File name:

adb.exe

Full analysis: https://app.any.run/tasks/ee0369c7-c4e8-4e14-815f-b89dea096633
Verdict: Malicious activity
Analysis date: August 08, 2024, 14:45:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
MD5:

F6F4057FD2EA6E725B955F77BAE44E6B

SHA1:

566E72E3BC16CFB1E4B9B5363A8BFC9179365C97

SHA256:

095D58E5D1E97F37932616430C223615A6E4A3EF36B96B62D85E044B2B5226D2

SSDEEP:

49152:5cSmLvvcdiZjxyDemxIpGfrwxhDqWLTEDQ53q12XWzHlELa7gpMIGZ7iD1f0L/67:5cSmLHcdiLyimxIpGT49ny1odmQ5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • adb.exe (PID: 6468)
      • explorer.exe (PID: 6592)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 6592)
      • svchost.exe (PID: 6636)
    • Changes appearance of the Explorer extensions

      • explorer.exe (PID: 6592)
      • svchost.exe (PID: 6636)
  • SUSPICIOUS

    • Starts itself from another location

      • adb.exe (PID: 6468)
      • icsys.icn.exe (PID: 6500)
      • explorer.exe (PID: 6592)
      • spoolsv.exe (PID: 6616)
      • svchost.exe (PID: 6636)
    • Starts application with an unusual extension

      • adb.exe (PID: 6468)
    • Executable content was dropped or overwritten

      • adb.exe (PID: 6468)
      • icsys.icn.exe (PID: 6500)
      • explorer.exe (PID: 6592)
      • spoolsv.exe (PID: 6616)
    • The process creates files with name similar to system file names

      • icsys.icn.exe (PID: 6500)
      • spoolsv.exe (PID: 6616)
    • Drops the executable file immediately after the start

      • icsys.icn.exe (PID: 6500)
      • spoolsv.exe (PID: 6616)
    • Creates or modifies Windows services

      • svchost.exe (PID: 6636)
  • INFO

    • Checks supported languages

      • adb.exe (PID: 6468)
      • adb.exe  (PID: 6492)
      • icsys.icn.exe (PID: 6500)
      • explorer.exe (PID: 6592)
      • spoolsv.exe (PID: 6616)
      • spoolsv.exe (PID: 6656)
      • svchost.exe (PID: 6636)
    • Create files in a temporary directory

      • icsys.icn.exe (PID: 6500)
      • adb.exe (PID: 6468)
      • explorer.exe (PID: 6592)
      • spoolsv.exe (PID: 6616)
      • svchost.exe (PID: 6636)
      • spoolsv.exe (PID: 6656)
    • Reads the computer name

      • svchost.exe (PID: 6636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:04:01 07:08:22+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 106496
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x290c
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: Project1
FileVersion: 1
ProductVersion: 1
InternalName: TJprojMain
OriginalFileName: TJprojMain.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
10
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start adb.exe adb.exe  no specs icsys.icn.exe conhost.exe no specs explorer.exe spoolsv.exe svchost.exe spoolsv.exe no specs rundll32.exe no specs adb.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3276C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6420"C:\Users\admin\AppData\Local\Temp\adb.exe" C:\Users\admin\AppData\Local\Temp\adb.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\adb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6468"C:\Users\admin\AppData\Local\Temp\adb.exe" C:\Users\admin\AppData\Local\Temp\adb.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\adb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6492c:\users\admin\appdata\local\temp\adb.exe  C:\Users\admin\AppData\Local\Temp\adb.exe adb.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225781
Modules
Images
c:\users\admin\appdata\local\temp\adb.exe 
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6500C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe
adb.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\themes\icsys.icn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6508\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeadb.exe 
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6592c:\windows\resources\themes\explorer.exeC:\Windows\Resources\Themes\explorer.exe
icsys.icn.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\windows\resources\themes\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6616c:\windows\resources\spoolsv.exe SEC:\Windows\Resources\spoolsv.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\spoolsv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6636c:\windows\resources\svchost.exeC:\Windows\Resources\svchost.exe
spoolsv.exe
User:
admin
Integrity Level:
HIGH
Version:
1.00
Modules
Images
c:\windows\resources\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6656c:\windows\resources\spoolsv.exe PRC:\Windows\Resources\spoolsv.exesvchost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\spoolsv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
Total events
814
Read events
788
Write events
22
Delete events
4

