| File name: | ss.exe |
| Full analysis: | https://app.any.run/tasks/8f5dd83a-5bb7-46d0-88fc-813226344d02 |
| Verdict: | Malicious activity |
| Analysis date: | April 22, 2025, 20:22:00 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 3 sections |
| MD5: | 8CA572FF77812738BD5BEA4BF84617DF |
| SHA1: | DEB81E769B9DF5F15952EE862754287A42919B7C |
| SHA256: | 1DF1F9843E01CAA132D7C700CF1B79E7F1B861C5F28BE05F11E7903B056C2454 |
| SSDEEP: | 98304:DbZe51ipHoPErHxafhcPd6FcWetW1r/rWZunuQxaeFSbXR95xXQbAEWZzJMg4gpx:b6v1MzsPouA0RlrHNO |
| .exe | | | Win64 Executable (generic) (47) |
|---|---|---|
| .exe | | | UPX compressed Win32 Executable (46.1) |
| .exe | | | Generic Win/DOS Executable (3.4) |
| .exe | | | DOS Executable Generic (3.4) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 3 |
| CodeSize: | 7864320 |
| InitializedDataSize: | 4096 |
| UninitializedDataSize: | 7528448 |
| EntryPoint: | 0xeae300 |
| OSVersion: | 6.1 |
| ImageVersion: | 1 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4776 | "C:\Users\admin\AppData\Local\Temp\ss.exe" | C:\Users\admin\AppData\Local\Temp\ss.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 6944 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | ss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7348 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7380 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4776 | ss.exe | C:\Users\admin\dd | text | |
MD5:697ADD4E4979DB8EBBD3B4B41A6E07CF | SHA256:978E1AC7530B5C449749D23E9B0D9B210B1CDCC5743E0F39FDF73A2615ED963F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.146:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4776 | ss.exe | GET | 200 | 104.22.30.153:80 | http://myip.ipip.net/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 178.128.136.86:30003 | http://mainnet-seed-0003.nkn.org:30003/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 178.128.136.86:30003 | http://mainnet-seed-0003.nkn.org:30003/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 178.128.136.86:30003 | http://mainnet-seed-0003.nkn.org:30003/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 178.128.136.86:30003 | http://mainnet-seed-0003.nkn.org:30003/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 159.203.149.242:30003 | http://seed.nkn.org:30003/ | unknown | — | — | unknown |
4776 | ss.exe | POST | 200 | 159.203.149.242:30003 | http://mainnet-seed-0001.nkn.org:30003/ | unknown | — | — | malicious |
4776 | ss.exe | POST | 200 | 159.203.149.242:30003 | http://mainnet-seed-0001.nkn.org:30003/ | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.48.23.146:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5216 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4776 | ss.exe | 104.22.30.153:80 | myip.ipip.net | CLOUDFLARENET | — | malicious |
4776 | ss.exe | 159.203.149.242:30003 | mainnet-seed-0001.nkn.org | DIGITALOCEAN-ASN | US | malicious |
4776 | ss.exe | 138.197.233.137:30003 | mainnet-seed-0002.nkn.org | DIGITALOCEAN-ASN | US | malicious |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
myip.ipip.net |
| malicious |
mainnet-seed-0001.nkn.org |
| malicious |
seed.nkn.org |
| unknown |
mainnet-seed-0004.nkn.org |
| malicious |
mainnet-seed-0003.nkn.org |
| malicious |
mainnet-seed-0002.nkn.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
4776 | ss.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
4776 | ss.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
4776 | ss.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
4776 | ss.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
4776 | ss.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
4776 | ss.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
4776 | ss.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
4776 | ss.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
4776 | ss.exe | Misc activity | ET INFO Observed Initial New Kind of Network (NKN) POST Request |
4776 | ss.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |