File name:

NXTPKIENT.exe

Full analysis: https://app.any.run/tasks/307283da-49a9-4491-b25f-b814242b9aee
Verdict: Malicious activity
Analysis date: January 19, 2024, 09:25:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

EB8D073840E95CF24C9C3F5A2B6470E0

SHA1:

2399567292F1E81630997FB4A151786D3E4938BB

SHA256:

0DD9AA5B650F519A55C96BF0DEE73162D9BA510B60521780C34811DE25CD7BB6

SSDEEP:

98304:jKOo2aRI8yRksFqyG6vi7aRysjGLIKxnRVEt2zwDC+STkbLHLIeskoNc5ZZotW5U:J5lYpXm/4x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • NXTPKIENT.exe (PID: 116)
      • NXTPKIENT.exe (PID: 548)
      • NXTPKIENT.tmp (PID: 532)
    • Actions looks like stealing of personal data

      • RegCert.exe (PID: 2808)
      • RegCert.exe (PID: 2732)
    • Steals credentials from Web Browsers

      • RegCert.exe (PID: 2808)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • NXTPKIENT.exe (PID: 116)
      • NXTPKIENT.exe (PID: 548)
      • NXTPKIENT.tmp (PID: 532)
    • Reads the Windows owner or organization settings

      • NXTPKIENT.tmp (PID: 532)
    • Reads the Internet Settings

      • NXTPKIENT.tmp (PID: 532)
    • Uses TASKKILL.EXE to kill Browsers

      • NXTPKIENT.tmp (PID: 532)
    • Uses TASKKILL.EXE to kill process

      • NXTPKIENT.tmp (PID: 532)
    • The process drops C-runtime libraries

      • NXTPKIENT.tmp (PID: 532)
    • Process drops legitimate windows executable

      • NXTPKIENT.tmp (PID: 532)
    • Executes as Windows Service

      • PWSLocalServer.exe (PID: 2260)
  • INFO

    • Checks supported languages

      • NXTPKIENT.tmp (PID: 1072)
      • NXTPKIENT.exe (PID: 116)
      • NXTPKIENT.exe (PID: 548)
      • NXTPKIENT.tmp (PID: 532)
      • wmpnscfg.exe (PID: 1504)
      • PWSLocalServer.exe (PID: 664)
      • PWSLocalServer.exe (PID: 2052)
      • RegCert.exe (PID: 2808)
      • PWSLocalServer.exe (PID: 2260)
      • Locale.exe (PID: 240)
      • RegCert.exe (PID: 2732)
    • Create files in a temporary directory

      • NXTPKIENT.exe (PID: 116)
      • NXTPKIENT.exe (PID: 548)
    • Reads the computer name

      • NXTPKIENT.tmp (PID: 1072)
      • wmpnscfg.exe (PID: 1504)
      • PWSLocalServer.exe (PID: 2052)
      • PWSLocalServer.exe (PID: 2260)
      • NXTPKIENT.tmp (PID: 532)
      • RegCert.exe (PID: 2732)
      • RegCert.exe (PID: 2808)
      • PWSLocalServer.exe (PID: 664)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1504)
    • Creates files in the program directory

      • NXTPKIENT.tmp (PID: 532)
    • Reads product name

      • PWSLocalServer.exe (PID: 664)
    • Creates files or folders in the user directory

      • NXTPKIENT.tmp (PID: 532)
      • RegCert.exe (PID: 2732)
    • Reads Environment values

      • PWSLocalServer.exe (PID: 664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (81.5)
.exe | Win32 Executable Delphi generic (10.5)
.exe | Win32 Executable (generic) (3.3)
.exe | Win16/32 Executable Delphi generic (1.5)
.exe | Generic Win/DOS Executable (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:20 00:22:17+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 41984
InitializedDataSize: 188416
UninitializedDataSize: -
EntryPoint: 0xaad0
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.2.8.9
ProductVersionNumber: 1.2.8.9
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: SGA Solutions Co.,Ltd.
FileDescription: TrustPKI Enterprise Non-ActiveX Client Setup
FileVersion: 1.2.8.9
LegalCopyright: Copyright 2015. SGA Solutions Co., Ltd. All rights reserved.
ProductName: TrustPKI Enterprise Non-ActiveX Client
ProductVersion: 1.2.8.9
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
19
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start nxtpkient.exe nxtpkient.tmp no specs nxtpkient.exe nxtpkient.tmp wmpnscfg.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs pwslocalserver.exe no specs pwslocalserver.exe no specs regcert.exe pwslocalserver.exe regcert.exe locale.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe" C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe
explorer.exe
User:
admin
Company:
SGA Solutions Co.,Ltd.
Integrity Level:
MEDIUM
Description:
TrustPKI Enterprise Non-ActiveX Client Setup
Exit code:
0
Version:
1.2.8.9
Modules
Images
c:\users\admin\appdata\local\temp\nxtpkient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
240"C:\Program Files\EPS\Lib\Support\Locale.exe" C:\Program Files\EPS\Lib\Support\Locale.exeNXTPKIENT.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\eps\lib\support\locale.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
532"C:\Users\admin\AppData\Local\Temp\is-48MK5.tmp\NXTPKIENT.tmp" /SL5="$90102,6291726,231424,C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe" /SPAWNWND=$401AE /NOTIFYWND=$301AA C:\Users\admin\AppData\Local\Temp\is-48MK5.tmp\NXTPKIENT.tmp
NXTPKIENT.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-48mk5.tmp\nxtpkient.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
548"C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe" /SPAWNWND=$401AE /NOTIFYWND=$301AA C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe
NXTPKIENT.tmp
User:
admin
Company:
SGA Solutions Co.,Ltd.
Integrity Level:
HIGH
Description:
TrustPKI Enterprise Non-ActiveX Client Setup
Exit code:
0
Version:
1.2.8.9
Modules
Images
c:\users\admin\appdata\local\temp\nxtpkient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
584"C:\Windows\System32\taskkill.exe" /F /IM iexplore.exeC:\Windows\System32\taskkill.exeNXTPKIENT.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
664"C:\Program Files\EPS\Lib\Support\PWSLocalServer.exe" iC:\Program Files\EPS\Lib\Support\PWSLocalServer.exeNXTPKIENT.tmp
User:
admin
Company:
SGA Solutions
Integrity Level:
HIGH
Description:
SGA Solutions Client Support Service
Exit code:
0
Version:
1.1.11.6
Modules
Images
c:\program files\eps\lib\support\pwslocalserver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
796"C:\Windows\System32\taskkill.exe" /F /IM MicrosoftEdge.exeC:\Windows\System32\taskkill.exeNXTPKIENT.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1072"C:\Users\admin\AppData\Local\Temp\is-MBSOG.tmp\NXTPKIENT.tmp" /SL5="$301AA,6291726,231424,C:\Users\admin\AppData\Local\Temp\NXTPKIENT.exe" C:\Users\admin\AppData\Local\Temp\is-MBSOG.tmp\NXTPKIENT.tmpNXTPKIENT.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-mbsog.tmp\nxtpkient.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1232"C:\Windows\System32\taskkill.exe" /F /IM NXTPKIENTSI.exeC:\Windows\System32\taskkill.exeNXTPKIENT.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1504"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
4 076
Read events
4 043
Write events
27
Delete events
6

Modification events

(PID) Process:(532) NXTPKIENT.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(532) NXTPKIENT.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(532) NXTPKIENT.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(532) NXTPKIENT.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2808) RegCert.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(240) Locale.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CodePage
Operation:writeName:ACP
Value:
1252
(PID) Process:(240) Locale.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CodePage
Operation:writeName:MACCP
Value:
10000
(PID) Process:(240) Locale.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CodePage
Operation:writeName:OEMCP
Value:
437
(PID) Process:(240) Locale.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language
Operation:writeName:Default
Value:
0409
(PID) Process:(240) Locale.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale
Operation:writeName:(Default)
Value:
00000409
Executable files
52
Suspicious files
126
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\nxpki\nxtpkient\unins000.exeexecutable
MD5:DAB6CBC9D927DE60094A166574FA78B0
SHA256:22864A57B38F2E472A49B88F15AD0976109F542E64536918F5693B2744EFB3EE
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\nspr4.dllexecutable
MD5:B5926F91E6818F2C89E9C344D2942A9C
SHA256:8D50E30528A6598B980B3D0FF9119B99B2564FA4E39936C9308F954F2AB406AD
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\is-MMO2U.tmpexecutable
MD5:8E06FAE8E03485A85D5A12C7BDDD9726
SHA256:05CC3E5D9025A8836DD19099850C416633832BC729307E3187D43278A2C10BA5
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\freebl3.dllexecutable
MD5:44F35E5C41DB978B03F132A99B5AB6A9
SHA256:6585D2E22389C024BF427A2C3B91990BECAEBC963E8119927552CB2925B62DC4
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\is-J58KP.tmpexecutable
MD5:B5926F91E6818F2C89E9C344D2942A9C
SHA256:8D50E30528A6598B980B3D0FF9119B99B2564FA4E39936C9308F954F2AB406AD
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\nssdbm3.dllexecutable
MD5:B8BFA221CA654A49D946305A7862F66B
SHA256:B924448FE2F75E525556F9EF60AECA326A082BD56816E1605EFCED0412187446
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\is-86OLV.tmpexecutable
MD5:B8BFA221CA654A49D946305A7862F66B
SHA256:B924448FE2F75E525556F9EF60AECA326A082BD56816E1605EFCED0412187446
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\mfc110.dllexecutable
MD5:19D292B0D8D417C90440B41AEFD8A38E
SHA256:8809265003CC78CC7BFE708D0140F4045C86B2379B49B1B772EB25DF1A27E1BE
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\Support\is-IGQ23.tmpexecutable
MD5:041648679A243407C234A5B2983BEF14
SHA256:BAE119709C87E3168F1604A255873EB4631D87DE5819A4EFADDC2F792F5D490F
532NXTPKIENT.tmpC:\Program Files\EPS\Lib\nxpki\nxtpkient\is-V889M.tmpexecutable
MD5:DAB6CBC9D927DE60094A166574FA78B0
SHA256:22864A57B38F2E472A49B88F15AD0976109F542E64536918F5693B2744EFB3EE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
Process
Message
PWSLocalServer.exe
·Î±× ¼³Á¤ ÆÄÀÏÀÌ ¾ø½À´Ï´Ù.