analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Autodesk_Domain Script.exe

Full analysis: https://app.any.run/tasks/3c2a599a-b2dc-4623-9a41-4ca3c5e0fb57
Verdict: Malicious activity
Analysis date: January 17, 2019, 16:23:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

19C6A604B6955DB4984B5E16E2222AE1

SHA1:

D2200ED292E5D0FDB69FADB626B61C05E29B36AA

SHA256:

18C89E9368EEAAAA5F2D2F20740C81E3839E9359E3783D0391170A45E9D5B244

SSDEEP:

384:DCIiV728hUQ7Y2P/cVEccDdye7kjlWLe7grPiA8jyrMPhTjanbBoZlV8x6aNJawA:DCRGuY2P0Vo6r7SiAwyrMRjbryxLnbca

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Uses SYSTEMINFO.EXE to read environment

      • cmd.exe (PID: 1736)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2828)
      • Autodesk_Domain Script.exe (PID: 2692)
      • cmd.exe (PID: 1736)
    • Application launched itself

      • cmd.exe (PID: 1736)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:07 07:33:08+01:00
PEType: PE32
LinkerVersion: 2.5
CodeSize: 24576
InitializedDataSize: 4096
UninitializedDataSize: 49152
EntryPoint: 0x11620
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 07-Feb-2009 06:33:08

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 07-Feb-2009 06:33:08
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x0000C000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x0000D000
0x00006000
0x00005200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.91554
.rsrc
0x00013000
0x00001000
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.5209

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.92322
611
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
B
0
13572
Latin 1 / Western European
UNKNOWN
RT_RCDATA
N
4.62352
26
Latin 1 / Western European
UNKNOWN
RT_RCDATA
O
2.58496
6
Latin 1 / Western European
UNKNOWN
RT_RCDATA

Imports

COMCTL32.dll
GDI32.dll
KERNEL32.DLL
MSVCRT.dll
OLE32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
112
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start autodesk_domain script.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs systeminfo.exe no specs find.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs wmic.exe no specs msiexec.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe regedit.exe no specs regedit.exe no specs regedit.exe regedit.exe no specs regedit.exe no specs regedit.exe regedit.exe no specs regedit.exe no specs regedit.exe regedit.exe no specs regedit.exe no specs regedit.exe regedit.exe no specs regedit.exe no specs regedit.exe find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs wmic.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs xcopy.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs robocopy.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2692"C:\Users\admin\AppData\Local\Temp\Autodesk_Domain Script.exe" C:\Users\admin\AppData\Local\Temp\Autodesk_Domain Script.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1736cmd /c ""C:\Users\admin\AppData\Local\Temp\906F.tmp\Autodesk_Domain Script.bat" "C:\Windows\system32\cmd.exeAutodesk_Domain Script.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
16
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2828C:\Windows\system32\cmd.exe /c echo:|dateC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3060C:\Windows\system32\cmd.exe /S /D /c" echo:"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3112C:\Windows\system32\cmd.exe /S /D /c" date"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3720C:\Windows\system32\cmd.exe /c date/tC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3988C:\Windows\system32\cmd.exe /c echo 20190117C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2196SYSTEMINFO C:\Windows\system32\systeminfo.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Displays system information
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2408FIND /i "Install Date" C:\USER-PC_1\system_details.txtC:\Windows\system32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2948regedit /e c:\USER-PC_1\deployed_products.txt hkey_local_machine\software\microsoft\windows\currentversion\uninstallC:\Windows\regedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Editor
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
548
Read events
507
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
1736cmd.exeC:\USER-PC_1\local_4.csv
MD5:
SHA256:
1736cmd.exeC:\USER-PC_1\review.csv
MD5:
SHA256:
1736cmd.exeC:\USER-PC_1\local.txttext
MD5:0C7627D9AAC19C86BF8F7415DD8FB814
SHA256:F41C222D6FB3B7691F6AAEBE3CDF4993562A34B2F7CA6F640F5DEEE6F93C5756
1736cmd.exeC:\USER-PC_1\system_details.txttext
MD5:5308E713ADBB2B76FACA2E8CA95A1BAF
SHA256:A5A06BF33C3AE858CDC422169EAE996C94469A36D16EDC37823C596B5472E66F
2692Autodesk_Domain Script.exeC:\Users\admin\AppData\Local\Temp\906F.tmp\Autodesk_Domain Script.battext
MD5:1EAA6C8BC3EF3316091197E0EE785BCC
SHA256:0F7EC4E67583D1473F9F306D829967971B8E99B4AC1FC6AC8E8B23912D091ECF
2164regedit.exeC:\USER-PC_1\deployed_products.txttext
MD5:C43F16C6191F79FA4BD20DC01CFDF50F
SHA256:F81AA0066152DE563CA05E669A6F2072669B2B9334D54C059CFCF809E9CC4E9F
1736cmd.exeC:\USER-PC_1\USER-PC_1.txttext
MD5:9E76BDBCE70E7840E4A999B19834CFF3
SHA256:0B14837B019D860A970DA6117233338A4AC579DBA80A8EB94B5614BD626DF4E3
1736cmd.exeC:\USER-PC_1\local_4.txttext
MD5:550759D1425C47B38CBF896585449EF4
SHA256:0443A35583D3E1EC9FF99DCADC767CEC14B9671AA89416D76218FB8DC7265BD4
1736cmd.exeC:\USER-PC_1\review.txttext
MD5:FB07BCE2C8E2E6F30AFE078C9D52F087
SHA256:400306D838D79F08A3523AD9EE170AFFF0D6A3FF239A9057EE2FEB82466C807E
2748regedit.exeC:\USER-PC_1\local_2.txttext
MD5:FEE955AC41D26E7CB346808B1970B83C
SHA256:EE99C93FE48922BC59509489F2991642EF2B8BB740F2A9CA3643CC55A168F587
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info