File name:

Windows-KB890830-x64-V5.129.exe

Full analysis: https://app.any.run/tasks/b56d26d9-fe79-42aa-8dda-a328cc865a80
Verdict: Malicious activity
Analysis date: October 27, 2024, 21:39:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

39DD9ECDC1A976A1D4C555BE8E132942

SHA1:

190DE3E8605CA4A962AC99AC63FB4A53F8F8C408

SHA256:

217B9AC9F79D16887087C978799A4702E6D3F353C163997FC74019924568D13C

SSDEEP:

12288:607SakZ6VKVIGM5zhuU5lydnggYWJXL/t78mOPeCXp167:607XB0IP5zhuU5UdnbYQXL/t78mOGCQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • hell.exe (PID: 6584)
    • Disables the Find the Start menu

      • reg.exe (PID: 4684)
    • Disables the Run the Start menu

      • reg.exe (PID: 2484)
    • Disables the Shutdown in the Start menu

      • reg.exe (PID: 6200)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • hell.exe (PID: 6584)
    • Process drops legitimate windows executable

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
    • Reads security settings of Internet Explorer

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • BluescreenSimulator.exe (PID: 6432)
    • Reads the date of Windows installation

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • BluescreenSimulator.exe (PID: 6432)
    • Starts CMD.EXE for commands execution

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • hell.exe (PID: 6584)
    • Executing commands from a ".bat" file

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
    • The executable file from the user directory is run by the CMD process

      • mbr.exe (PID: 5828)
      • hell.exe (PID: 6584)
      • BluescreenSimulator.exe (PID: 6432)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 6564)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6564)
    • Starts a Microsoft application from unusual location

      • hell.exe (PID: 6584)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 6564)
    • The system shut down or reboot

      • cmd.exe (PID: 6564)
  • INFO

    • Checks supported languages

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • mbr.exe (PID: 5828)
      • hell.exe (PID: 6584)
      • BluescreenSimulator.exe (PID: 6432)
      • SearchApp.exe (PID: 5536)
    • Reads the computer name

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • BluescreenSimulator.exe (PID: 6432)
      • SearchApp.exe (PID: 5536)
    • Create files in a temporary directory

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • hell.exe (PID: 6584)
    • The process uses the downloaded file

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • BluescreenSimulator.exe (PID: 6432)
    • Process checks computer location settings

      • Windows-KB890830-x64-V5.129.exe (PID: 6216)
      • BluescreenSimulator.exe (PID: 6432)
      • SearchApp.exe (PID: 5536)
    • Reads the machine GUID from the registry

      • BluescreenSimulator.exe (PID: 6432)
    • Checks proxy server information

      • SearchApp.exe (PID: 5536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:30 08:52:21+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware
PEType: PE32+
LinkerVersion: 2.5
CodeSize: 90624
InitializedDataSize: 260608
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 5.129.24100.1001
ProductVersionNumber: 5.129.24100.1001
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 5.129.24100.1001
ProductVersion: 5.129.24100.1001
ProductName: Malicious Software Removal Tool
OriginalFileName: mrtsrtub.exe
FileDescription: Microsoft Windows Malicious Software Removal Tool (KB890830)
LegalCopyright: @Microsoft Corporation. All rights reserved.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
184
Monitored processes
50
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start windows-kb890830-x64-v5.129.exe cmd.exe no specs conhost.exe no specs mbr.exe no specs taskkill.exe no specs reg.exe no specs hell.exe reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs bluescreensimulator.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs rundll32.exe no specs reg.exe no specs reg.exe no specs shutdown.exe no specs rundll32.exe no specs searchapp.exe no specs sppextcomobj.exe no specs slui.exe no specs windows-kb890830-x64-v5.129.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
512reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoStartMenuMyMusic /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1168reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1572\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1580reg add "HKLM\SOFTWARE\Microsoft\Internet Explorer\main\FeatureControl\Feature_LocalMachine_Lockdown" /v "IExplorer" /d 0 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2184"C:\Users\admin\AppData\Local\Temp\Windows-KB890830-x64-V5.129.exe" C:\Users\admin\AppData\Local\Temp\Windows-KB890830-x64-V5.129.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\windows-kb890830-x64-v5.129.exe
c:\windows\system32\ntdll.dll
2236reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoStartMenuMorePrograms /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2484reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoRun /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3028reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoNetworkConnections /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3076reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoChangeStartMenu /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3604reg add "hkcu\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v disabletaskmgr /t REG_DWORD /d 1 /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
2 890
Read events
2 846
Write events
43
Delete events
1

