Fn0bt8w4yECKzZ1qBdyV7Pl0o+u3NtvDfyEFd:foRlH+FTTZ1qBdyRlH+Ip

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • taskhost.exe (PID: 360)
  • SUSPICIOUS

    • Reads the Internet Settings

      • taskhost.exe (PID: 360)
      • sipnotify.exe (PID: 1300)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1048)
      • sipnotify.exe (PID: 1300)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1300)
  • INFO

    • Process checks whether UAC notifications are on

      • IMEDICTUPDATE.EXE (PID: 1484)
      • IMEKLMG.EXE (PID: 1688)
      • IMEKLMG.EXE (PID: 1928)
    • Reads the time zone

      • svchost.exe (PID: 1404)
      • svchost.exe (PID: 1280)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1920)
      • taskhost.exe (PID: 360)
      • regedit.exe (PID: 2840)
      • IMEDICTUPDATE.EXE (PID: 1484)
      • svchost.exe (PID: 1956)
      • svchost.exe (PID: 1280)
      • svchost.exe (PID: 1440)
      • svchost.exe (PID: 1924)
      • svchost.exe (PID: 1404)
      • IMEKLMG.EXE (PID: 1688)
      • IMEKLMG.EXE (PID: 1928)
      • wmpnscfg.exe (PID: 240)
      • SearchIndexer.exe (PID: 1024)
      • wmpnscfg.exe (PID: 1940)
      • EOSNotify.exe (PID: 2160)
    • Checks supported languages

      • IMEDICTUPDATE.EXE (PID: 1484)
      • wmpnscfg.exe (PID: 1920)
      • IMEKLMG.EXE (PID: 1928)
      • wmpnscfg.exe (PID: 240)
      • IMEKLMG.EXE (PID: 1688)
      • wmpnscfg.exe (PID: 1940)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1920)
      • IMEDICTUPDATE.EXE (PID: 1484)
      • IMEKLMG.EXE (PID: 1688)
      • IMEKLMG.EXE (PID: 1928)
      • wmpnscfg.exe (PID: 240)
      • wmpnscfg.exe (PID: 1940)
    • Sends debugging messages

      • svchost.exe (PID: 1404)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1300)
    • Reads the software policy settings

      • sipnotify.exe (PID: 1300)
    • Creates files in the program directory

      • SearchIndexer.exe (PID: 1024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
21
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start start notepad.exe no specs wmpnscfg.exe no specs regedit.exe spoolsv.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs imedictupdate.exe no specs svchost.exe no specs svchost.exe no specs taskhost.exe ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs searchindexer.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs searchprotocolhost.exe no specs searchfilterhost.exe no specs eosnotify.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1252"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\123.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
1073807364
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1920"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2840"C:\Windows\regedit.exe" C:\Windows\regedit.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1252C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Spooler SubSystem App
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\spoolsv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1280C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkC:\Windows\System32\svchost.exeservices.exe
User:
LOCAL SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1404C:\Windows\System32\svchost.exe -k utcsvcC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1440C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonationC:\Windows\System32\svchost.exeservices.exe
User:
LOCAL SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1484"C:\Program Files\Common Files\Microsoft Shared\IME14\SHARED\IMEDICTUPDATE.EXE"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEDICTUPDATE.EXEservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office IME 2010
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imedictupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
1924C:\Windows\System32\svchost.exe -k secsvcsC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\program files\windows defender\mpsvc.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\ole32.dll
1956C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestrictedC:\Windows\System32\svchost.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ipsecsvc.dll
c:\windows\system32\authz.dll
c:\windows\system32\fwpuclnt.dll
Total events
9 703
Read events
9 469
Write events
146
Delete events
88

Modification events

(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\accicons.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\clview.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cnfnot32.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DllNXOptions
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dw20.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwtrig20.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\excel.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(2840) regedit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\excelcnv.exe
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
9
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
1404svchost.exeC:\ProgramData\Microsoft\Diagnosis\events00.rbs
MD5:
SHA256:
1404svchost.exeC:\ProgramData\Microsoft\Diagnosis\events01.rbs
MD5:
SHA256:
1024SearchIndexer.exeC:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb
MD5:
SHA256:
1300sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\en-us.htmlhtml
MD5:9752942B57692148B9F614CF4C119A36
SHA256:E31B834DD53FA6815F396FC09C726636ABF98F3367F0CF1590EF5EB3801C75D1
1300sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\script.jstext
MD5:A2682382967C351F7ED21762F9E5DE9E
SHA256:36B1D26F1EC69685648C0528C2FCE95A3C2DBECF828CDFA4A8B4239A15B644A2
1300sipnotify.exeC:\Users\admin\AppData\Local\Microsoft\Windows\SipNotify\eoscontent\metadata.jsonbinary
MD5:E8A970BA6CE386EED9A5E724F26212A6
SHA256:7E06107D585D8FC7870998F3856DCC3E35800AA97E4406AAB83BC8444B6CBDE3
1024SearchIndexer.exeC:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\0001000A.cibinary
MD5:FCD6BCB56C1689FCEF28B57C22475BAD
SHA256:DE2F256064A0AF797747C2B97505DC0B9F3DF0DE4F489EAC731C23AE9CA9CC31
1404svchost.exeC:\ProgramData\Microsoft\Diagnosis\events11.rbsbinary
MD5:317262CEEFBA0C8677B3B35425089E22
SHA256:2A87919E571701C038F1E3C3311E343BC96D9A805CD3452B5EA6587A9EB35B43
1024SearchIndexer.exeC:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.logbinary
MD5:A0411DCBEA0ED30EBAF0D291F8D0D31D
SHA256:1B6F1D6F9143B13ECDF4964E60DB694BB0E2D9312F15D127B3ED8D37DB522069
1024SearchIndexer.exeC:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\CiMG000a.001binary
MD5:B79C60DBCB378DD0453D5C2B813D1D97
SHA256:77644BA824AEE7CEA5A5F123D302B1634BE4A18C22F8138ACCF4C2AB7CC1B4D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
11
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1300
sipnotify.exe
HEAD
200
23.212.215.38:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133786080718750000
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1300
sipnotify.exe
23.212.215.38:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
AU
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
query.prod.cms.rt.microsoft.com
  • 23.212.215.38
whitelisted

Threats

No threats detected
No debug info