File name:

Eclipse.exe

Full analysis: https://app.any.run/tasks/cc37a312-1e39-46ef-9ca5-d3149db4e637
Verdict: Malicious activity
Analysis date: October 25, 2024, 21:18:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 6 sections
MD5:

67E3D7A3A9355D7EB9F7D842F528A3FC

SHA1:

6614B4F2949B1390B3A103D0FD47A958219DF0C7

SHA256:

1ED7514AB6ABCE7841E1745E56A4F679E698C3237F514D36C12A99B72C89F362

SSDEEP:

98304:8BTwfiXE+LVWjD7SoEByyvB9ioWFPRZBrrlcVhj1O6u+/ec+IxvgOBuFItcj5uMf:XLHjB74VOiq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • Eclipse.exe (PID: 5332)
    • Reads security settings of Internet Explorer

      • Eclipse.exe (PID: 5332)
    • The process checks if it is being run in the virtual environment

      • Eclipse.exe (PID: 5332)
    • Read disk information to detect sandboxing environments

      • Eclipse.exe (PID: 5332)
    • Executes application which crashes

      • Eclipse.exe (PID: 5332)
  • INFO

    • Reads the computer name

      • Eclipse.exe (PID: 5332)
    • Checks supported languages

      • Eclipse.exe (PID: 5332)
    • Sends debugging messages

      • Eclipse.exe (PID: 5332)
    • Reads Environment values

      • Eclipse.exe (PID: 5332)
    • Reads the machine GUID from the registry

      • Eclipse.exe (PID: 5332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win16/32 Executable Delphi generic (34.1)
.exe | Generic Win/DOS Executable (32.9)
.exe | DOS Executable Generic (32.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2100:12:23 02:02:39+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 5832192
InitializedDataSize: 1125888
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Eclipse
CompanyName: Eclipse
FileDescription: Eclipse
FileVersion: 1.0.0.0
InternalName: Eclipse.exe
LegalCopyright: Copyright © Eclipse 2024
LegalTrademarks: Eclipse
OriginalFileName: Eclipse.exe
ProductName: Eclipse
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start eclipse.exe svchost.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5332"C:\Users\admin\Desktop\Eclipse.exe" C:\Users\admin\Desktop\Eclipse.exe
explorer.exe
User:
admin
Company:
Eclipse
Integrity Level:
MEDIUM
Description:
Eclipse
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\eclipse.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5508C:\WINDOWS\system32\WerFault.exe -u -p 5332 -s 1796C:\Windows\System32\WerFault.exe
Eclipse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
Total events
7 115
Read events
7 115
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
5508WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Eclipse.exe_7dbcb04b3a193c9317665fda17636426a4c5961_74b68882_1acd22b3-93a7-4fe2-8555-e7a9ecb6a414\Report.wer
MD5:
SHA256:
5508WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Eclipse.exe.5332.dmp
MD5:
SHA256:
5508WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE71E.tmp.WERInternalMetadata.xmlxml
MD5:FDB954F4C06BB03A07E9DACF5CFE6AA2
SHA256:7FE06437254FBC12B7D54CBA0115AA127407B2B9227B52C53300E98A6CB1E31E
5508WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE75D.tmp.xmlxml
MD5:588C93255C4D87898B4041F443B6AF47
SHA256:D0A69F5CC9FBD85743356FF600CF36A05396FDAE3146C42D81D2B0733FABD804
5508WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE4BB.tmp.dmpbinary
MD5:C0EF33F309F1154E5DDE1C4C353B56B9
SHA256:44C4F8D37F0370A92D9FF0CD283756E25A9D611AD9BEBDB232FC62357EB534EC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
21
DNS requests
10
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5508
WerFault.exe
52.182.143.212:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 172.217.18.14
whitelisted
keyauth.win
  • 104.26.0.5
  • 104.26.1.5
  • 172.67.72.57
malicious
watson.events.data.microsoft.com
  • 52.182.143.212
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 13.89.179.9
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain in DNS Lookup (keyauth .win)
No debug info