Modification events

(PID) Process:(6740) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:ForceActiveDesktopOn
Value:
0
(PID) Process:(6740) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoActiveDesktop
Value:
1
(PID) Process:(6740) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoActiveDesktopChanges
Value:
1
(PID) Process:(6740) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoDesktop
Value:
1
(PID) Process:(6584) hell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:wextract_cleanup0
Value:
rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\"
(PID) Process:(6584) hell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:wextract_cleanup0
Value:
rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\"
(PID) Process:(6044) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoDrives
Value:
67108863
(PID) Process:(6328) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoViewOnDrive
Value:
67108863
(PID) Process:(6868) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Internet Explorer\Restrictions
Operation:writeName:NoSelectDownloadDir
Value:
1
(PID) Process:(5600) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Internet Explorer\Restrictions
Operation:writeName:NoFindFiles
Value:
1
Executable files
3
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
5828mbr.exe\Device\Harddisk0\DR0
MD5:
SHA256:
6216Windows-KB890830-x64-V5.129.exeC:\Users\admin\AppData\Local\Temp\B743.tmp\B744.tmp\B745.battext
MD5:BB5C4F7B6EC04B17B0BEE492DDC56A3F
SHA256:18A5761E2821306174F6695FCFA7728A965673337477FB09DEFCB7B940A08181
6216Windows-KB890830-x64-V5.129.exeC:\Users\admin\AppData\Local\Temp\1.regtext
MD5:F976E9E0FABC4ED83D70F5841D82E2C9
SHA256:4A9C129CF86CA4D0558CA606DDDDC8FA121E1CD88B4D032096E66C566C8CA6D2
6216Windows-KB890830-x64-V5.129.exeC:\Users\admin\AppData\Local\Temp\hell.exeexecutable
MD5:10855184AB68478755E98E24A85643DB
SHA256:9EA366DD1FE870B55088B4123D04178747092AE4CFDBE335F0D4AC2B2EB80E56
6584hell.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\BluescreenSimulator.exeexecutable
MD5:647AF7197C5B9AA9D309EA47233D3134
SHA256:3A0F137E7B29FB6EC6636104D95588D4155CB188734299B61A87120FADEB6C9B
6584hell.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\commandtext
MD5:7D5002295C1CC544079EEBB8990170A5
SHA256:1EF00C08FC3A66F57920E09EC46459C3CF1567B44DAE1E09DBAD37A154F2AB92
6216Windows-KB890830-x64-V5.129.exeC:\Users\admin\AppData\Local\Temp\mbr.exeexecutable
MD5:09A02FF6A69E7ED4E7A6FA77593C101E
SHA256:13919BD650176D8A67255B2676432BC099E29CEDF2779F63E42A734D4C971FC7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
37
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2364
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4476
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4476
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5688
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1764
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.124.78.146
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.177
  • 104.126.37.128
  • 104.126.37.170
  • 104.126.37.162
  • 104.126.37.176
  • 104.126.37.160
  • 104.126.37.123
  • 104.126.37.137
  • 2.23.209.140
  • 2.23.209.182
  • 2.23.209.176
  • 2.23.209.148
  • 2.23.209.189
  • 2.23.209.179
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.149
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.136
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.74
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info