File name:

hwmonitor_1.52.exe

Full analysis: https://app.any.run/tasks/d8148b9d-6343-4a06-bbc9-f7376293ca2c
Verdict: Malicious activity
Analysis date: October 25, 2023, 05:18:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C975D8D0CC0F49852DC41FDD2E0B8201

SHA1:

1FF6A10902D3FD343AAD94243C82DB3AFB9B8E04

SHA256:

11192B73BC70393F4AC655A49441FA352F52D011CDB3F86C77B73CF1EB7AC7E0

SSDEEP:

24576:9yIRw0hNNgeIoP2cXGM9PidKP8O71ekVpBIM8RH4AP+YvsGf/jwxS3TdusZk:9yv07PIophicPprHBP8RH4AWB2LZu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • hwmonitor_1.52.exe (PID: 3820)
      • HWMonitor.exe (PID: 2216)
      • hwmonitor_1.52.tmp (PID: 3632)
      • hwmonitor_1.52.exe (PID: 3824)
    • Application was dropped or rewritten from another process

      • HWMonitor.exe (PID: 2472)
      • HWMonitor.exe (PID: 2216)
  • SUSPICIOUS

    • Reads the Internet Settings

      • HWMonitor.exe (PID: 2216)
    • Reads security settings of Internet Explorer

      • HWMonitor.exe (PID: 2216)
    • Checks Windows Trust Settings

      • HWMonitor.exe (PID: 2216)
    • Reads settings of System Certificates

      • HWMonitor.exe (PID: 2216)
    • Drops a system driver (possible attempt to evade defenses)

      • HWMonitor.exe (PID: 2216)
    • Reads the Windows owner or organization settings

      • hwmonitor_1.52.tmp (PID: 3632)
  • INFO

    • Checks supported languages

      • hwmonitor_1.52.exe (PID: 3824)
      • hwmonitor_1.52.tmp (PID: 1600)
      • hwmonitor_1.52.exe (PID: 3820)
      • HWMonitor.exe (PID: 2216)
      • hwmonitor_1.52.tmp (PID: 3632)
    • Reads the computer name

      • hwmonitor_1.52.tmp (PID: 1600)
      • hwmonitor_1.52.tmp (PID: 3632)
      • HWMonitor.exe (PID: 2216)
    • Create files in a temporary directory

      • hwmonitor_1.52.exe (PID: 3824)
      • HWMonitor.exe (PID: 2216)
      • hwmonitor_1.52.exe (PID: 3820)
    • Application was dropped or rewritten from another process

      • hwmonitor_1.52.tmp (PID: 1600)
      • hwmonitor_1.52.tmp (PID: 3632)
    • Creates files in the program directory

      • hwmonitor_1.52.tmp (PID: 3632)
    • Manual execution by a user

      • HWMonitor.exe (PID: 2472)
      • HWMonitor.exe (PID: 2216)
    • Checks proxy server information

      • HWMonitor.exe (PID: 2216)
    • Reads the machine GUID from the registry

      • HWMonitor.exe (PID: 2216)
    • Creates files or folders in the user directory

      • HWMonitor.exe (PID: 2216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

ProductVersion: 1.52
ProductName: CPUID HWMonitor
LegalCopyright:
FileVersion:
FileDescription: CPUID HWMonitor Setup
CompanyName: CPUID, Inc.
Comments: This installation was built with Inno Setup.
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 1
EntryPoint: 0xaad0
UninitializedDataSize: -
InitializedDataSize: 17920
CodeSize: 41984
LinkerVersion: 2.25
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
TimeStamp: 1992:06:19 22:22:17+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start hwmonitor_1.52.exe no specs hwmonitor_1.52.tmp no specs hwmonitor_1.52.exe hwmonitor_1.52.tmp no specs hwmonitor.exe no specs hwmonitor.exe

Process information

PID
CMD
Path
Indicators
Parent process
1600"C:\Users\admin\AppData\Local\Temp\is-4HLSQ.tmp\hwmonitor_1.52.tmp" /SL5="$1001CA,1234407,58368,C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exe" C:\Users\admin\AppData\Local\Temp\is-4HLSQ.tmp\hwmonitor_1.52.tmphwmonitor_1.52.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-4hlsq.tmp\hwmonitor_1.52.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcrt.dll
2216"C:\Program Files\CPUID\HWMonitor\HWMonitor.exe" C:\Program Files\CPUID\HWMonitor\HWMonitor.exe
explorer.exe
User:
admin
Company:
CPUID
Integrity Level:
HIGH
Description:
HWMonitor
Exit code:
0
Version:
1, 5, 2, 0
Modules
Images
c:\program files\cpuid\hwmonitor\hwmonitor.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
2472"C:\Program Files\CPUID\HWMonitor\HWMonitor.exe" C:\Program Files\CPUID\HWMonitor\HWMonitor.exeexplorer.exe
User:
admin
Company:
CPUID
Integrity Level:
MEDIUM
Description:
HWMonitor
Exit code:
3221226540
Version:
1, 5, 2, 0
Modules
Images
c:\program files\cpuid\hwmonitor\hwmonitor.exe
c:\windows\system32\ntdll.dll
3632"C:\Users\admin\AppData\Local\Temp\is-BI6UL.tmp\hwmonitor_1.52.tmp" /SL5="$60300,1234407,58368,C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exe" /SPAWNWND=$4036C /NOTIFYWND=$1001CA C:\Users\admin\AppData\Local\Temp\is-BI6UL.tmp\hwmonitor_1.52.tmphwmonitor_1.52.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-bi6ul.tmp\hwmonitor_1.52.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcrt.dll
3820"C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exe" C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exeexplorer.exe
User:
admin
Company:
CPUID, Inc.
Integrity Level:
MEDIUM
Description:
CPUID HWMonitor Setup
Exit code:
0
Version:
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\hwmonitor_1.52.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3824"C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exe" /SPAWNWND=$4036C /NOTIFYWND=$1001CA C:\Users\admin\AppData\Local\Temp\hwmonitor_1.52.exe
hwmonitor_1.52.tmp
User:
admin
Company:
CPUID, Inc.
Integrity Level:
HIGH
Description:
CPUID HWMonitor Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\hwmonitor_1.52.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\oleaut32.dll
Total events
6 839
Read events
6 807
Write events
26
Delete events
6

