download:

/codebase/WebComponents.exe

Full analysis: https://app.any.run/tasks/9582581f-1147-41ff-bf6d-ffb1aa92217f
Verdict: Malicious activity
Analysis date: July 22, 2024, 21:56:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F2791D947EDA0C930887E18A2D49747A

SHA1:

D6B4E5C71AB6FFD15A91BCA4F1EBF1776A87319C

SHA256:

0FDCC55CCD23670429DEDDE4F66C93C0149E38A0E665D46FD3290D4EF7A83C61

SSDEEP:

98304:ApWgxDYImYRqP4IpbplE0HpbH/g9aFAKbuErgAmFSku024CuLmeRAjlccJakSNwC:c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WebComponents.exe (PID: 1264)
      • WebComponents.exe (PID: 4196)
      • WebComponents.tmp (PID: 5576)
    • Registers / Runs the DLL via REGSVR32.EXE

      • WebComponents.tmp (PID: 5576)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WebComponents.exe (PID: 1264)
      • WebComponents.exe (PID: 4196)
      • WebComponents.tmp (PID: 5576)
    • Reads security settings of Internet Explorer

      • WebComponents.tmp (PID: 1084)
    • Reads the date of Windows installation

      • WebComponents.tmp (PID: 1084)
    • Reads the Windows owner or organization settings

      • WebComponents.tmp (PID: 5576)
    • Process drops legitimate windows executable

      • WebComponents.tmp (PID: 5576)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 4444)
  • INFO

    • Create files in a temporary directory

      • WebComponents.exe (PID: 1264)
      • WebComponents.exe (PID: 4196)
      • WebComponents.tmp (PID: 5576)
    • Checks supported languages

      • WebComponents.exe (PID: 1264)
      • WebComponents.tmp (PID: 1084)
      • WebComponents.exe (PID: 4196)
      • WebComponents.tmp (PID: 5576)
    • Reads the computer name

      • WebComponents.tmp (PID: 1084)
      • WebComponents.tmp (PID: 5576)
    • Process checks computer location settings

      • WebComponents.tmp (PID: 1084)
    • Creates files in the program directory

      • WebComponents.tmp (PID: 5576)
    • Creates a software uninstall entry

      • WebComponents.tmp (PID: 5576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 37376
InitializedDataSize: 13312
UninitializedDataSize: -
EntryPoint: 0x9978
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.0.5.51
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: ASCII
Comments: 此安装程序由 Inno Setup 构建。
CompanyName:
FileDescription: Web Components Setup
FileVersion: 3.0.5.51
LegalCopyright:
ProductName: Web Components
ProductVersion: 3.0.5.51
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start webcomponents.exe webcomponents.tmp no specs webcomponents.exe webcomponents.tmp regsvr32.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1084"C:\Users\admin\AppData\Local\Temp\is-EA79J.tmp\WebComponents.tmp" /SL5="$501FC,1561784,51712,C:\Users\admin\AppData\Local\Temp\WebComponents.exe" C:\Users\admin\AppData\Local\Temp\is-EA79J.tmp\WebComponents.tmpWebComponents.exe
User:
admin
Integrity Level:
MEDIUM
Description:
安装/卸载
Exit code:
0
Version:
51.49.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-ea79j.tmp\webcomponents.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1264"C:\Users\admin\AppData\Local\Temp\WebComponents.exe" C:\Users\admin\AppData\Local\Temp\WebComponents.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Web Components Setup
Exit code:
0
Version:
3.0.5.51
Modules
Images
c:\users\admin\appdata\local\temp\webcomponents.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4196"C:\Users\admin\AppData\Local\Temp\WebComponents.exe" /SPAWNWND=$4003E /NOTIFYWND=$501FC C:\Users\admin\AppData\Local\Temp\WebComponents.exe
WebComponents.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
Web Components Setup
Exit code:
0
Version:
3.0.5.51
Modules
Images
c:\users\admin\appdata\local\temp\webcomponents.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4444"C:\WINDOWS\system32\regsvr32.exe" /s "C:\Program Files (x86)\Web Components\WebVideoActiveX.ocx"C:\Windows\SysWOW64\regsvr32.exe
WebComponents.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5560C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5576"C:\Users\admin\AppData\Local\Temp\is-3MLF5.tmp\WebComponents.tmp" /SL5="$40054,1561784,51712,C:\Users\admin\AppData\Local\Temp\WebComponents.exe" /SPAWNWND=$4003E /NOTIFYWND=$501FC C:\Users\admin\AppData\Local\Temp\is-3MLF5.tmp\WebComponents.tmp
WebComponents.exe
User:
admin
Integrity Level:
HIGH
Description:
安装/卸载
Exit code:
0
Version:
51.49.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-3mlf5.tmp\webcomponents.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
7 037
Read events
7 020
Write events
17
Delete events
0

