File name:

24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe

Full analysis: https://app.any.run/tasks/c8458bab-7753-4c3f-871f-0d67b8f5f3ad
Verdict: Malicious activity
Analysis date: December 29, 2023, 06:17:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5:

5DB75E816B4CEF5CC457F0C9E3FC4100

SHA1:

2A1461189052A014D345444557611AF0C9D3FE34

SHA256:

24FD571600DCC00BF2BB8577C7E4FD67275F7D19D852B909395BEBCBB1274E04

SSDEEP:

384:yoThB1LgDSa1YjvCyau1/LyFOfH7DlZVkStmvptYcFm7B03K:yo/1LoSnyFOv7Dl3oBtYcFm7B6K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
  • INFO

    • Reads the computer name

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
    • Checks supported languages

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
    • Reads the machine GUID from the registry

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
    • Creates files or folders in the user directory

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
    • Connects to unusual port

      • 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe (PID: 2824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2068:05:18 10:52:37+02:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 9728
InitializedDataSize: 14336
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: VMSearch
FileVersion: 1.0.0.0
InternalName: VMSearch.exe
LegalCopyright: Copyright © 2023
LegalTrademarks: -
OriginalFileName: VMSearch.exe
ProductName: VMSearch
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2824"C:\Users\admin\AppData\Local\Temp\24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe" C:\Users\admin\AppData\Local\Temp\24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
VMSearch
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework64\v4.0.30319\mscoreei.dll
2984"cmd.exe"C:\Windows\System32\cmd.exe24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
210
Read events
210
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
282424fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeContext.urltext
MD5:60EEE5A9FA5888D88DCF7E5DE17EC240
SHA256:31A16F985260E7FE498B628023405F9588F01A0B479922638734A53B89ABB8D2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
10
DNS requests
0
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2824
24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
74.124.219.71:143
INMOTION
US
unknown
352
svchost.exe
224.0.0.252:5355
unknown
1220
svchost.exe
239.255.255.250:3702
whitelisted

DNS requests

No data

Threats

PID
Process
Class
Message
2824
24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
A Network Trojan was detected
ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
2824
24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
Successful Administrator Privilege Gain
GPL EXPLOIT Microsoft cmd.exe banner
2824
24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe
A Network Trojan was detected
ET MALWARE Win32/Suspected Reverse Shell Connection
No debug info