File name:

pdfcentral (1).exe

Full analysis: https://app.any.run/tasks/eca0025d-bdfe-4daf-8200-b83c1888719b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 27, 2024, 18:35:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5:

1BF2D084D3C09BFED3941FD64ED0EB4D

SHA1:

B034BB391450584C9995C5EC26C60F2B611B0769

SHA256:

0E70BE37B1205A9C7889AA7121D47C3E5054D0B327042E2762D142F0C465BD07

SSDEEP:

6144:Qbzm9ztCkNtbeoiGVCXOXxusdavobyQJih8YuQWOLCPgRr10h7H8mg4lp:QAdIoiGVCX0YvoFO8YuQT+J874lp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • pdfcentral (1).exe (PID: 4120)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • pdfcentral (1).exe (PID: 4120)
    • Checks Windows Trust Settings

      • pdfcentral (1).exe (PID: 4120)
  • INFO

    • Checks supported languages

      • pdfcentral (1).exe (PID: 4120)
    • Reads the computer name

      • pdfcentral (1).exe (PID: 4120)
    • Reads the machine GUID from the registry

      • pdfcentral (1).exe (PID: 4120)
    • The process uses the downloaded file

      • pdfcentral (1).exe (PID: 4120)
    • Creates files or folders in the user directory

      • pdfcentral (1).exe (PID: 4120)
    • Reads the software policy settings

      • pdfcentral (1).exe (PID: 4120)
    • Checks proxy server information

      • pdfcentral (1).exe (PID: 4120)
    • Reads Environment values

      • pdfcentral (1).exe (PID: 4120)
    • Disables trace logs

      • pdfcentral (1).exe (PID: 4120)
    • Create files in a temporary directory

      • pdfcentral (1).exe (PID: 4120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2041:11:19 21:59:15+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 591360
InitializedDataSize: 106496
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.9.4
ProductVersionNumber: 1.0.9.4
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: PDFCentral
FileVersion: 1.0.9.4
InternalName: PDF Central.exe
LegalCopyright: Copyright © 2022
LegalTrademarks: -
OriginalFileName: PDF Central.exe
ProductName: PDFCentral
ProductVersion: 1.0.9.4
AssemblyVersion: 1.0.9.4
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pdfcentral (1).exe

Process information

PID
CMD
Path
Indicators
Parent process
4120"C:\Users\admin\AppData\Local\Temp\pdfcentral (1).exe" C:\Users\admin\AppData\Local\Temp\pdfcentral (1).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
PDFCentral
Exit code:
0
Version:
1.0.9.4
Modules
Images
c:\users\admin\appdata\local\temp\pdfcentral (1).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
4 819
Read events
4 805
Write events
14
Delete events
0

Modification events

(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4120) pdfcentral (1).exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pdfcentral (1)_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
8
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4120pdfcentral (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_BF36EA7E332DD5EB78F882A0F14C4EABder
MD5:79D138B82C606203597D9A7EF1FE45F2
SHA256:A47F125116FAB999D0CD5B773F77B14A9C8E64CC33995EE5A1FDC7BB3738A803
4120pdfcentral (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:6B34A304A3A38A68AEB9114FEE36290A
SHA256:A30847202AC203BFEE74C764422B52C64D372AE78B9D140DA5BBB7E839BDF7E5
4120pdfcentral (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Eder
MD5:528EF3272369D473132C5D9477C70E73
SHA256:0C47BFA200F488EF5457C1ADB065BFC657FC6E2CF9B832B62F1D05838B14BA13
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\installing_cen.gifimage
MD5:C6A195D7D55AEC9A3377CC89302E09D7
SHA256:4610DCD3B167B86B89C230072AEC3A1F095F0EFABA1F913D9DBB7170E87FC40B
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\uifirstscreen.jsonbinary
MD5:F0F1AA6D4FD045044559F863AB0E4B21
SHA256:A170C2561709684FD849AACE098CD02D0215584241AEF32F6AD62EA556B3A829
4120pdfcentral (1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_BF36EA7E332DD5EB78F882A0F14C4EABbinary
MD5:3EF57423F5D38A8B222857CA12E540F1
SHA256:5F991E30580524D7ABACDFB344B7E476041279A83DFA608BD105B75CCFC86B76
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\jsonassets.jsonbinary
MD5:E3E975E10CFCB964CDE7B4849F8F55AB
SHA256:D46D20D0FB67F923DA42602542D91293BAD6E5FA73A1765D4627F50D32DDA4FA
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\uisecondscreen.jsonbinary
MD5:8F90AEC2BFD098101D6E73E0E4C28C6A
SHA256:FDF2CA75D382827AEF164651C4998A97A672D603A02A6AB5C1C903BABF6FDBA7
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\uithirdscreen.jsonbinary
MD5:6A64397D79E96F94AE6879807A89143F
SHA256:282A6D7D94F9834E27B476D9750F47CE0C2A4CDA9BAE9EC0C24243DAE61352C7
4120pdfcentral (1).exeC:\Users\admin\AppData\Local\Temp\PDF Central\favicon.icoimage
MD5:1950DC998B26282B687D2AD1DF3D3E8A
SHA256:E250E769F83B852BBFBA6CE843E89E42F09F7E0E3370454A2E1E5F1DD4907737
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4120
pdfcentral (1).exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
whitelisted
4120
pdfcentral (1).exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDEnMahvwpGPl3rI7AQ%3D%3D
unknown
whitelisted
5832
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6556
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6556
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3928
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4120
pdfcentral (1).exe
104.18.21.226:80
ocsp.globalsign.com
CLOUDFLARENET
whitelisted
4324
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3928
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5832
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 88.221.169.152
whitelisted
google.com
  • 142.250.186.142
whitelisted
ocsp.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
gpt.centixclient.com
unknown
login.live.com
  • 20.190.159.71
  • 20.190.159.0
  • 40.126.31.69
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.68
  • 40.126.31.73
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info