File name:

aware.exe

Full analysis: https://app.any.run/tasks/b7cf2637-3012-49e8-b699-9d6175e213e6
Verdict: Malicious activity
Analysis date: July 29, 2024, 18:39:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
python
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

FBF0BE4982E039E378701886251A9B70

SHA1:

97ACC530CBF1465B0F8EF3B0E008B7CA6244F383

SHA256:

0F4D50795011EDCE186C6C29FED8ACC484BDF8AEABDBB2BBD0B1C0F702D90B68

SSDEEP:

98304:jl70XCPKG8jgBRIH9GgTwlgqyjH15PO+WIwBb7LQA96lDHdMvAP7rGqdj/0uQIb0:jUU/VOmpGujpX9J3mZ52D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • aware.exe (PID: 6652)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • aware.exe (PID: 6652)
    • Process drops python dynamic module

      • aware.exe (PID: 6652)
    • Process drops legitimate windows executable

      • aware.exe (PID: 6652)
    • Application launched itself

      • aware.exe (PID: 6652)
    • Loads Python modules

      • aware.exe (PID: 5392)
    • The process drops C-runtime libraries

      • aware.exe (PID: 6652)
  • INFO

    • Create files in a temporary directory

      • aware.exe (PID: 6652)
    • Checks proxy server information

      • aware.exe (PID: 5392)
    • Reads the computer name

      • aware.exe (PID: 6652)
      • aware.exe (PID: 5392)
    • Attempting to use instant messaging service

      • aware.exe (PID: 5392)
    • Checks supported languages

      • aware.exe (PID: 5392)
      • aware.exe (PID: 6652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:07:29 18:38:04+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 172032
InitializedDataSize: 151040
UninitializedDataSize: -
EntryPoint: 0xb220
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start aware.exe conhost.exe no specs aware.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2816C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\sppc.dll
5392"C:\Users\admin\Desktop\aware.exe" C:\Users\admin\Desktop\aware.exe
aware.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\aware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6652"C:\Users\admin\Desktop\aware.exe" C:\Users\admin\Desktop\aware.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\aware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeaware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
666
Read events
666
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_hashlib.pydexecutable
MD5:A6B1C589B11891F3E0EF655FA552A916
SHA256:2BC94748820B9367190EA95B3ED9E13B01C4BB2B2E018913993F626F5D02A938
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_decimal.pydexecutable
MD5:51BFE958ACED79746ED21CEB3FEBA6F6
SHA256:BA5547229BF1DCA72BDB950AE27EE19EAF9F62C401A7D179FB6E5F3BDB9D31BA
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_ssl.pydexecutable
MD5:F41F0E84A9B45F94DB9269E72E8481F9
SHA256:21AE364A3ABCE77B624EBA0B0B6E5E7D07EBBFC2108A38B3CEB7E9C9086C42D0
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_ctypes.pydexecutable
MD5:E72BDB1F065056F3D7068219592C7100
SHA256:C17904B56720E127E910AC9071D6B402686DEA682B885910502CA35AD236F7FF
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_socket.pydexecutable
MD5:54033C133DCE045E7BA56C8DAFB5A333
SHA256:BC9BF1DBCEEFAD62216F14968F4617AD6D6E526481F02A13D3220E9159B9DDF6
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_queue.pydexecutable
MD5:B5B5A5E8720D50AD91E06CDACEC3D5A4
SHA256:AB437EFBE3F1C8BFEA5DEDA1613DF0EC8161E94A0852E8DF35CD9ECAACB8EA43
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_lzma.pydexecutable
MD5:FAC68969E35EDBFBF31F0D127459CEDF
SHA256:320024CFBFA7C6E992C80D00773AD221A28CE8029763CA85798803280EBAB300
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\_bz2.pydexecutable
MD5:48D518E37202553414F2192D78CEFB58
SHA256:419AC8C3795F8BFA9363ADD917E477CAA1C0CE7139FA0903E8F4863166F907E9
6652aware.exeC:\Users\admin\AppData\Local\Temp\_MEI66522\api-ms-win-core-interlocked-l1-1-0.dllexecutable
MD5:89453664A8199E303A4DF2DA62CDF584
SHA256:E3F1335049ACA37892A4E6FFFA4DF911BD6F9DF7B17BCA45FECCFA00A7DC5ADA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
41
DNS requests
25
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7132
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4132
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4788
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6012
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5368
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5368
SearchApp.exe
92.123.104.62:443
www.bing.com
Akamai International B.V.
DE
unknown
1800
slui.exe
20.83.72.98:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1752
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
5392
aware.exe
162.159.128.233:443
discord.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
t-ring-fdv2.msedge.net
  • 13.107.237.254
unknown
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
www.bing.com
  • 92.123.104.62
  • 92.123.104.54
  • 92.123.104.58
  • 92.123.104.61
  • 92.123.104.4
  • 92.123.104.60
  • 92.123.104.63
  • 92.123.104.67
  • 92.123.104.66
  • 92.123.104.64
  • 92.123.104.65
  • 92.123.104.59
whitelisted
google.com
  • 142.250.186.142
whitelisted
discord.com
  • 162.159.128.233
  • 162.159.137.232
  • 162.159.136.232
  • 162.159.138.232
  • 162.159.135.232
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.71
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.45
whitelisted

Threats

PID
Process
Class
Message
2284
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
5392
aware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info