File name:

RunAsTool.exe

Full analysis: https://app.any.run/tasks/44c780ba-493f-40c6-9c0f-668a4e89ea26
Verdict: Malicious activity
Analysis date: November 23, 2023, 19:17:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

899198029F9ADC45094652DC9A629A99

SHA1:

60D5169C227500A56DD5555ABAF951D996D4203C

SHA256:

13DE2EC4FB18CA9311443A8EB5495226311EE8FC58487973950A13C7E0CCCF40

SSDEEP:

12288:XaWzgMg7v3qnCiNErQohh0F4jCJ8lnyGQutkCoSMf3hUP9GAr:qaHMv6C1rjfnyGQAkwm32FG6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 3612)
    • Drops the executable file immediately after the start

      • CCleaner.exe (PID: 3612)
    • Steals credentials from Web Browsers

      • CCleaner.exe (PID: 3612)
  • SUSPICIOUS

    • Reads the Internet Settings

      • CCleaner.exe (PID: 3456)
      • CCleaner.exe (PID: 3612)
    • Application launched itself

      • CCleaner.exe (PID: 3456)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 3612)
    • Checks Windows Trust Settings

      • CCleaner.exe (PID: 3612)
    • Reads security settings of Internet Explorer

      • CCleaner.exe (PID: 3612)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 3612)
    • Searches for installed software

      • CCleaner.exe (PID: 3612)
    • Reads Microsoft Outlook installation path

      • CCleaner.exe (PID: 3612)
  • INFO

    • Checks supported languages

      • RunAsTool.exe (PID: 3384)
      • CCleaner.exe (PID: 3456)
      • CCleaner.exe (PID: 3612)
      • wmpnscfg.exe (PID: 3548)
    • Reads the computer name

      • RunAsTool.exe (PID: 3384)
      • CCleaner.exe (PID: 3456)
      • CCleaner.exe (PID: 3612)
      • wmpnscfg.exe (PID: 3548)
    • Reads mouse settings

      • RunAsTool.exe (PID: 3384)
    • Create files in a temporary directory

      • RunAsTool.exe (PID: 3384)
    • Manual execution by a user

      • CCleaner.exe (PID: 3456)
      • wmpnscfg.exe (PID: 3548)
    • Reads Environment values

      • CCleaner.exe (PID: 3456)
      • CCleaner.exe (PID: 3612)
    • Reads CPU info

      • CCleaner.exe (PID: 3612)
    • Reads the machine GUID from the registry

      • CCleaner.exe (PID: 3612)
      • wmpnscfg.exe (PID: 3548)
    • Reads product name

      • CCleaner.exe (PID: 3612)
    • Creates files in the program directory

      • CCleaner.exe (PID: 3612)
    • Creates files or folders in the user directory

      • CCleaner.exe (PID: 3612)
    • Checks proxy server information

      • CCleaner.exe (PID: 3612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:16 09:47:33+02:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 524800
InitializedDataSize: 177664
UninitializedDataSize: -
EntryPoint: 0x16310
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.5.0.0
ProductVersionNumber: 1.5.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 1.5.0.0
Comments: RunAs Tool
FileDescription: RunAs Tool
LegalCopyright: Copyright © 2015-2022 www.sordum.org All Rights Reserved.
Coder: By BlueLife
CompanyName: www.sordum.org
ProductVersion: 1.5.0.0
OriginalFileName: RunAsTool.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start runastool.exe no specs ccleaner.exe no specs ccleaner.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3384"C:\Users\admin\Downloads\RunAsTool.exe" C:\Users\admin\Downloads\RunAsTool.exeexplorer.exe
User:
admin
Company:
www.sordum.org
Integrity Level:
MEDIUM
Description:
RunAs Tool
Exit code:
0
Version:
1.5.0.0
Modules
Images
c:\users\admin\downloads\runastool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3456"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
3548"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3612"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
CCleaner.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
Total events
12 416
Read events
12 257
Write events
106
Delete events
53

