File name:

273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe

Full analysis: https://app.any.run/tasks/6d74225b-8e02-4a6c-9545-b907ccbf28e2
Verdict: Malicious activity
Analysis date: January 10, 2025, 21:10:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections
MD5:

6B7DC1B91B2EEFA7A408902219B64A2F

SHA1:

1B06A3413BBBCF1DA029375840806D05AEF8BFDF

SHA256:

273A61EB82104B8252E1328BD9650CFBC2FDD47031D856D993EB96CE958D6D63

SSDEEP:

3072:cpDSvVVVVVVVVwSQcxpDSvVVVVVVVVwSQc2:cdSvVVVVVVVVwStdSvVVVVVVVVwSS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
    • The process creates files with name similar to system file names

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
    • Executable content was dropped or overwritten

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
  • INFO

    • Creates files or folders in the user directory

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
    • UPX packer has been detected

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
    • Checks supported languages

      • 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe (PID: 5308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (30.9)
.exe | Win64 Executable (generic) (27.3)
.exe | UPX compressed Win32 Executable (26.8)
.dll | Win32 Dynamic Link Library (generic) (6.5)
.exe | Win32 Executable (generic) (4.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x2130
UninitializedDataSize: 24576
InitializedDataSize: 4096
CodeSize: 8192
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
TimeStamp: 2011:03:15 04:06:07+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe

Process information

PID
CMD
Path
Indicators
Parent process
5308"C:\Users\admin\Desktop\273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe" C:\Users\admin\Desktop\273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 535
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exe
MD5:
SHA256:
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:3253517008AC25EB1021A458D2D63DD2
SHA256:34C3CB97F999833E93C5D6878063D2B5D6C368534CFC4624A3C5953B56FFB602
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:C60AC3571089B2C03E2A8F14D7CBA0CF
SHA256:D890A9C3F4EF1AE7019348FB3DE6F9DD967B40F4AE60F254F40BC768CBE894D6
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll.tmpexecutable
MD5:E955A1DAFAF051A134BCF8C4D66CF603
SHA256:FC74C9856D234A2BEDD03AC661558DB4F483C2062F913B1C5F00A36C63CAF7D4
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:F7B8484C27755C953E03FD09C1B300DD
SHA256:980C807BB595F4D426987D62E3B940B2A03C52A45DB21C525F254FB7D4292E97
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmpexecutable
MD5:B02C947B77A03040E0DCBD668746161A
SHA256:CDAC8D5EE0BD47B35CD93383F53452234026C4D08AA6B8BC88AC795C7CDE4E7A
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmpexecutable
MD5:7C7B539D858F2704BBF4F7233027C887
SHA256:C3F2E766D7A68D9D2D6920BD32D96EC4B6FC21F012E0F1F1462A7C1C9F868454
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.tmpexecutable
MD5:51B0BAB098B1B6E1D10FB1E1AC643CCF
SHA256:696762079697295D7E34F498D950E961B0AF5956F133B9F68B81A2526CF526B1
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.tmpexecutable
MD5:7BE9ECBD36D89BD0BD2512ABCCF13705
SHA256:8CC1528DE487390EA45C60F8EBC5EDF5899FBB691C13B7E41E97237C78B9843F
5308273a61eb82104b8252e1328bd9650cfbc2fdd47031d856d993eb96ce958d6d63.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe.tmpexecutable
MD5:8746E9EAC5CA2557273CB78BFFDF01FE
SHA256:FAB4671BF66D514F4E1C67CE3997B6BC57E8B50EDC63E949475073013DC0B996
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
23
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4536
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4536
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4536
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4536
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4536
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
self.events.data.microsoft.com
  • 13.70.79.200
whitelisted

Threats

No threats detected
No debug info