File name:

0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e

Full analysis: https://app.any.run/tasks/a6f0e210-de0c-4841-b696-8a85fcc4d101
Verdict: Malicious activity
Analysis date: May 10, 2025, 02:23:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

3D83E1B11AF889B1EA0688A7614DDE93

SHA1:

81755D20145798CD017F71BB31DED2A31A76DB65

SHA256:

0E5014BE012D387DA96017FAAA83A41323DF83B0A0E8AFA978D882E0AFF0709E

SSDEEP:

49152:DRnuBD7tSq0QcNj+NM2bm5JcxboHf2ZIfDdLc3LVd4Z/c5GdgCB2hgvRzpg5fVBa:NuBftSXNj+NM2bm5JcxboHf2ZCDdLc3g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • Thebesian.exe (PID: 6040)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
    • Starts itself from another location

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
    • Executes application which crashes

      • Thebesian.exe (PID: 6040)
      • Thebesian.exe (PID: 4488)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6736)
  • INFO

    • The sample compiled with english language support

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
    • Reads mouse settings

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
      • Thebesian.exe (PID: 6040)
      • Thebesian.exe (PID: 4488)
    • Checks supported languages

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
      • Thebesian.exe (PID: 6040)
      • Thebesian.exe (PID: 4488)
    • Create files in a temporary directory

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
      • Thebesian.exe (PID: 6040)
      • Thebesian.exe (PID: 4488)
    • Reads the machine GUID from the registry

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
    • Creates files or folders in the user directory

      • 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe (PID: 2656)
      • Thebesian.exe (PID: 6040)
      • WerFault.exe (PID: 4608)
      • WerFault.exe (PID: 6768)
    • Auto-launch of the file from Startup directory

      • Thebesian.exe (PID: 6040)
    • Manual execution by a user

      • wscript.exe (PID: 6736)
    • Reads the software policy settings

      • slui.exe (PID: 4776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:28 01:40:23+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 570880
InitializedDataSize: 672256
UninitializedDataSize: -
EntryPoint: 0x25f74
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
11
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe thebesian.exe sppextcomobj.exe no specs slui.exe svchost.exe no specs werfault.exe no specs wscript.exe no specs thebesian.exe svchost.exe no specs werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2656"C:\Users\admin\AppData\Local\Temp\0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe" C:\Users\admin\AppData\Local\Temp\0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
4112"C:\Users\admin\AppData\Local\jailkeeper\Thebesian.exe" C:\Windows\SysWOW64\svchost.exeThebesian.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
4488"C:\Users\admin\AppData\Local\jailkeeper\Thebesian.exe" C:\Users\admin\AppData\Local\jailkeeper\Thebesian.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\jailkeeper\thebesian.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
4608C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6040 -s 756C:\Windows\SysWOW64\WerFault.exeThebesian.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4776"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4944C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4996"C:\Users\admin\AppData\Local\Temp\0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe" C:\Windows\SysWOW64\svchost.exeThebesian.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6040"C:\Users\admin\AppData\Local\Temp\0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe" C:\Users\admin\AppData\Local\jailkeeper\Thebesian.exe
0e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\jailkeeper\thebesian.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6248C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6736wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Thebesian.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 415
Read events
4 415
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
11
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Thebesian.exe_72f34bcf0962f24fcbb432dabd19c7cee9318b_6dd2e025_d77c5759-04a9-433f-a611-ea366ad42251\Report.wer
MD5:
SHA256:
6768WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Thebesian.exe_72f34bcf0962f24fcbb432dabd19c7cee9318b_6dd2e025_f5cbaad6-a4b9-4d4b-8205-4f5abb4a9b7d\Report.wer
MD5:
SHA256:
26560e5014be012d387da96017faaa83a41323df83b0a0e8afa978d882e0aff0709e.exeC:\Users\admin\AppData\Local\Temp\autB2B8.tmpbinary
MD5:3E8E9E9534AE080CE45905031AE916F2
SHA256:D8BC16029541715861AD73A33C3D99357AD3032D387D7E7E011D440D7F44162B
4608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC17F.tmp.xmlxml
MD5:1D7DA731980350D5849E5E62AAE7CC1F
SHA256:D61258CF030C252F58B9D3D3ED11533D54FF50457344F7C023AE4B3CE9E58CF6
6040Thebesian.exeC:\Users\admin\AppData\Local\Temp\autB642.tmpbinary
MD5:3E8E9E9534AE080CE45905031AE916F2
SHA256:D8BC16029541715861AD73A33C3D99357AD3032D387D7E7E011D440D7F44162B
6768WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDC98.tmp.xmlxml
MD5:F3C34EE739E7A070CBA25773636F2F76
SHA256:C6B7C751766E54C2136312CD4EAEC28B924042F3C09D6172520FDB7F2CAF2333
6040Thebesian.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Thebesian.vbsbinary
MD5:134E1C1D8E2369BE18742AA105F09B3B
SHA256:37D31B4FE28CF40AE6C98643844AB21550FAA426C634CD0926CAB73C38588157
4608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC14F.tmp.WERInternalMetadata.xmlbinary
MD5:824F1E734E2EAB4DB6F4508EB86D7B52
SHA256:FA04E8F8471EDC7DA143A7E5C40EDE3DD6EEDD73804C1C0713CB0A1FC89E30AF
6768WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD880.tmp.dmpbinary
MD5:B0A9AD1103306D69D0769DF292D7DE88
SHA256:325401ABBF4FDBD81E82F9BA6BC02ABFC4420AE5631E389AF3F76D3C99CD9B81
4608WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBFF6.tmp.dmpbinary
MD5:0254C2D40FE7C0B0B3C76E756028EAD4
SHA256:469F9E173B659BEA83AB274288AF021C9E09672938768C848BC18927E9F54814
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5956
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5956
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5956
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.130
  • 40.126.31.3
  • 20.190.159.129
  • 20.190.159.73
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info