Modification events

(PID) Process:(3456) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3456) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3456) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3456) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3612) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:DAST
Value:
07/06/2023 15:07:35
(PID) Process:(3612) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:T8062
Value:
1
(PID) Process:(3612) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:UpdateBackground
Value:
0
(PID) Process:(3612) CCleaner.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3612) CCleaner.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
Operation:writeName:SystemRestorePointCreationFrequency
Value:
0
(PID) Process:(3612) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:FTU
Value:
02/11/2020|9|1
Executable files
3
Suspicious files
29
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
3612CCleaner.exeC:\Program Files\CCleaner\gcapi_17007670803612.dllexecutable
MD5:F637D5D3C3A60FDDB5DD397556FE9B1D
SHA256:641B843CB6EE7538EC267212694C9EF0616B9AC9AB14A0ABD7CF020678D50B02
3612CCleaner.exeC:\Program Files\CCleaner\gcapi_dll.dllexecutable
MD5:F637D5D3C3A60FDDB5DD397556FE9B1D
SHA256:641B843CB6EE7538EC267212694C9EF0616B9AC9AB14A0ABD7CF020678D50B02
3384RunAsTool.exeC:\Users\admin\AppData\Local\Temp\3m3h8j4l.tmptext
MD5:603B9431AAC02883882DEC7A5A9F518D
SHA256:60734D71C7E8A3F4597CA9BCD2307668C65F71EE07C321A1A43A563BE48C47D5
3384RunAsTool.exeC:\Users\admin\Downloads\RunAsTool.initext
MD5:B190BB2986BE977DC486EAE8CBB92AE7
SHA256:BA52F78DEFF58B15561EB4BCA214D2A05B928BAA1073A8BDF788A94BE03D2358
3612CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:783C4B83F306524468F672E9DC23E7DA
SHA256:F1970686B2E5BA7EECA9B235A405798A8BFAFC9330707DFFB56C4A3146957430
3612CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MQWNVPG4N0GYMN172XKG.tempbinary
MD5:8C6D11AF211F1B7FE12C8D6E8B62725A
SHA256:405BDDDF6C3564291D048C9067FD612D42244557941F270A9D3BC59B9EC6101E
3612CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ed7a5cc3cca8d52a.customDestinations-ms~RF16b3e3.TMPbinary
MD5:DA39F131D86385E1285BF5489BA6B6F9
SHA256:38C92C3B93D15CCF2E5E59D01D223366D60FF508037EF997C0CDCC11CEC8BAD0
3612CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
3612CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:E93FEAB919B0FDD6A676F5C6A4E26347
SHA256:6B10F5683B8B7081CFE7E5039804D604E92D8B199E1AC683139FB87CC4378F4B
3384RunAsTool.exeC:\Users\admin\AppData\Local\Temp\aut6F99.tmpbinary
MD5:FE971CFB8535AF5955F574609FD96D48
SHA256:7D05ED3680FDE460C80A9E0DC0CD0DD814802C862B4CEB4AC20DABF9242EEABB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
22
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3612
CCleaner.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
3612
CCleaner.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/s/gts1d4/VcE3oVK8Y7w/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQCazWGSsgPbSQnI0sPJ6DzW
unknown
binary
472 b
unknown
3612
CCleaner.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQChuVoVf7HVAxLxWCb2kXo7
unknown
binary
472 b
unknown
3612
CCleaner.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/s/gts1d4/91LZUgfONYY/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDbZTnFanxDPwpP%2Boz3GV%2FE
unknown
binary
472 b
unknown
3612
CCleaner.exe
GET
200
23.50.131.77:80
http://ncc.avast.com/ncc.txt
unknown
text
26 b
unknown
3612
CCleaner.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?79be29b5c6235dee
unknown
compressed
4.66 Kb
unknown
3612
CCleaner.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b84361091abc21b1
unknown
compressed
4.66 Kb
unknown
3612
CCleaner.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c53d913bd7d47d8b
unknown
compressed
4.66 Kb
unknown
3612
CCleaner.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fb0ba4a6b45db00c
unknown
compressed
4.66 Kb
unknown
3612
CCleaner.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3612
CCleaner.exe
23.50.131.77:80
ncc.avast.com
Akamai International B.V.
DE
unknown
3612
CCleaner.exe
34.117.223.223:443
analytics.ff.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3612
CCleaner.exe
34.149.149.62:443
ip-info.ff.avast.com
GOOGLE
US
unknown
3612
CCleaner.exe
2.19.225.128:443
www.ccleaner.com
AKAMAI-AS
FR
unknown
3612
CCleaner.exe
34.111.24.1:443
ipm-provider.ff.avast.com
GOOGLE
US
unknown
3612
CCleaner.exe
34.160.176.28:443
shepherd.ff.avast.com
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
ncc.avast.com
  • 23.50.131.77
  • 23.50.131.88
whitelisted
analytics.ff.avast.com
  • 34.117.223.223
whitelisted
www.ccleaner.com
  • 2.19.225.128
whitelisted
ipm-provider.ff.avast.com
  • 34.111.24.1
whitelisted
ip-info.ff.avast.com
  • 34.149.149.62
whitelisted
shepherd.ff.avast.com
  • 34.160.176.28
whitelisted
ctldl.windowsupdate.com
  • 184.24.77.194
  • 184.24.77.205
  • 184.24.77.187
  • 184.24.77.173
  • 184.24.77.201
whitelisted
ocsp.pki.goog
  • 142.250.185.227
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ipmcdn.avast.com
  • 23.207.111.75
whitelisted

Threats

No threats detected
Process
Message
CCleaner.exe
[2023-11-23 19:18:00.197] [error ] [settings ] [ 3612: 3576] [6000C4: 356] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
Failed to open log file 'C:\Program Files\CCleaner'
CCleaner.exe
OnLanguage - en
CCleaner.exe
[2023-11-23 19:18:00.790] [error ] [settings ] [ 3612: 3660] [9434E9: 359] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
[2023-11-23 19:18:00.790] [error ] [Burger ] [ 3612: 3660] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
[2023-11-23 19:18:00.790] [error ] [Burger ] [ 3612: 3660] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
OnLanguage - en
CCleaner.exe
startCheckingLicense()
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en