File name:

update.exe

Full analysis: https://app.any.run/tasks/090e9623-d49a-4c37-9e3a-5ebf11cbc36c
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: August 18, 2024, 09:28:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
ransomware
mircop
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

AF87D850A15F1FBDE5E824116E1F174B

SHA1:

9D704094E5F7386104DC5B7B155768FBAC9FC0F9

SHA256:

11863FECF89DD0FD635456D680FA4A268D9F63DC5A76093FBB79C6686D5AE17B

SSDEEP:

192:lfY+dEzdn2uAQ66JhbAvS45Z+DTTNbv25Z+6/SrbINJdIAbE5pz6HRURsqXjYYYc:eGcG6LEvS45Z+pC5Z+6/SrbIqAb0X/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MIRCOP has been detected

      • update.exe (PID: 6560)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • update.exe (PID: 6468)
      • update.exe (PID: 6560)
    • Reads the date of Windows installation

      • update.exe (PID: 6468)
    • Application launched itself

      • update.exe (PID: 6468)
    • Drops the executable file immediately after the start

      • update.exe (PID: 6468)
      • update.exe (PID: 6560)
    • Checks Windows Trust Settings

      • update.exe (PID: 6560)
    • Creates files like ransomware instruction

      • update.exe (PID: 6560)
    • Creates file in the systems drive root

      • update.exe (PID: 6560)
    • Creates files in the driver directory

      • update.exe (PID: 6560)
    • The process creates files with name similar to system file names

      • update.exe (PID: 6560)
  • INFO

    • Checks supported languages

      • update.exe (PID: 6468)
      • update.exe (PID: 6560)
    • Process checks computer location settings

      • update.exe (PID: 6468)
    • Reads the computer name

      • update.exe (PID: 6468)
      • update.exe (PID: 6560)
    • Checks proxy server information

      • update.exe (PID: 6560)
    • Reads the software policy settings

      • update.exe (PID: 6560)
    • Reads the machine GUID from the registry

      • update.exe (PID: 6560)
    • Creates files in the program directory

      • update.exe (PID: 6560)
    • Attempting to use instant messaging service

      • update.exe (PID: 6560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:18 09:28:25+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.4
CodeSize: 8704
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x25e1
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start update.exe conhost.exe no specs update.exe conhost.exe no specs update.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6420"C:\Users\admin\Desktop\update.exe" C:\Users\admin\Desktop\update.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\update.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6468"C:\Users\admin\Desktop\update.exe" C:\Users\admin\Desktop\update.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\update.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6480\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeupdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6560"C:\Users\admin\Desktop\update.exe" --foodsumC:\Users\admin\Desktop\update.exe
update.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\update.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6568\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeupdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
92 961
Read events
92 942
Write events
19
Delete events
0

Modification events

(PID) Process:(6468) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6468) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6468) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6468) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6560) update.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
12
Suspicious files
6 588
Text files
397
Unknown types
18

Dropped files

PID
Process
Filename
Type
6560update.exeC:\Users\admin\Desktop\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Documents\Outlook Files\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Desktop\desktop.ini.abcbinary
MD5:5796D089A65746D030FED1D0064C4D45
SHA256:6B11FE53DBC34485C4E9F8843149F71824710CCF323B5DFFAD653B47D31A3927
6560update.exeC:\Users\admin\Pictures\Camera Roll\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Documents\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2.abcbinary
MD5:88F0930B67331517A56CB73B9728ABAE
SHA256:F012AE651B593B9958680EFB31BF31B5C0001ED64524507E9874EDCAAA931E57
6560update.exeC:\Users\admin\Pictures\Saved Pictures\desktop.ini.abcbinary
MD5:C3B1BFA40A6D1E04A88200741D45EB10
SHA256:C6FC8179FD915FB115A883053FA7FA86669D12A476C126E050E66015430A9056
6560update.exeC:\Users\admin\Documents\OneNote Notebooks\My Notebook\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Pictures\Saved Pictures\README.txttext
MD5:A793E416B9EF809903404D8383D95342
SHA256:DA298F5F63138EB1406F65A52CB69D16CCCFA82085973E4AAD8E0FC8D70302EF
6560update.exeC:\Users\admin\Documents\OneNote Notebooks\My Notebook\Quick Notes.one.abcbinary
MD5:720B8CA97EF101163608C9D306DB1876
SHA256:9DDBB2F76E64D784A02D101F49FBE391FE55C751113B157D3DC7207564EAE578
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
17
DNS requests
6
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
404
162.159.128.233:443
https://discordapp.com/api/webhooks/1274645682631737435/8pMqGeOXxcDup6K6NJddAptIOr7-kFLAkzH6oJKS0bO3hSTdS5-FDYdYu3W9JiZuvr3b
unknown
binary
45 b
POST
204
104.126.37.139:443
https://www.bing.com/threshold/xls.aspx
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2532
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4064
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6560
update.exe
162.159.134.233:443
discordapp.com
CLOUDFLARENET
shared
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2532
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4324
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
discordapp.com
  • 162.159.134.233
  • 162.159.135.233
  • 162.159.129.233
  • 162.159.130.233
  • 162.159.133.233
whitelisted
www.bing.com
  • 2.23.209.182
  • 2.23.209.187
  • 2.23.209.135
  • 2.23.209.189
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.143
  • 2.23.209.141
  • 2.23.209.183
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com)
6560
update.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
No debug info