File name:

Diamotrix.exe

Full analysis: https://app.any.run/tasks/5a9a973b-a710-4b5c-aff9-4c6591fe74d5
Verdict: Malicious activity
Analysis date: November 05, 2024, 16:05:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
payload
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

5C02B91B95C1DEC88BE1C6DD65674363

SHA1:

159532A2E92784220CD9617127CFB045B2DEBCA8

SHA256:

247004604614A3DA2B81C147C8F4A2848B62B8494244744BA213CE7E4F929CC3

SSDEEP:

384:c3+ZB+Mq/B8sHju0YUhX/GIsPDhxWBtIBDMKPJ3W4EU:ceEH/pIfDBy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • Diamotrix.exe (PID: 6664)
    • Executable content was dropped or overwritten

      • Diamotrix.exe (PID: 6664)
    • Process drops legitimate windows executable

      • Diamotrix.exe (PID: 6664)
    • Payload loading activity detected

      • explorer.exe (PID: 4616)
      • svchost.exe (PID: 5276)
  • INFO

    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4616)
    • The process uses the downloaded file

      • explorer.exe (PID: 4616)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 4616)
    • Checks proxy server information

      • explorer.exe (PID: 4616)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • explorer.exe (PID: 4616)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:05 02:41:14+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 10
CodeSize: 13312
InitializedDataSize: 10240
UninitializedDataSize: -
EntryPoint: 0x3218
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: System
FileVersion: 1.0.0.1
InternalName: Services.exe
LegalCopyright: Copyright (C) 2024
OriginalFileName: Services.exe
ProductName: Services
ProductVersion: 1.3.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start diamotrix.exe svchost.exe msiexec.exe no specs audiodg.exe no specs explorer.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1732"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4616C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\napinsp.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\pnrpnsp.dll
c:\windows\system32\wshbth.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\dnsapi.dll
5276"C:\WINDOWS\system32\svchost.exe"C:\Windows\System32\svchost.exe
Diamotrix.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6240C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6500"C:\WINDOWS\system32\audiodg.exe"C:\Windows\System32\audiodg.exeDiamotrix.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Audio Device Graph Isolation
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\audiodg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6564"C:\WINDOWS\system32\msiexec.exe"C:\Windows\System32\msiexec.exeDiamotrix.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6664"C:\Users\admin\AppData\Local\Temp\Diamotrix.exe" C:\Users\admin\AppData\Local\Temp\Diamotrix.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
System
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\diamotrix.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
1 778
Read events
1 727
Write events
49
Delete events
2

Modification events

(PID) Process:(4616) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(4616) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\MyApplicationTest
Operation:writeName:RunOnce
Value:
1
(PID) Process:(6664) Diamotrix.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Services
Value:
C:\Users\admin\AppData\Roaming\2F33566DA0B91573532102\2F33566DA0B91573532102.exe
(PID) Process:(6564) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Services
Value:
C:\Users\admin\AppData\Roaming\2F33566DA0B91573532102\2F33566DA0B91573532102.exe
(PID) Process:(6500) audiodg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
Operation:delete keyName:(default)
Value:
(PID) Process:(6500) audiodg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\StartupFolder
Operation:delete keyName:(default)
Value:
(PID) Process:(6500) audiodg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Services
Value:
C:\Users\admin\AppData\Roaming\2F33566DA0B91573532102\2F33566DA0B91573532102.exe
Executable files
1
Suspicious files
28
Text files
24
Unknown types
0

