File name:

141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a

Full analysis: https://app.any.run/tasks/36ed7a48-4c6f-4139-8592-40510193e62b
Verdict: Malicious activity
Analysis date: February 01, 2025, 01:50:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

1A616DD34759B8EA2FA4BC6486B711E2

SHA1:

63F002061A0A4DAE5FB3F931F05F879F1E512B10

SHA256:

141954F4F7D786526823B1BE7CEAFC81ED78250B6CB82550587B5B7968222A1A

SSDEEP:

49152:D7aG6478iQJFBL2ySsg3RhPLlQOvRuu2cqJPX88TECPSjXrCxppVeI9M8bZ0GKcP:D7aG6478iQJFBL2ySsg3RhPhQOvRuu2+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 716)
      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
    • Process drops legitimate windows executable

      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
    • Application launched itself

      • WinHelp32.exe (PID: 396)
    • Executable content was dropped or overwritten

      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
    • Creates file in the systems drive root

      • WinHelp32.exe (PID: 3876)
      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
      • WinHelp32.exe (PID: 396)
    • Creates files in the driver directory

      • WinHelp32.exe (PID: 3876)
    • Connects to unusual port

      • WinHelp32.exe (PID: 3876)
    • There is functionality for VM detection VirtualBox (YARA)

      • WinHelp32.exe (PID: 3876)
    • There is functionality for taking screenshot (YARA)

      • WinHelp32.exe (PID: 3876)
    • There is functionality for VM detection VMWare (YARA)

      • WinHelp32.exe (PID: 3876)
    • Executes as Windows Service

      • WinHelp32.exe (PID: 396)
    • Creates or modifies Windows services

      • WinHelp32.exe (PID: 3876)
  • INFO

    • The sample compiled with chinese language support

      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
    • Reads the computer name

      • WinHelp32.exe (PID: 3876)
      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
      • WinHelp32.exe (PID: 396)
    • Checks supported languages

      • 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe (PID: 5588)
      • WinHelp32.exe (PID: 396)
      • WinHelp32.exe (PID: 3876)
    • Reads CPU info

      • WinHelp32.exe (PID: 3876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:10:03 06:20:58+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 1085440
UninitializedDataSize: -
EntryPoint: 0x21e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
Comments: -
CompanyName: Microsoft Corporation
FileDescription: loder
FileVersion: 1, 0, 0, 1
InternalName: loder
LegalCopyright: 版权所有(C) 2020
LegalTrademarks: -
OriginalFileName: loder.dat
PrivateBuild: -
ProductName: Microsoft Corporation loder
ProductVersion: 1, 0, 0, 1
SpecialBuild: -
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe winhelp32.exe no specs winhelp32.exe 141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396C:\windows\WinHelp32.exe -autoC:\Windows\WinHelp32.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
loder
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\windows\winhelp32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
716"C:\Users\admin\Desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe" C:\Users\admin\Desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
loder
Exit code:
3221226540
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3876C:\windows\WinHelp32.exe -acsiC:\Windows\WinHelp32.exe
WinHelp32.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
loder
Version:
1, 0, 0, 1
Modules
Images
c:\windows\winhelp32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\mfc42.dll
5588"C:\Users\admin\Desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe" C:\Users\admin\Desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
loder
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
218
Read events
216
Write events
2
Delete events
0

Modification events

(PID) Process:(3876) WinHelp32.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinHelp32
Operation:writeName:InstallTime
Value:
2025-02-01 01:50
(PID) Process:(3876) WinHelp32.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinHelp32
Operation:writeName:Packet
Value:
VIP
Executable files
1
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5588141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exeC:\Windows\WinHelp32.exeexecutable
MD5:1A616DD34759B8EA2FA4BC6486B711E2
SHA256:141954F4F7D786526823B1BE7CEAFC81ED78250B6CB82550587B5B7968222A1A
5588141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exeC:\Windows\SysWOW64\ini.initext
MD5:FE9AF7587D65300338177538AA72F924
SHA256:556243E27A369FBDFF1ECFB413B7540F1EB4E6BECBA03B76D221443B0D022351
5588141954f4f7d786526823b1be7ceafc81ed78250b6cb82550587b5b7968222a1a.exeC:\input.txttext
MD5:3416A75F4CEA9109507CACD8E2F2AEFC
SHA256:3D914F9348C9CC0FF8A79716700B9FCD4D2F3E711608004EB8F138BCBA7F14D9
3876WinHelp32.exeC:\input.txttext
MD5:3416A75F4CEA9109507CACD8E2F2AEFC
SHA256:3D914F9348C9CC0FF8A79716700B9FCD4D2F3E711608004EB8F138BCBA7F14D9
396WinHelp32.exeC:\input.txttext
MD5:3416A75F4CEA9109507CACD8E2F2AEFC
SHA256:3D914F9348C9CC0FF8A79716700B9FCD4D2F3E711608004EB8F138BCBA7F14D9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
22
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5892
svchost.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5892
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5892
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3876
WinHelp32.exe
122.51.89.70:8001
Shenzhen Tencent Computer Systems Company Limited
CN
unknown
4712
MoUsoCoreWorker.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5892
svchost.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.139
  • 104.126.37.131
  • 104.126.37.178
  • 104.126.37.128
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 20.189.173.28
whitelisted

Threats

No threats detected
No debug info