File name:

14.exe

Full analysis: https://app.any.run/tasks/9763aa92-900d-432a-a013-01e948753a76
Verdict: Malicious activity
Analysis date: October 16, 2024, 08:28:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7621F79A7F66C25AD6C636D5248ABEB9

SHA1:

98304E41F82C3AEE82213A286ABDEE9ABF79BCCE

SHA256:

086D35F26BD2FD886E99744960B394D94E74133C40145A3E2BC6B3877B91EC5D

SSDEEP:

49152:MEF0jK4BpiY7dYeNJOvLJrYtKysiwA/2zNtYStiHYjG:nWXpi6dYeNJUu9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 14.exe (PID: 4828)
    • Executes application which crashes

      • notepad.exe (PID: 5100)
    • Start notepad (likely ransomware note)

      • 14.exe (PID: 6568)
    • Application launched itself

      • 14.exe (PID: 4828)
    • Executable content was dropped or overwritten

      • 14.exe (PID: 6568)
    • There is functionality for taking screenshot (YARA)

      • 14.exe (PID: 6568)
  • INFO

    • Checks supported languages

      • 14.exe (PID: 6568)
      • 14.exe (PID: 4828)
    • Checks proxy server information

      • 14.exe (PID: 4828)
    • Reads the computer name

      • 14.exe (PID: 4828)
      • 14.exe (PID: 6568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 609792
InitializedDataSize: 648192
UninitializedDataSize: -
EntryPoint: 0x95c60
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 14.exe no specs THREAT 14.exe notepad.exe ieinstal.exe no specs werfault.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
1568"C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\Internet Explorer\ieinstal.exe14.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer Add-on Installer
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\internet explorer\ieinstal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4304C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5100 -s 456C:\Windows\SysWOW64\WerFault.exe
notepad.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4828"C:\Users\admin\AppData\Local\Temp\14.exe" C:\Users\admin\AppData\Local\Temp\14.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\14.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5100C:\Windows\System32\Notepad.exeC:\Windows\SysWOW64\notepad.exe
14.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
3221225477
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
6568"C:\Users\admin\AppData\Local\Temp\14.exe"C:\Users\admin\AppData\Local\Temp\14.exe
14.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\14.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7200C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5100 -s 464C:\Windows\SysWOW64\WerFault.exe
notepad.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
7 227
Read events
7 224
Write events
3
Delete events
0

Modification events

(PID) Process:(6568) 14.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Qspt
Value:
C:\Users\admin\AppData\Local\Qspt\Qspt.hta
(PID) Process:(1568) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\NetWire
Operation:writeName:HostId
Value:
AAAAA
(PID) Process:(1568) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\NetWire
Operation:writeName:Install Date
Value:
2024-10-16 08:29:17
Executable files
1
Suspicious files
8
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4304WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Notepad.exe_f6b8059a93293872e972694f7db3620c91a9585_99985f54_24c2e11c-b35e-421a-80fd-a080118dabfa\Report.wer
MD5:
SHA256:
7200WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Notepad.exe_77169925271fdd585e636cace424ea641856e24f_99985f54_f3470af6-29eb-4eba-b3a9-99a6a7e11478\Report.wer
MD5:
SHA256:
656814.exeC:\Users\admin\AppData\Local\Qspt\Qsptset.exeexecutable
MD5:7621F79A7F66C25AD6C636D5248ABEB9
SHA256:086D35F26BD2FD886E99744960B394D94E74133C40145A3E2BC6B3877B91EC5D
656814.exeC:\Users\admin\AppData\Local\Qspt\Qspt.htahtml
MD5:9D2AE5EAB6717ABDD7EE1BFD88A0846E
SHA256:1AAA0023D1F73EDA7C0463DC702C0E4AE7189EA53BB3D593EB094DCC3CD671F4
7200WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFECB.tmp.dmpbinary
MD5:DE43D667EAD32A639186B48DC2AC9881
SHA256:389BA64BC491E65D6E824E2467777B064E7CAD3CCA8C025F16D5BEB9DCE83E8C
4304WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:1B7FD5177461034E4086724C5845E927
SHA256:065AF18C229898A1C2A8D989911ADCD9B1E2AB14B1953EBF8EAF34AE37EA1627
4304WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF855.tmp.xmlxml
MD5:63CC2F94C544F2A3DBF2817AB728F63C
SHA256:8E3DF7CA9ABF9CEE1973EBBF0434FDB1D9BD6C8607E5456D9D0BAC0D0EC3F2E7
7200WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFF3A.tmp.WERInternalMetadata.xmlxml
MD5:8BFD94E6A6AA3D436EFD20745ABED3F0
SHA256:52B7374CADD7D60A064C4253C66C88761C26DAFBCD01E280BEE7633AC6DE5EA0
4304WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\notepad.exe.5100.dmpbinary
MD5:24B301196072B9A94990E3C189770C45
SHA256:DB35C2569029C78C0F99A0AB831AC0F70EBBE9B06FA689E56197FDC52DE4FEE8
7200WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\notepad.exe(1).5100.dmpbinary
MD5:6117292453D2535ACD3E77CB0CD5564C
SHA256:9BEEC10AAA664EC04991329BD6174411131D5DF6E28CCDB32B8DC636308C0D76
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
56
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4304
WerFault.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4304
WerFault.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
624
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1500
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7452
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1500
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
864
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
2.16.110.138:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6568
14.exe
142.250.186.174:443
drive.google.com
GOOGLE
US
shared

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.16.110.138
  • 2.16.110.123
  • 2.16.110.193
  • 2.16.110.168
  • 2.16.110.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.186.46
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
drive.google.com
  • 142.250.186.174
shared
drive.usercontent.google.com
  • 172.217.16.129
whitelisted
tamerimia.ug
malicious
watson.events.data.microsoft.com
  • 20.42.73.29
whitelisted

Threats

No threats detected
No debug info