Dropped files

PID
Process
Filename
Type
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\chrome_shutdown_ms.txttext
MD5:D9D4F495E875A2E075A1A4A6E1B9770F
SHA256:25FC0E7096FC653718202DC30B0C580B8AB87EAC11A700CBA03A7C021BC35B0C
6664Diamotrix.exeC:\Users\admin\AppData\Roaming\2F33566DA0B91573532102\2F33566DA0B91573532102.exeexecutable
MD5:5C02B91B95C1DEC88BE1C6DD65674363
SHA256:247004604614A3DA2B81C147C8F4A2848B62B8494244744BA213CE7E4F929CC3
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\System_info.txttext
MD5:60B55F7B95AD3C1CF4A9E49B2D63A206
SHA256:6C860369775F0B2544A4C8AAC940F901E654B6E7EB59C73C10E2B4E973B0482C
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\Screenshot.jpgimage
MD5:EB3A04845F2E21E414C3B03D2D05E9C4
SHA256:12ABE19350D3A4827A195A8921D30D55848D48F6D7D375FB018E3EC5067A7239
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\System_info.txttext
MD5:60B55F7B95AD3C1CF4A9E49B2D63A206
SHA256:6C860369775F0B2544A4C8AAC940F901E654B6E7EB59C73C10E2B4E973B0482C
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\index.txtbinary
MD5:DC73B73D50D53D846488C30ABAE6D8E4
SHA256:0F823D2ED58E4004A9B5C33FE0C4DC13BDEE758B79DB83180261A5AE22F9A34A
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\throttle_store.dattext
MD5:9E4E94633B73F4A7680240A0FFD6CD2C
SHA256:41C91A9C93D76295746A149DCE7EBB3B9EE2CB551D84365FFF108E59A61CC304
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\edge_task_manager_close.txtbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\miniwallet.bundle.js.LICENSE.txttext
MD5:7BF61E84E614585030A26B0B148F4D79
SHA256:38ED54EB53300FDB6E997C39C9FC83A224A1FD9FA06A0B6D200AA12EA278C179
4616explorer.exeC:\Users\admin\AppData\Local\E7463081B18B2309132128\File_Grabber\Stream_Calendar_2_16F9D2F7077FC94A93B6F8F23A4C9AE2.datxml
MD5:2D3747BE801C6AA5E160F4C51BB25294
SHA256:3FAEE4A903687D77BFB85FAA433580ADFDAE2D319FB1A402D2B0FD47DC363194
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
44
DNS requests
17
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4616
explorer.exe
GET
200
176.111.174.140:80
http://176.111.174.140/api/xbot64.bin
unknown
unknown
4616
explorer.exe
POST
200
176.111.174.140:80
http://176.111.174.140/GrXRYWt.php?2F33566DA0B91573532102
unknown
unknown
5276
svchost.exe
GET
200
176.111.174.140:80
http://176.111.174.140/api/xloader.bin
unknown
unknown
4616
explorer.exe
GET
200
176.111.174.140:80
http://176.111.174.140/api/xstealer.bin
unknown
unknown
4616
explorer.exe
POST
200
176.111.174.140:80
http://176.111.174.140/GrXRYWt.php?2F33566DA0B91573532102
unknown
unknown
4616
explorer.exe
POST
200
176.111.174.140:80
http://176.111.174.140/GrXRYWt.php?2F33566DA0B91573532102
unknown
unknown
6384
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4616
explorer.exe
POST
200
176.111.174.140:80
http://176.111.174.140/win.php
unknown
malicious
5488
MoUsoCoreWorker.exe
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5276
svchost.exe
176.111.174.140:80
Chang Way Technologies Co. Limited
RU
malicious
4
System
192.168.100.255:138
whitelisted
4616
explorer.exe
176.111.174.140:80
Chang Way Technologies Co. Limited
RU
malicious
6944
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1752
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5488
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4360
SearchApp.exe
92.123.104.39:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6384
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6384
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 92.123.104.39
  • 92.123.104.38
  • 92.123.104.34
  • 92.123.104.45
  • 92.123.104.47
  • 92.123.104.37
  • 92.123.104.30
  • 92.123.104.33
  • 92.123.104.31
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.73
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.73
  • 40.126.31.71
whitelisted
th.bing.com
  • 92.123.104.24
  • 92.123.104.30
  • 92.123.104.26
  • 92.123.104.21
  • 92.123.104.19
  • 92.123.104.33
  • 92.123.104.29
  • 92.123.104.31
  • 92.123.104.34
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
5276
svchost.exe
Potentially Bad Traffic
ET HUNTING Generic .bin download from Dotted Quad
5276
svchost.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
5276
svchost.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
5276
svchost.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
4616
explorer.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
4616
explorer.exe
Potentially Bad Traffic
ET HUNTING Generic .bin download from Dotted Quad
4616
explorer.exe
Potentially Bad Traffic
ET HUNTING Generic .bin download from Dotted Quad
4616
explorer.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
5 ETPRO signatures available at the full report
No debug info