File name:

htpe7.exe

Full analysis: https://app.any.run/tasks/b71f0c6d-85b7-4df7-b85f-e725b598f37a
Verdict: Malicious activity
Analysis date: June 27, 2024, 04:59:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

29A0694490619235ADE01FFC130865FF

SHA1:

FC0C4AD65E13694F9AF4CA8A800EE1931DFC83AC

SHA256:

0E1B2ED27B426A09A35E60E8D79413C6FEE4E98646FEFCA8F7AA319A2A493180

SSDEEP:

98304:VVm1Q9leql9qEPG6cq0U4NSjCmJfh71NOkY3LVtliPUNWoTHZ9mSmadGoGy9woo2:LmwpesJaOOZiJd89

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Creates a writable file in the system directory

      • htpe7.exe (PID: 3708)
    • Drops the executable file immediately after the start

      • htpe7.exe (PID: 3708)
      • vcredist_x86.exe (PID: 1476)
      • msiexec.exe (PID: 1324)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 3100)
    • Searches for installed software

      • dllhost.exe (PID: 3484)
      • htpe7.exe (PID: 3708)
    • Process drops legitimate windows executable

      • htpe7.exe (PID: 3708)
      • vcredist_x86.exe (PID: 1476)
      • msiexec.exe (PID: 1324)
    • Executable content was dropped or overwritten

      • htpe7.exe (PID: 3708)
      • vcredist_x86.exe (PID: 1476)
    • Reads security settings of Internet Explorer

      • htpe7.exe (PID: 3708)
    • Reads the Internet Settings

      • htpe7.exe (PID: 3708)
    • Creates file in the systems drive root

      • msiexec.exe (PID: 1324)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 1324)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 1324)
    • Uses ICACLS.EXE to modify access control lists

      • htpe7.exe (PID: 3708)
    • Creates a software uninstall entry

      • htpe7.exe (PID: 3708)
    • Creates/Modifies COM task schedule object

      • htpe7.exe (PID: 3708)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 1324)
  • INFO

    • Checks supported languages

      • htpe7.exe (PID: 3708)
      • install.exe (PID: 2544)
      • msiexec.exe (PID: 1324)
      • vcredist_x86.exe (PID: 1476)
      • HyperTrm.exe (PID: 1524)
      • HyperTrm.exe (PID: 2064)
    • Reads the computer name

      • htpe7.exe (PID: 3708)
      • install.exe (PID: 2544)
      • vcredist_x86.exe (PID: 1476)
      • msiexec.exe (PID: 1324)
      • HyperTrm.exe (PID: 2064)
    • Create files in a temporary directory

      • htpe7.exe (PID: 3708)
      • install.exe (PID: 2544)
      • msiexec.exe (PID: 1324)
    • Creates files in the program directory

      • htpe7.exe (PID: 3708)
      • HyperTrm.exe (PID: 1524)
    • Reads the machine GUID from the registry

      • htpe7.exe (PID: 3708)
      • install.exe (PID: 2544)
      • vcredist_x86.exe (PID: 1476)
      • HyperTrm.exe (PID: 1524)
      • msiexec.exe (PID: 1324)
      • HyperTrm.exe (PID: 2064)
    • Reads Environment values

      • vcredist_x86.exe (PID: 1476)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1324)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 1324)
    • Manual execution by a user

      • HyperTrm.exe (PID: 2064)
    • Reads the software policy settings

      • msiexec.exe (PID: 1324)
    • Disables trace logs

      • HyperTrm.exe (PID: 2064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Wise Installer executable (91.7)
.exe | Win64 Executable (generic) (5.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2001:08:13 17:13:38+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, Removable run from swap
PEType: PE32
LinkerVersion: 6
CodeSize: 8704
InitializedDataSize: 5632
UninitializedDataSize: -
EntryPoint: 0x21af
OSVersion: 4
ImageVersion: 4
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 7.0.0.0
ProductVersionNumber: 7.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Hilgraeve, Inc.
FileDescription: HyperTerminal Private Edition
FileVersion: 7
LegalCopyright: Copyright © 2001 Hilgraeve Inc.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
11
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start htpe7.exe vssvc.exe no specs SPPSurrogate no specs vcredist_x86.exe install.exe no specs msiexec.exe cacls.exe no specs hypertrm.exe no specs cacls.exe no specs hypertrm.exe no specs htpe7.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Windows\System32\cacls.exe" "C:\Program Files\HyperTerminal" /E /G Users:FC:\Windows\System32\cacls.exehtpe7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
1324C:\Windows\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1476"C:\PROGRA~1\HYPERT~1\VCREDI~1.EXE" /q:aC:\Program Files\HyperTerminal\vcredist_x86.exe
htpe7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2008 Redistributable Setup
Exit code:
0
Version:
9.0.21022.08
Modules
Images
c:\program files\hyperterminal\vcredist_x86.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1524"C:\PROGRA~1\HYPERT~1\HyperTrm.exe" -initializeTrialC:\Program Files\HyperTerminal\HyperTrm.exehtpe7.exe
User:
admin
Company:
Hilgraeve, Inc.
Integrity Level:
HIGH
Description:
HyperTerminal Applet
Exit code:
0
Version:
7.03
Modules
Images
c:\program files\hyperterminal\hypertrm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\hyperterminal\hypertrm.dll
c:\windows\system32\tapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2064"C:\Program Files\HyperTerminal\HyperTrm.exe" C:\Program Files\HyperTerminal\HyperTrm.exeexplorer.exe
User:
admin
Company:
Hilgraeve, Inc.
Integrity Level:
MEDIUM
Description:
HyperTerminal Applet
Version:
7.03
Modules
Images
c:\program files\hyperterminal\hypertrm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\hyperterminal\hypertrm.dll
c:\windows\system32\tapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2544c:\ae5def1464470c7d237436feebdf7c\.\install.exe /q:aC:\ae5def1464470c7d237436feebdf7c\install.exevcredist_x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
External Installer
Exit code:
0
Version:
9.0.21022.8 built by: RTM
Modules
Images
c:\ae5def1464470c7d237436feebdf7c\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2692"C:\Windows\System32\cacls.exe" hg_dbh.lic /E /G Users:WC:\Windows\System32\cacls.exehtpe7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
3100C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3392"C:\Users\admin\AppData\Local\Temp\htpe7.exe" C:\Users\admin\AppData\Local\Temp\htpe7.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\htpe7.exe
c:\windows\system32\ntdll.dll
3484C:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
10 710
Read events
10 304
Write events
394
Delete events
12