Modification events

(PID) Process:(5576) WebComponents.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\MozillaPlugins\Web Components
Operation:writeName:Path
Value:
C:\Program Files (x86)\Web Components\npWebVideoPlugin.dll
(PID) Process:(4444) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7F79CD87-2D7A-4086-807E-D5E1A3E37BE5}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4444) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{7F79CD87-2D7A-4086-807E-D5E1A3E37BE5}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4444) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DE8B9108-0847-49C1-8E58-5972B6137DFD}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4444) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{DE8B9108-0847-49C1-8E58-5972B6137DFD}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4444) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7EF736D-B4E6-4A5A-BA94-732D71107808}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(5576) WebComponents.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{03B13AF8-9625-478A-AF0E-205337B9415A}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.2.3
(PID) Process:(5576) WebComponents.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{03B13AF8-9625-478A-AF0E-205337B9415A}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\Web Components
(PID) Process:(5576) WebComponents.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{03B13AF8-9625-478A-AF0E-205337B9415A}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\Web Components\
(PID) Process:(5576) WebComponents.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{03B13AF8-9625-478A-AF0E-205337B9415A}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
WebComponents
Executable files
23
Suspicious files
0
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
5576WebComponents.tmpC:\Users\admin\AppData\Local\Temp\is-EQ220.tmp\_isetup\_setup64.tmpexecutable
MD5:B4604F8CD050D7933012AE4AA98E1796
SHA256:B50B7AC03EC6DA865BF4504C7AC1E52D9F5B67C7BCB3EC0DB59FAB24F1B471C5
1264WebComponents.exeC:\Users\admin\AppData\Local\Temp\is-EA79J.tmp\WebComponents.tmpexecutable
MD5:ADBBCF3057B0BA83F1DFEFFF18D0B116
SHA256:D6E6BB562616B544BF7CF5F4AB515A6189B5ABDB29AE91A8C9189841CA8A7A47
5576WebComponents.tmpC:\Program Files (x86)\Web Components\is-EPVA2.tmpexecutable
MD5:1613EB7D65B23F96A8157C1034E72C2B
SHA256:8CCE7201A6254C357A0231E78485307F34A5182CD6A03CD235858FAA87E7FFF1
5576WebComponents.tmpC:\Program Files (x86)\Web Components\unins000.exeexecutable
MD5:5B319219B7AF9E89FB97B678ADB3CEDE
SHA256:7C432970740E1EEE682D3A9E3FBA1CCF5C68B0BB070F9DE303CE4D366824002E
5576WebComponents.tmpC:\Program Files (x86)\Web Components\is-QL0L4.tmpexecutable
MD5:5B319219B7AF9E89FB97B678ADB3CEDE
SHA256:7C432970740E1EEE682D3A9E3FBA1CCF5C68B0BB070F9DE303CE4D366824002E
5576WebComponents.tmpC:\Program Files (x86)\Web Components\is-V6ST0.tmpexecutable
MD5:50F700D0306CCEAF132E6B176BC081B3
SHA256:5F7623FDC0C9592A5F4FD39AE639BFEF27EDD18141541A3BFF0AA6D67763E5CB
5576WebComponents.tmpC:\Program Files (x86)\Web Components\AudioIntercom.dllexecutable
MD5:50F700D0306CCEAF132E6B176BC081B3
SHA256:5F7623FDC0C9592A5F4FD39AE639BFEF27EDD18141541A3BFF0AA6D67763E5CB
5576WebComponents.tmpC:\Program Files (x86)\Web Components\NetStream.dllexecutable
MD5:1613EB7D65B23F96A8157C1034E72C2B
SHA256:8CCE7201A6254C357A0231E78485307F34A5182CD6A03CD235858FAA87E7FFF1
5576WebComponents.tmpC:\Program Files (x86)\Web Components\is-TUEF0.tmpexecutable
MD5:52C83A72943B529B7F495B0606C117B6
SHA256:B21AE0059A8182A51D1645A44F403429E60E26453353C0D708D7F501557CA01C
5576WebComponents.tmpC:\Program Files (x86)\Web Components\OpenAL32.dllexecutable
MD5:52C83A72943B529B7F495B0606C117B6
SHA256:B21AE0059A8182A51D1645A44F403429E60E26453353C0D708D7F501557CA01C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
39
DNS requests
15
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3076
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6012
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3704
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4204
svchost.exe
4.209.32.198:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3704
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5720
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5368
SearchApp.exe
92.122.215.53:443
www.bing.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 92.122.215.53
  • 92.122.215.57
  • 2.20.142.4
  • 2.20.142.187
  • 92.122.215.74
  • 92.122.215.95
  • 2.20.142.180
  • 92.122.215.56
  • 2.20.142.154
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.72
  • 40.126.32.140
  • 20.190.160.20
  • 40.126.32.76
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
Process
Message
regsvr32.exe
[Debug]StreamTranClient---Create asyncio queue succ!
regsvr32.exe
[Info]StreamTranClient---version:this RTSP version is 1.1.2.18 2015_02_04..
regsvr32.exe
[Info]StreamTranClient---version:this RTSP version is asyn..
regsvr32.exe
[Debug]StreamTranClient---Destroy asyncio queue succ!