File name:

EZHips - Copy.exe

Full analysis: https://app.any.run/tasks/38601f03-e8d8-490f-b5a5-67af4c050178
Verdict: Malicious activity
Analysis date: September 13, 2024, 12:55:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

60A5559FE6D4DE7BB6ADFF0F2FDD3988

SHA1:

3329E9B878BD6FC257CE38011738AAC173292687

SHA256:

1969392BE892C6F256C6B860DB6D073FEBFF9C435412A81C1CA2BFD2CE59D2EC

SSDEEP:

98304:tE9gdE+F+TviOsmwMz8avFuji0pEKXebgAVCPZwkD3Oe+R8RnSYenrtEriSK4DeP:FfMu8To

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • EZHips - Copy.exe (PID: 6216)
    • Executable content was dropped or overwritten

      • EZHips - Copy.exe (PID: 6216)
    • Uses WMIC.EXE to obtain CPU information

      • EZHips - Copy.exe (PID: 6216)
    • Uses WMIC.EXE to obtain data on the base board management (motherboard or system board)

      • EZHips - Copy.exe (PID: 6216)
    • Uses ATTRIB.EXE to modify file attributes

      • EZHips - Copy.exe (PID: 6216)
    • Starts SC.EXE for service management

      • EZHips - Copy.exe (PID: 6216)
    • Uses REG/REGEDIT.EXE to modify registry

      • EZHips - Copy.exe (PID: 6216)
    • Starts CMD.EXE for commands execution

      • EZHips - Copy.exe (PID: 6216)
  • INFO

    • Checks supported languages

      • EZHips - Copy.exe (PID: 6216)
      • java.exe (PID: 5904)
      • i4jdel0.exe (PID: 1748)
    • Create files in a temporary directory

      • EZHips - Copy.exe (PID: 6216)
      • java.exe (PID: 5904)
    • Creates files in the program directory

      • java.exe (PID: 5904)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 6880)
      • WMIC.exe (PID: 5032)
      • WMIC.exe (PID: 5656)
    • Reads the computer name

      • EZHips - Copy.exe (PID: 6216)
    • Reads the machine GUID from the registry

      • EZHips - Copy.exe (PID: 6216)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 6128)
    • Creates files or folders in the user directory

      • EZHips - Copy.exe (PID: 6216)
    • The process uses the downloaded file

      • mshta.exe (PID: 6128)
    • Checks proxy server information

      • mshta.exe (PID: 6128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2018:07:31 21:44:22+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 9
CodeSize: 186880
InitializedDataSize: 164352
UninitializedDataSize: -
EntryPoint: 0x18f28
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 5.0.1.1
ProductVersionNumber: 5.0.1.1
FileFlagsMask: 0x0017
FileFlags: Debug
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Beijing Huorong Network Technology Co., Ltd.
FileDescription: Huorong Internet Security
FileVersion: 5.0.1.1
LegalCopyright: Beijing Huorong Network Technology Co., Ltd.
ProductName: Huorong Internet Security
ProductVersion: 5.0.1.1
OriginalFileName: EZHips.exe
InternalName: Huorong Internet Security
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
28
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ezhips - copy.exe java.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs attrib.exe no specs attrib.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs mshta.exe no specs i4jdel0.exe no specs ezhips - copy.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240reg query "SOFTWARE\VMware, Inc.\VMware Tools"C:\Windows\System32\reg.exeEZHips - Copy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
872C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1748C:\Users\admin\AppData\Local\Temp\i4jdel0.exe i4j9110981897799539405.tmpC:\Users\admin\AppData\Local\Temp\i4jdel0.exeEZHips - Copy.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\i4jdel0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2992attrib C:\Users\admin\AppData\Roaming\Windows +HC:\Windows\System32\attrib.exeEZHips - Copy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
3268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3412\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3584\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5032wmic baseboard get SerialNumberC:\Windows\System32\wbem\WMIC.exeEZHips - Copy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
Total events
1 971
Read events
1 965
Write events
6
Delete events
0

Modification events

(PID) Process:(6216) EZHips - Copy.exeKey:HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\pids
Operation:writeName:c:\users\admin\appdata\local\temp\ezhips - copy.exe
Value:
6216
(PID) Process:(6216) EZHips - Copy.exeKey:HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/program files/java/jre1.8.0_271/bin/java.exe
Operation:writeName:LastWriteTime
Value:
FE850DA0993CD901
(PID) Process:(6216) EZHips - Copy.exeKey:HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/program files/java/jre1.8.0_271/bin/java.exe
Operation:writeName:Version
Value:
1.8.0_271
(PID) Process:(6128) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6128) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6128) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
3
Suspicious files
2
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\e4jB222.tmp_dir1726232116\exe4jlib.jarjava
MD5:35CDCD4A8A01AAA62DDE9A5F1B8702C9
SHA256:99374E9B2E4B7402C278C41D2EEF5A50CA8A7B36DC61357D4C6A01D5076861AF
6216EZHips - Copy.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\83aa4cc77f591dfc2374580bbd95f6ba_bb926e54-e3ca-40fd-ae90-2764341e7792dbf
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\e4jB33C.tmptext
MD5:E293057450F58A86C057A66EF68BA694
SHA256:298641C5A1DE57362FACB542457D295C3648DE04F07EDAC0D5B9642EE973D8CF
5904java.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:0ED594CE59B4BD3B5DD65DCDEC71C364
SHA256:4657420E3DDFE642AF0F465BC40E6D03773CBBA02339833E84BD31DC28A94F15
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\e4jB222.tmp_dir1726232116\Client-1.0.0-jar-with-dependencies.jarcompressed
MD5:F5FB656D75C6B42F45270CCA6F9782E7
SHA256:B13FBF0DAAD9FE5875CCF45B2CAB092741574A18D52F88A4D00B946FA68DAA76
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\i4j9110981897799539405.tmpbinary
MD5:F359DFE5BD4AB7F82D9C6AFCE35C96A6
SHA256:3C6A361FA7AAB6DE92F0BBD51600E343200C88A51786930EA2EA0A2BC7306EE8
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\e4jB222.tmp_dir1726232116\i4jdel.exeexecutable
MD5:F3541C34A88F52C13D709AF62F000055
SHA256:1C822B3773DA680B2575FE810E7880D4A6BF81A501E9100BBF951553A70B738F
6216EZHips - Copy.exeC:\Users\admin\AppData\Local\Temp\i4jdel0.exeexecutable
MD5:F3541C34A88F52C13D709AF62F000055
SHA256:1C822B3773DA680B2575FE810E7880D4A6BF81A501E9100BBF951553A70B738F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
22
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3448
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3448
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3424
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3424
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6232
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3448
SIHClient.exe
20.114.59.183:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.20
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info