File name:

Full-Setup.exe

Full analysis: https://app.any.run/tasks/c8a69a86-d3e9-4282-8665-2ad73b751464
Verdict: Malicious activity
Analysis date: December 16, 2024, 14:43:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

54AA5154C53E038903981BDBC27FD665

SHA1:

85E9AF6D54064D362913D4F703E47BC2F2A594DD

SHA256:

168DC6EB298ECBB86DA23696195051BECE8DC3DC669F5212EB697EB700EE2A16

SSDEEP:

49152:+Mbgo14wK414q/65rT+GMlw8fU8MY7vJsvjVHlhxv1FSBxxzlIeID7uhuuprdkju:+Mbg2tut+bw8fpJ0bFKx91IDCua5e2F5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Full-Setup.exe (PID: 6252)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5696)
    • AutoIt loader has been detected (YARA)

      • Deck.com (PID: 6600)
    • Changes powershell execution policy (Bypass)

      • Deck.com (PID: 6600)
  • SUSPICIOUS

    • Executing commands from ".cmd" file

      • Full-Setup.exe (PID: 6252)
    • Starts CMD.EXE for commands execution

      • Full-Setup.exe (PID: 6252)
      • cmd.exe (PID: 6300)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6300)
    • Get information on the list of running processes

      • cmd.exe (PID: 6300)
    • Application launched itself

      • cmd.exe (PID: 6300)
    • The executable file from the user directory is run by the CMD process

      • Deck.com (PID: 6600)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6300)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6300)
    • Starts POWERSHELL.EXE for commands execution

      • Deck.com (PID: 6600)
    • The process executes Powershell scripts

      • Deck.com (PID: 6600)
  • INFO

    • Checks supported languages

      • Full-Setup.exe (PID: 6252)
      • Deck.com (PID: 6600)
    • Reads the computer name

      • Full-Setup.exe (PID: 6252)
      • Deck.com (PID: 6600)
    • Creates a new folder

      • cmd.exe (PID: 6536)
    • Reads mouse settings

      • Deck.com (PID: 6600)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 929280
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
15
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start full-setup.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs deck.com choice.exe no specs rundll32.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4544\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5268C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5696powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\0M2RH4UHEY95GR1R2.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDeck.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6252"C:\Users\admin\AppData\Local\Temp\Full-Setup.exe" C:\Users\admin\AppData\Local\Temp\Full-Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\full-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6300"C:\Windows\System32\cmd.exe" /c copy Helpful Helpful.cmd && Helpful.cmdC:\Windows\SysWOW64\cmd.exeFull-Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6308\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6364tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6372findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6476tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6484findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 971
Read events
4 971
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
20
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Genesbinary
MD5:7F8DEB4A7CE7E7FE87A7EC9C64B6A99D
SHA256:4EE9D85D1234B15C4B41F3DBE405FE75820160EB5E2E0F3D70AD84296B354ADD
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Devicebinary
MD5:A0F8FD38DB727DA3999A25A1B7C3960C
SHA256:708E90609A0641F1386E22C24BFCC879E341710A50712F8CEBECDB741D6CF6B0
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Stagebinary
MD5:9AEEBB5F9F89B5302C1C24C9D7240F0F
SHA256:3835C84D15B7FFFB2AE04861A090C6E460A61FAF4AEAD221C0AB9BF476498F99
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Helpfultext
MD5:370BA0F5250A3529AF051E7EF2A115FC
SHA256:1C0698DA262098654AC5133517046E8B4EA6392606C8E1F36B92660B7692404A
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Discountedbinary
MD5:E262B44344F17969E6F100F9A5BA3C1A
SHA256:157D927A1C85A0BE693B03315275D5232C87B029D15BE40A1098EA0BE0CE4847
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Responsiblebinary
MD5:90CE9B0B909A9395ED1111417EA1EC09
SHA256:E36754FE776C980009DB28398E66C53ADDA54A1383E80CE126F3AE3367C41564
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Ownsbinary
MD5:4DCC0651F06907B0B810EEA8ACBF7344
SHA256:EAB4F204945E33EC009D65ED23C3AF37015B7249D45AAAC62645945BFA077C8E
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Witbinary
MD5:9054F59675F805FD5A8C893ABEF0D566
SHA256:474D0809EF0B3B2D96864A04984600A91B89FEB1C9A98365A35DCEF5EC52F8D6
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Statementbinary
MD5:BE43A8E6381D004765C026D3A2C74110
SHA256:E55F348EC5543882A3DD288699D1BAC92B5E487D0FF90CE98978F4EBA3123CC8
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Subsequentlybinary
MD5:DF15BDB6E3C11993944084FC4DA6BE65
SHA256:D22A73ACF85A081126B9E508A43A11E45693B44C79E3AD0C5685953805C72F0B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
36
DNS requests
15
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3040
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3040
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3680
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3680
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6688
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3040
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3040
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
EDGECAST
US
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
kVYDksSPwBziW.kVYDksSPwBziW
unknown
login.live.com
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.74
  • 20.190.160.22
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
formydamagero.click
  • 188.114.96.3
  • 188.114.97.3
unknown
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
6600
Deck.com
Misc activity
ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Pastebin Service Domain in DNS Lookup (rentry .co)
No debug info