File name:

Vimped.exe

Full analysis: https://app.any.run/tasks/fc583b0d-33d7-4360-814b-efc61507f70a
Verdict: Malicious activity
Analysis date: August 15, 2024, 14:04:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

EA51A0D165AA837310218755D8F9FAE6

SHA1:

4C0A5955D7C35D1F0D60B16C30AE1515BA6DF5B4

SHA256:

279BA9ACF9C05DFB7F91F56436A1F8C8A642C75128F32F9DD75496FA8F74C3AA

SSDEEP:

98304:tHfIKtXHAqvMi+nNF9bNY63RgIb1dPakI28wEFP50NAXT+Zb0W+HdTYw7rsRjB7g:x5RyijZwvHunP+aPT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Drops the executable file immediately after the start

      • Vimped.exe (PID: 6492)
      • ldrupd.bin (PID: 7012)
      • ldrupd.bin (PID: 4604)
      • Vimped.exe (PID: 7068)
    • Connects to unusual port

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Executable content was dropped or overwritten

      • Vimped.exe (PID: 6492)
      • ldrupd.bin (PID: 7012)
      • ldrupd.bin (PID: 4604)
      • Vimped.exe (PID: 7068)
    • Starts application with an unusual extension

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
    • Reads the date of Windows installation

      • Vimped.exe (PID: 7068)
      • ldrupd.bin (PID: 7012)
      • ldrupd.bin (PID: 4604)
      • Vimped.exe (PID: 6300)
    • Reads the Windows owner or organization settings

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Reads security settings of Internet Explorer

      • ldrupd.bin (PID: 7012)
      • ldrupd.bin (PID: 4604)
    • Starts CMD.EXE for commands execution

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Searches for installed software

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
  • INFO

    • Reads the computer name

      • Vimped.exe (PID: 6492)
      • ldrupd.bin (PID: 7012)
      • Vimped.exe (PID: 7068)
      • ldrupd.bin (PID: 4604)
      • Vimped.exe (PID: 6300)
    • Checks supported languages

      • Vimped.exe (PID: 6492)
      • ldrupd.bin (PID: 7012)
      • Vimped.exe (PID: 7068)
      • ldrupd.bin (PID: 4604)
      • Vimped.exe (PID: 6300)
    • Process checks whether UAC notifications are on

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Reads the machine GUID from the registry

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Creates files or folders in the user directory

      • Vimped.exe (PID: 6492)
      • Vimped.exe (PID: 7068)
    • Reads product name

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Reads Windows Product ID

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
    • Process checks computer location settings

      • ldrupd.bin (PID: 7012)
      • ldrupd.bin (PID: 4604)
    • Reads Environment values

      • Vimped.exe (PID: 7068)
      • Vimped.exe (PID: 6300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:06:29 12:58:30+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 1012736
InitializedDataSize: 408064
UninitializedDataSize: -
EntryPoint: 0x1581058
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start vimped.exe ldrupd.bin vimped.exe cmd.exe no specs cmd.exe no specs ldrupd.bin vimped.exe conhost.exe no specs cmd.exe no specs cmd.exe no specs vimped.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2384\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVimped.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2584"C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exeVimped.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
3044"C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exeVimped.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
4604"C:\Users\admin\AppData\Local\ldrupd.bin"C:\Users\admin\AppData\Local\ldrupd.bin
Vimped.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\ldrupd.bin
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6300"C:\Users\admin\Desktop\Vimped.exe" C:\Users\admin\Desktop\Vimped.exe
ldrupd.bin
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\vimped.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
6428"C:\Users\admin\Desktop\Vimped.exe" C:\Users\admin\Desktop\Vimped.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\vimped.exe
c:\windows\system32\ntdll.dll
6492"C:\Users\admin\Desktop\Vimped.exe" C:\Users\admin\Desktop\Vimped.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\vimped.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7012"C:\Users\admin\AppData\Local\ldrupd.bin"C:\Users\admin\AppData\Local\ldrupd.bin
Vimped.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\ldrupd.bin
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7068"C:\Users\admin\Desktop\Vimped.exe" C:\Users\admin\Desktop\Vimped.exe
ldrupd.bin
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\vimped.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7148"C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exeVimped.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
Total events
2 585
Read events
2 567
Write events
18
Delete events
0

Modification events

(PID) Process:(6492) Vimped.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DusmSvc\Settings
Operation:writeName:EthernetResetTime
Value:
5BC9EE8F1DEFDA01
(PID) Process:(7012) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(7012) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(7012) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(7012) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(7068) Vimped.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DusmSvc\Settings
Operation:writeName:EthernetResetTime
Value:
F09454941DEFDA01
(PID) Process:(4604) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4604) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4604) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4604) ldrupd.binKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
4
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7012ldrupd.binC:\Users\admin\Desktop\Vimped.exeexecutable
MD5:85877D16342CEA80354627B1E26BD1A5
SHA256:309D16AF0620DA1D4811BDBFFAC56CBE4CFBBB2B1A190073571E7EFE0B3F6B2A
7068Vimped.exeC:\Users\admin\AppData\Local\ldrupd.binexecutable
MD5:A24978A6B77E2CD99823E24C6EB4D055
SHA256:80AC94C086EB6E52BC3BBEBD86E0795F6CB7476153AF0C767B9AE4B7E9931140
4604ldrupd.binC:\Users\admin\Desktop\Vimped.exeexecutable
MD5:DAB3A08EA209356F50550C6EE1B3E6DD
SHA256:E5498F96CB76C5D3DEF0EBB08B9CDFB3EA80A9AA9A607202EC99AFBC9FBBF605
6492Vimped.exeC:\Users\admin\AppData\Local\ldrupd.binexecutable
MD5:A24978A6B77E2CD99823E24C6EB4D055
SHA256:80AC94C086EB6E52BC3BBEBD86E0795F6CB7476153AF0C767B9AE4B7E9931140
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
17
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3028
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
1248
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3028
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6492
Vimped.exe
51.222.31.217:3333
OVH SAS
CA
unknown
4324
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7068
Vimped.exe
51.222.31.217:3333
OVH SAS
CA
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted

Threats

No threats detected
No debug info