| File name: | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe |
| Full analysis: | https://app.any.run/tasks/c8458bab-7753-4c3f-871f-0d67b8f5f3ad |
| Verdict: | Malicious activity |
| Analysis date: | December 29, 2023, 06:17:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows |
| MD5: | 5DB75E816B4CEF5CC457F0C9E3FC4100 |
| SHA1: | 2A1461189052A014D345444557611AF0C9D3FE34 |
| SHA256: | 24FD571600DCC00BF2BB8577C7E4FD67275F7D19D852B909395BEBCBB1274E04 |
| SSDEEP: | 384:yoThB1LgDSa1YjvCyau1/LyFOfH7DlZVkStmvptYcFm7B03K:yo/1LoSnyFOv7Dl3oBtYcFm7B6K |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2068:05:18 10:52:37+02:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 48 |
| CodeSize: | 9728 |
| InitializedDataSize: | 14336 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | VMSearch |
| FileVersion: | 1.0.0.0 |
| InternalName: | VMSearch.exe |
| LegalCopyright: | Copyright © 2023 |
| LegalTrademarks: | - |
| OriginalFileName: | VMSearch.exe |
| ProductName: | VMSearch |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2824 | "C:\Users\admin\AppData\Local\Temp\24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe" | C:\Users\admin\AppData\Local\Temp\24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: VMSearch Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2984 | "cmd.exe" | C:\Windows\System32\cmd.exe | — | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2824 | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeContext.url | text | |
MD5:60EEE5A9FA5888D88DCF7E5DE17EC240 | SHA256:31A16F985260E7FE498B628023405F9588F01A0B479922638734A53B89ABB8D2 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2824 | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | 74.124.219.71:143 | — | INMOTION | US | unknown |
352 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1220 | svchost.exe | 239.255.255.250:3702 | — | — | — | whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2824 | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | A Network Trojan was detected | ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND |
2824 | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | Successful Administrator Privilege Gain | GPL EXPLOIT Microsoft cmd.exe banner |
2824 | 24fd571600dcc00bf2bb8577c7e4fd67275f7d19d852b909395bebcbb1274e04.exe | A Network Trojan was detected | ET MALWARE Win32/Suspected Reverse Shell Connection |