File name:

0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41

Full analysis: https://app.any.run/tasks/b7938ad4-aa79-468e-89e6-2b65542d3669
Verdict: Malicious activity
Analysis date: January 10, 2025, 19:44:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

B87FEAB8388D5E4F18BD4D19D6986519

SHA1:

79EF704B097482DC3B3C7825F190800825BD057B

SHA256:

0E9E05A5308E8758C59CD4EC8F50E5A3ABD14CBE4CB8C3E7CDAFAC959E409E41

SSDEEP:

49152:ZHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZi:mAGQX21RBt7QjTmcaTH/vU4do9Pcjq1M

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes application which crashes

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
  • INFO

    • Reads mouse settings

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
    • Checks proxy server information

      • WerFault.exe (PID: 6396)
    • Create files in a temporary directory

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
    • Checks supported languages

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
    • The sample compiled with english language support

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
    • Reads the software policy settings

      • WerFault.exe (PID: 6396)
    • The process uses AutoIt

      • 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe (PID: 5628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:04 00:37:48+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 631808
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
5628"C:\Users\admin\AppData\Local\Temp\0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe" C:\Users\admin\AppData\Local\Temp\0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6396C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5628 -s 772C:\Windows\SysWOW64\WerFault.exe
0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\twinapi.appcore.dll
c:\windows\syswow64\policymanager.dll
c:\windows\syswow64\winhttp.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\ondemandconnroutehelper.dll
c:\windows\syswow64\mswsock.dll
c:\windows\syswow64\iphlpapi.dll
c:\windows\syswow64\winnsi.dll
c:\windows\syswow64\nsi.dll
c:\windows\syswow64\dhcpcsvc6.dll
Total events
681
Read events
681
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
8
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6396WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_0e9e05a5308e8758_567c7ff8721df25e2dfc7442f9129657812ef_a2f5a710_7c953817-c5c6-40fe-ba99-c7e728619d1d\Report.wer
MD5:
SHA256:
6396WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5A3A.tmp.WERInternalMetadata.xmlxml
MD5:32AD0C65560C016B2887C71071A4A10C
SHA256:8C030E68199B28738A4DEC7D6002CEE2AB0AE8881C1F821DDFB8469764DDB32A
6396WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5AA8.tmp.xmlxml
MD5:96623B22405D7F2B3410A2D6DE42CE4C
SHA256:40FE004732554AFFA1C5002FDBA5CBB49226202CF80CD536153D8EE0846B4F9E
6396WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5883.tmp.dmpbinary
MD5:F7EAB4BBE8B5E88E925A4B930545B426
SHA256:1053E435EAB62020C476DBA7F88B3BF8FA402B769BE6A97DA1EBF718ACA5AFA2
6396WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6396WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:9315AC4053BDC062B7919B9F15B87945
SHA256:34EFBE787C5E366A42E835AA84FD5380AE9F104B96E2BB5306FB3D4684158B22
6396WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:CFCD938358A84C577977CABCCE6BBA01
SHA256:BCD5CD79A083B6690937C081CFF7E205C58899C3DF6D738E5B70A6F327317868
6396WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6396WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\0e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exe.5628.dmpbinary
MD5:371C3646C52D7614F99C548A1823E6D4
SHA256:B45B174BAFD724676C729BCB5F19F4DF70DB1780DB75B439B0C2576F9BE8793F
56280e9e05a5308e8758c59cd4ec8f50e5a3abd14cbe4cb8c3e7cdafac959e409e41.exeC:\Users\admin\AppData\Local\Temp\carryoverbinary
MD5:5AC25D358D028027C56F1B17A540F4FF
SHA256:D26F55BC7F352CCD6F5CE2FB464CB56C65FC82BC3332BA16F87D6BF4B8D5789B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
36
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6396
WerFault.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6396
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6168
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6396
WerFault.exe
20.42.65.92:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.133
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.76
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.138
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
watson.events.data.microsoft.com
  • 20.42.65.92
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
No debug info