Modification events

(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
BD1C24155A185E1BB31A361D453A071F47CEC706A0D2FAED0023D66C27E15734
(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Program Files\CPUID\HWMonitor\HWMonitor.exe
(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
745F8E3974B551170ECD20BFDFA1CDA1D06E63324D506299E18813BDB7B2B9B8
(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
300E0000F62CC8A70207DA01
(PID) Process:(3632) hwmonitor_1.52.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(2216) HWMonitor.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2216) HWMonitor.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2216) HWMonitor.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2216) HWMonitor.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
7
Suspicious files
15
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3632hwmonitor_1.52.tmpC:\Program Files\CPUID\HWMonitor\is-56LBC.tmptext
MD5:F86BFE7020B639F6A70F20C00CE12F90
SHA256:E94300217D273F11EBC58EB273E5000EC86471E5C10CA12BB36FFBCDCC9FA666
3632hwmonitor_1.52.tmpC:\Program Files\CPUID\HWMonitor\hwm_readme.txttext
MD5:F86BFE7020B639F6A70F20C00CE12F90
SHA256:E94300217D273F11EBC58EB273E5000EC86471E5C10CA12BB36FFBCDCC9FA666
3632hwmonitor_1.52.tmpC:\Users\Public\Desktop\CPUID HWMonitor.lnkbinary
MD5:A072B493F4BEFA9950BC67C28061FC51
SHA256:6BFB8451C8FB6001E00F2BC2613571A6FBA1545C6CA901E209C3AABA7917CB8F
2216HWMonitor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
2216HWMonitor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:12BE812AC7DBC0A209C2FF99D1F3059C
SHA256:403AF3844B416EA480EFECA8A9DE4DAC36BFF6089D739B9F3690A99BCD69A252
3632hwmonitor_1.52.tmpC:\Program Files\CPUID\HWMonitor\HWMonitor.exeexecutable
MD5:D7F245246F2597F7F23E15EA779CC5AB
SHA256:62CD1A2E8FE364F954F56438F5DB89B54F9F085531833C236C54E9A0AF496BE5
3632hwmonitor_1.52.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWMonitor\Uninstall HWMonitor.lnkbinary
MD5:6EF4E68053135CA582668DE86B0B8C4A
SHA256:C82A6E9F0EA9977CB0AC97CE25076FC891FB610E15FDA62EA711E78AF14A30CD
2216HWMonitor.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:C516E0BEC250217320DF1D8852F17061
SHA256:588D7B8DBD4F6977D8C38225F057DA864E6B84AFA92902E8DEA2DAC2E282B9A2
3632hwmonitor_1.52.tmpC:\Program Files\CPUID\HWMonitor\unins000.datbinary
MD5:89273237D786C9A7EA9928625CCEDC76
SHA256:17866BEF281839FA6459863DF760D91E459E5B096D19EB64AC23C8B550C170AC
2216HWMonitor.exeC:\Users\admin\AppData\Local\Temp\Tar41E5.tmpbinary
MD5:9441737383D21192400ECA82FDA910EC
SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
6
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2216
HWMonitor.exe
GET
200
23.53.40.161:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgOtcy3iHUtqqXerqZ8ymWI%2FoA%3D%3D
unknown
der
503 b
unknown
2216
HWMonitor.exe
GET
200
46.228.146.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?17139c9c5265827d
unknown
compressed
61.6 Kb
unknown
2216
HWMonitor.exe
GET
200
46.228.146.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?248fc5525a5da0f0
unknown
compressed
4.66 Kb
unknown
2216
HWMonitor.exe
GET
200
23.212.210.158:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2216
HWMonitor.exe
195.154.81.43:443
download.cpuid.com
Online S.a.s.
FR
unknown
2216
HWMonitor.exe
46.228.146.128:80
ctldl.windowsupdate.com
LLNW
US
unknown
2216
HWMonitor.exe
23.212.210.158:80
x1.c.lencr.org
AKAMAI-AS
AU
unknown
2216
HWMonitor.exe
23.53.40.161:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
download.cpuid.com
  • 195.154.81.43
whitelisted
ctldl.windowsupdate.com
  • 46.228.146.128
  • 46.228.146.0
whitelisted
x1.c.lencr.org
  • 23.212.210.158
whitelisted
r3.o.lencr.org
  • 23.53.40.161
  • 23.53.40.154
shared

Threats

No threats detected
No debug info