File name:

ss.exe

Full analysis: https://app.any.run/tasks/8f5dd83a-5bb7-46d0-88fc-813226344d02
Verdict: Malicious activity
Analysis date: April 22, 2025, 20:22:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
websocket
golang
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 3 sections
MD5:

8CA572FF77812738BD5BEA4BF84617DF

SHA1:

DEB81E769B9DF5F15952EE862754287A42919B7C

SHA256:

1DF1F9843E01CAA132D7C700CF1B79E7F1B861C5F28BE05F11E7903B056C2454

SSDEEP:

98304:DbZe51ipHoPErHxafhcPd6FcWetW1r/rWZunuQxaeFSbXR95xXQbAEWZzJMg4gpx:b6v1MzsPouA0RlrHNO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Connects to unusual port

      • ss.exe (PID: 4776)
  • INFO

    • Checks supported languages

      • ss.exe (PID: 4776)
    • Reads the computer name

      • ss.exe (PID: 4776)
    • Attempting to connect via WebSocket

      • ss.exe (PID: 4776)
    • Detects GO elliptic curve encryption (YARA)

      • ss.exe (PID: 4776)
    • Application based on Golang

      • ss.exe (PID: 4776)
    • UPX packer has been detected

      • ss.exe (PID: 4776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (47)
.exe | UPX compressed Win32 Executable (46.1)
.exe | Generic Win/DOS Executable (3.4)
.exe | DOS Executable Generic (3.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 3
CodeSize: 7864320
InitializedDataSize: 4096
UninitializedDataSize: 7528448
EntryPoint: 0xeae300
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows command line
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ss.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4776"C:\Users\admin\AppData\Local\Temp\ss.exe" C:\Users\admin\AppData\Local\Temp\ss.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpdc.dll
6944\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exess.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7348C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7380"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
528
Read events
528
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4776ss.exeC:\Users\admin\ddtext
MD5:697ADD4E4979DB8EBBD3B4B41A6E07CF
SHA256:978E1AC7530B5C449749D23E9B0D9B210B1CDCC5743E0F39FDF73A2615ED963F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
48
DNS requests
20
Threats
66

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.146:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4776
ss.exe
GET
200
104.22.30.153:80
http://myip.ipip.net/
unknown
malicious
4776
ss.exe
POST
200
178.128.136.86:30003
http://mainnet-seed-0003.nkn.org:30003/
unknown
malicious
4776
ss.exe
POST
200
178.128.136.86:30003
http://mainnet-seed-0003.nkn.org:30003/
unknown
malicious
4776
ss.exe
POST
200
178.128.136.86:30003
http://mainnet-seed-0003.nkn.org:30003/
unknown
malicious
4776
ss.exe
POST
200
178.128.136.86:30003
http://mainnet-seed-0003.nkn.org:30003/
unknown
malicious
4776
ss.exe
POST
200
159.203.149.242:30003
http://seed.nkn.org:30003/
unknown
unknown
4776
ss.exe
POST
200
159.203.149.242:30003
http://mainnet-seed-0001.nkn.org:30003/
unknown
malicious
4776
ss.exe
POST
200
159.203.149.242:30003
http://mainnet-seed-0001.nkn.org:30003/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.146:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5216
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4776
ss.exe
104.22.30.153:80
myip.ipip.net
CLOUDFLARENET
malicious
4776
ss.exe
159.203.149.242:30003
mainnet-seed-0001.nkn.org
DIGITALOCEAN-ASN
US
malicious
4776
ss.exe
138.197.233.137:30003
mainnet-seed-0002.nkn.org
DIGITALOCEAN-ASN
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.48.23.146
  • 23.48.23.156
  • 23.48.23.145
  • 23.48.23.139
  • 23.48.23.150
  • 23.48.23.147
  • 23.48.23.140
  • 23.48.23.143
  • 23.48.23.158
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
myip.ipip.net
  • 104.22.30.153
  • 104.22.31.153
  • 172.67.22.102
malicious
mainnet-seed-0001.nkn.org
  • 159.203.149.242
malicious
seed.nkn.org
  • 159.203.149.242
unknown
mainnet-seed-0004.nkn.org
  • 139.59.192.106
malicious
mainnet-seed-0003.nkn.org
  • 178.128.136.86
malicious
mainnet-seed-0002.nkn.org
  • 138.197.233.137
malicious

Threats

PID
Process
Class
Message
4776
ss.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
4776
ss.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
4776
ss.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
4776
ss.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
4776
ss.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
4776
ss.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
4776
ss.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
4776
ss.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
4776
ss.exe
Misc activity
ET INFO Observed Initial New Kind of Network (NKN) POST Request
4776
ss.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
No debug info