Modification events

(PID) Process:(3708) htpe7.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000C200EEBF4EC8DA017C0E0000840C0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3708) htpe7.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000C200EEBF4EC8DA017C0E0000840C0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3708) htpe7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
75
(PID) Process:(3708) htpe7.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4000000000000000D495A5C04EC8DA017C0E0000840C0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3708) htpe7.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000D495A5C04EC8DA017C0E0000580C0000E803000001000000000000000000000066EF61B9348D3440AF7C12AC64267B680000000000000000
(PID) Process:(3100) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000003C1FAFC04EC8DA011C0C00002C080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3100) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000003C1FAFC04EC8DA011C0C0000240B0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3100) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000003C1FAFC04EC8DA011C0C0000800B0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3100) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000003C1FAFC04EC8DA011C0C0000140A0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3100) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
40000000000000009681B1C04EC8DA011C0C00002C080000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
Executable files
62
Suspicious files
39
Text files
45
Unknown types
1

Dropped files

PID
Process
Filename
Type
3484dllhost.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.3082.dllexecutable
MD5:41BB37A347121F3E5E88D85100638B79
SHA256:320C305177AB4EC6E00883A2CF0886019B5D36557219E4A188CF9DF3768F157F
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.1040.dllexecutable
MD5:6310AB8FC9E3DBEE80592FC453A34FEE
SHA256:7774F2436C96A70B0CDC8176883EE7A4614353F17AD61BFBD5A8D7A1906483D3
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.1042.dllexecutable
MD5:0D4FB4095EA49C1EC89B9E8DB0B936A3
SHA256:7D86F3BA0232C2AC4B4FCE96E4CEBB23700312A032D5D0DB988EC6B358BE1686
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.2052.dllexecutable
MD5:D7366B34E8AFB605C39EF56E2201FE85
SHA256:F7AA6EBF1413A6E4816BCAD5B77C47B6BBE0CFC05CAFDE4AA872ABE3FBD5E62B
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\vc_red.msiexecutable
MD5:E0951D3CB1038EB2D2B2B2F336E1AB32
SHA256:507AC60E145057764F13CF1AD5366A7E15DDC0DA5CC22216F69E3482697D5E88
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.1033.dllexecutable
MD5:9EDEB8B1C5C0A4CD3A3016B85108127D
SHA256:9BF7026A47DAAB7BB2948FD23E8CF42C06DD2E19EF8CDEA0AF7367453674A8F9
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.exeexecutable
MD5:520A6D1CBCC9CF642C625FE814C93C58
SHA256:08966CE743AA1CBED0874933E104EF7B913188ECD8F0C679F7D8378516C51DA2
3708htpe7.exeC:\Users\admin\AppData\Local\Temp\GLCE461.tmpexecutable
MD5:09E59D00DF5D2EFFD8DD9B30385CB9D2
SHA256:1C574EAB5E83CCFE5A0BB7B59E028CC5FA2F4E77868051E305D83C709711FF77
1476vcredist_x86.exeC:\ae5def1464470c7d237436feebdf7c\install.res.1041.dllexecutable
MD5:13ED4517152203DE4BC52ACC0255D952
SHA256:6183324FE24006BC3D8928029DCACCBDAE517EB09727F5DD47EA5AAEED3EE26D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
12
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
2.16.100.168:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1372
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1060
svchost.exe
GET
304
2.19.126.163:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8f69642324cc87bd
unknown
unknown
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
1372
svchost.exe
52.140.118.28:443
MICROSOFT-CORP-MSN-AS-BLOCK
IN
unknown
1060
svchost.exe
224.0.0.252:5355
unknown
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
2.16.100.168:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
whitelisted
1372
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown
1060
svchost.exe
2.19.126.163:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
ctldl.windowsupdate.com
  • 2.16.100.168
  • 88.221.110.91
  • 2.19.126.163
  • 2.19.126.137
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted

Threats

No threats detected
No debug info