File name:

Full-Setup.exe

Full analysis: https://app.any.run/tasks/c8a69a86-d3e9-4282-8665-2ad73b751464
Verdict: Malicious activity
Analysis date: December 16, 2024, 14:43:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

54AA5154C53E038903981BDBC27FD665

SHA1:

85E9AF6D54064D362913D4F703E47BC2F2A594DD

SHA256:

168DC6EB298ECBB86DA23696195051BECE8DC3DC669F5212EB697EB700EE2A16

SSDEEP:

49152:+Mbgo14wK414q/65rT+GMlw8fU8MY7vJsvjVHlhxv1FSBxxzlIeID7uhuuprdkju:+Mbg2tut+bw8fpJ0bFKx91IDCua5e2F5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Full-Setup.exe (PID: 6252)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5696)
    • AutoIt loader has been detected (YARA)

      • Deck.com (PID: 6600)
    • Changes powershell execution policy (Bypass)

      • Deck.com (PID: 6600)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Full-Setup.exe (PID: 6252)
      • cmd.exe (PID: 6300)
    • The process executes Powershell scripts

      • Deck.com (PID: 6600)
    • Starts POWERSHELL.EXE for commands execution

      • Deck.com (PID: 6600)
    • Executing commands from ".cmd" file

      • Full-Setup.exe (PID: 6252)
    • Get information on the list of running processes

      • cmd.exe (PID: 6300)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6300)
    • Application launched itself

      • cmd.exe (PID: 6300)
    • The executable file from the user directory is run by the CMD process

      • Deck.com (PID: 6600)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6300)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6300)
  • INFO

    • Checks supported languages

      • Full-Setup.exe (PID: 6252)
      • Deck.com (PID: 6600)
    • Reads the computer name

      • Full-Setup.exe (PID: 6252)
      • Deck.com (PID: 6600)
    • Creates a new folder

      • cmd.exe (PID: 6536)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5696)
    • Reads mouse settings

      • Deck.com (PID: 6600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 929280
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
15
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start full-setup.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs deck.com choice.exe no specs rundll32.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4544\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5268C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5696powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\0M2RH4UHEY95GR1R2.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeDeck.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6252"C:\Users\admin\AppData\Local\Temp\Full-Setup.exe" C:\Users\admin\AppData\Local\Temp\Full-Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\full-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6300"C:\Windows\System32\cmd.exe" /c copy Helpful Helpful.cmd && Helpful.cmdC:\Windows\SysWOW64\cmd.exeFull-Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6308\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6364tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6372findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6476tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6484findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 971
Read events
4 971
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
20
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Statewidebinary
MD5:F7F687596B72D977091FA9FF84B5F80B
SHA256:4D80F1C9B556637B34C1302511895610CBFC5091D35AB886B05B991F2E472688
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Jerseybinary
MD5:29D8AAD9E545A6CA503CE8D531DA9727
SHA256:ED091CE32AAEA8383A7785E408DF8D737565DD9794DB44FD8BA4709FAF4D567F
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Responsiblebinary
MD5:90CE9B0B909A9395ED1111417EA1EC09
SHA256:E36754FE776C980009DB28398E66C53ADDA54A1383E80CE126F3AE3367C41564
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Dealtimebinary
MD5:C50AC91AA716AC237DD5C931289F3835
SHA256:8F299656FF3188FA2F280B44730F7BB893D21D7BB8B4601B7231CCCC1FD9DD73
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Notesbinary
MD5:2C81363EA7292FE40971EF0071CFD556
SHA256:5AC86485F95A645B426EBC260682A4C8BB4B0244BC513A78E8B803EC886262A9
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Ownsbinary
MD5:4DCC0651F06907B0B810EEA8ACBF7344
SHA256:EAB4F204945E33EC009D65ED23C3AF37015B7249D45AAAC62645945BFA077C8E
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Stagebinary
MD5:9AEEBB5F9F89B5302C1C24C9D7240F0F
SHA256:3835C84D15B7FFFB2AE04861A090C6E460A61FAF4AEAD221C0AB9BF476498F99
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Subsequentlybinary
MD5:DF15BDB6E3C11993944084FC4DA6BE65
SHA256:D22A73ACF85A081126B9E508A43A11E45693B44C79E3AD0C5685953805C72F0B
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Witbinary
MD5:9054F59675F805FD5A8C893ABEF0D566
SHA256:474D0809EF0B3B2D96864A04984600A91B89FEB1C9A98365A35DCEF5EC52F8D6
6252Full-Setup.exeC:\Users\admin\AppData\Local\Temp\Devicebinary
MD5:A0F8FD38DB727DA3999A25A1B7C3960C
SHA256:708E90609A0641F1386E22C24BFCC879E341710A50712F8CEBECDB741D6CF6B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
36
DNS requests
15
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3040
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3040
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3680
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3680
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6688
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3040
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3040
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
EDGECAST
US
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
kVYDksSPwBziW.kVYDksSPwBziW
unknown
login.live.com
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.74
  • 20.190.160.22
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
formydamagero.click
  • 188.114.96.3
  • 188.114.97.3
unknown
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
6600
Deck.com
Misc activity
ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Pastebin Service Domain in DNS Lookup (rentry .co)
No debug info