Modification events

(PID) Process:(6468) adb.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(6500) icsys.icn.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(6592) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Explorer
Value:
c:\windows\resources\themes\explorer.exe RO
(PID) Process:(6592) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Svchost
Value:
c:\windows\resources\svchost.exe RO
(PID) Process:(6592) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Explorer
Value:
(PID) Process:(6592) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Svchost
Value:
(PID) Process:(6636) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Explorer
Value:
c:\windows\resources\themes\explorer.exe RO
(PID) Process:(6636) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Svchost
Value:
c:\windows\resources\svchost.exe RO
(PID) Process:(6636) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Explorer
Value:
(PID) Process:(6636) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Svchost
Value:
Executable files
5
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6468adb.exeC:\Windows\Resources\Themes\icsys.icn.exeexecutable
MD5:D83FC43A155E11A69D271436E26E5F2C
SHA256:B03A6DD4C0F50DF5D2A64228C726A5D2896245BAF6059E8023217EE8BDAAAB32
6500icsys.icn.exeC:\Users\admin\AppData\Local\Temp\~DFA69F43045409D8E0.TMPbinary
MD5:D0F1005E6F190DAE920BBB58F6D14EE1
SHA256:D818C22B2F2816E7619FC1A2AB1A70ECB49E4B2FB73D0BEA41D01A6D7C9A03E0
6500icsys.icn.exeC:\Windows\Resources\Themes\explorer.exeexecutable
MD5:FCD74B49270147C9EE6E13FCB7DAD454
SHA256:F7BA9F3DBF785A838F171E3CCD3C499F1B93A5F928E9CBFBDB0F7B2723F38131
6616spoolsv.exeC:\Users\admin\AppData\Local\Temp\~DF81BFABBAEB6BD867.TMPbinary
MD5:25EF9D35E5C5174EABD76856A5E4FF03
SHA256:5E773B85CAF5951D6A224F155D552C83C918A3B1E2D9C5A30983891A6A008B72
6616spoolsv.exeC:\Windows\Resources\svchost.exeexecutable
MD5:CC254CE5B04A47E909631F3F6BC82249
SHA256:ECEE7FCFB0C4A9A5817CA1B25DF47B1832879A84183D66E49A3BE222C9D01B65
6468adb.exeC:\Users\admin\AppData\Local\Temp\~DF8F944F062F3740CF.TMPbinary
MD5:5A9E4E1CB2CCB35F3F7784F63BD2641A
SHA256:CA0955475F31BEB7B6FE49EFB56E9CD21E9D7DDFF81A8276F4B9C81A56395BD7
6468adb.exeC:\Users\admin\AppData\Local\Temp\adb.exe executable
MD5:2A13FE2F7D35306560142073A8AE4F78
SHA256:EC03A3A861D036A7C6524CFEBA7B5C03B8BE9849354160CBCAFEC82EBE0F7BEF
6592explorer.exeC:\Windows\Resources\spoolsv.exeexecutable
MD5:D2A0C7B6212482DEFD137D01B9753636
SHA256:F2FEAE6309A1CC8199341D27582E47E74FD3E8AC5A01934E615A2C2C9D322406
6656spoolsv.exeC:\Users\admin\AppData\Local\Temp\~DF9449AF8D3A310DD5.TMPbinary
MD5:5890742B12E1553804851045E25F8F76
SHA256:9C69916C31A1B2A66B490CA2C69AB6999B20B67ECFB83001482BFFBE8F893458
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
49
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7020
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7072
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4080
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4936
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4080
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5336
SearchApp.exe
184.86.251.8:443
www.bing.com
Akamai International B.V.
DE
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5552
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 20.73.194.208
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.bing.com
  • 184.86.251.8
  • 184.86.251.19
  • 184.86.251.11
  • 184.86.251.22
  • 184.86.251.15
  • 184.86.251.20
  • 184.86.251.14
  • 184.86.251.24
  • 184.86.251.21
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.71
  • 40.126.31.69
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
th.bing.com
  • 184.86.251.21
  • 184.86.251.8
  • 184.86.251.19
  • 184.86.251.11
  • 184.86.251.22
  • 184.86.251.15
  • 184.86.251.20
  • 184.86.251.14
  • 184.86.251.24
  • 184.86.251.30
  • 184.86.251.4
  • 184.86.251.5
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
  • 20.74.47.205
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
r.bing.com
  • 184.86.251.27
  • 184.86.251.30
  • 184.86.251.4
  • 184.86.251.5
  • 184.86.251.20
  • 184.86.251.22
  • 184.86.251.14
  • 184.86.251.8
  • 184.86.251.19
whitelisted

Threats

No threats detected
No debug info