File name:

ssms.exe

Full analysis: https://app.any.run/tasks/b4727abc-d1ab-43b0-aa2c-d0b0686eabdb
Verdict: Malicious activity
Analysis date: November 06, 2023, 09:30:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0C4502D6655264A9AA420274A0DDEAEB

SHA1:

B5510BD27327C7278843736AAC085E16A508ED99

SHA256:

14F9538DD611CA701BDBC6B34A0562E8B18C2492FF323B32557B36673434541A

SSDEEP:

3072:VWiyCqWkIcWoD0SrFykuOaXKcvQuoR0ainj9LaIRaRGbOwzidLEt1Jwmq:iCqWkxg8toKcvQuk0dRTaACY1ymq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • ssms.exe (PID: 3440)
    • Actions looks like stealing of personal data

      • ssms.exe (PID: 3440)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • ssms.exe (PID: 3440)
  • INFO

    • Reads the computer name

      • ssms.exe (PID: 3440)
      • wmpnscfg.exe (PID: 2424)
    • Reads the machine GUID from the registry

      • ssms.exe (PID: 3440)
      • wmpnscfg.exe (PID: 2424)
    • Creates files in the program directory

      • ssms.exe (PID: 3440)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2424)
      • ssms.exe (PID: 3440)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2424)
    • Dropped object may contain TOR URL's

      • ssms.exe (PID: 3440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:02:03 14:43:54+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 157696
InitializedDataSize: 40960
UninitializedDataSize: -
EntryPoint: 0x1c989
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ssms.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2424"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3440"C:\Users\admin\AppData\Local\Temp\ssms.exe" C:\Users\admin\AppData\Local\Temp\ssms.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ssms.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
411
Read events
366
Write events
6
Delete events
39

Modification events

(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
3AAC24D8023D4441F4C8C45147C2BC57AE66380AE59B570DAC2EEE714EE8CF7B
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Users\admin\NTUSER.DAT
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
2
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
264F1036EDB3E73A9E5F2FAFAD0A0AB234B8B1EB34B4B8D9B4DA3964B35EA8AC
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
700D0000500250D89310DA01
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
63C57792575631F023CF5F4371AFD63D8769C88EB785C99EC4D8A021F705BE0C
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Users\admin\ntuser.dat.LOG1
(PID) Process:(3440) ssms.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
3BBF67A62D9B10F308C3410746EC5769028D471F52DA3091229E2CED7EFF464D
Executable files
4
Suspicious files
492
Text files
106
Unknown types
0

Dropped files

PID
Process
Filename
Type
3440ssms.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccLR.cab
MD5:
SHA256:
3440ssms.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccLR.cab.TIYSV
MD5:
SHA256:
3440ssms.exeC:\MSOCache\All Users\readme.txttext
MD5:CEAA77D1461263A97B5EBDD0C8C23A77
SHA256:A35AB41D505749753D8F5A5043F1B6234D1A20DAD75E4C9863A3535D53D8B420
3440ssms.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\profile_count_308046B0AF4A39CB.jsonbinary
MD5:6C01C2AD8EE981FE9A1643A2BD159439
SHA256:8733397E72BE2885B460274D31497BA7AAA3E80AF84A2127A36C01D08B142609
3440ssms.exeC:\ProgramData\Oracle\readme.txttext
MD5:CEAA77D1461263A97B5EBDD0C8C23A77
SHA256:A35AB41D505749753D8F5A5043F1B6234D1A20DAD75E4C9863A3535D53D8B420
3440ssms.exeC:\MSOCache\readme.txttext
MD5:CEAA77D1461263A97B5EBDD0C8C23A77
SHA256:A35AB41D505749753D8F5A5043F1B6234D1A20DAD75E4C9863A3535D53D8B420
3440ssms.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\readme.txttext
MD5:CEAA77D1461263A97B5EBDD0C8C23A77
SHA256:A35AB41D505749753D8F5A5043F1B6234D1A20DAD75E4C9863A3535D53D8B420
3440ssms.exeC:\Users\admin\readme.txttext
MD5:CEAA77D1461263A97B5EBDD0C8C23A77
SHA256:A35AB41D505749753D8F5A5043F1B6234D1A20DAD75E4C9863A3535D53D8B420
3440ssms.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccLR.cab
MD5:
SHA256:
3440ssms.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccLR.cab.TIYSV
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
266
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
3440
ssms.exe
192.168.1.2:445
unknown
192.168.100.28:49216
unknown
192.168.100.28:49192
unknown
192.168.100.28:49259
unknown
192.168.100.28:49177
unknown
192.168.100.28:49233
unknown
192.168.100.28:49187
unknown
192.168.100.28:49264
unknown

DNS requests

Domain
IP
Reputation
armmf.adobe.com
  • 184.30.20.134
whitelisted

Threats

PID
Process
Class
Message
3440
ssms.exe
Misc activity
ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection
No debug info