File name:

28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335

Full analysis: https://app.any.run/tasks/37fcd7d7-6722-4433-bc31-20b38541468a
Verdict: Malicious activity
Analysis date: January 10, 2025, 18:34:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

4441DE8460EBCEEB46680832F1780860

SHA1:

5F351EAB56BFAAA0EAF7D03FF4FBB6FD6DF0FAC3

SHA256:

28132E1015622452AD4E449031910968D4C5B85D180DE1211A34B0AC9BA7F335

SSDEEP:

49152:OHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZt:PAGQX21RBt7QjTmcaTH/vU4do9Pcjq1h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes application which crashes

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
  • INFO

    • Reads mouse settings

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6304)
    • Create files in a temporary directory

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
    • The process uses AutoIt

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
    • Checks proxy server information

      • WerFault.exe (PID: 6304)
    • Reads the software policy settings

      • WerFault.exe (PID: 6304)
    • The sample compiled with english language support

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
    • Checks supported languages

      • 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe (PID: 2072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:01 23:31:35+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 623104
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe svchost.exe no specs werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2072"C:\Users\admin\AppData\Local\Temp\28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe" C:\Users\admin\AppData\Local\Temp\28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
3732"C:\Users\admin\AppData\Local\Temp\28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe" C:\Windows\SysWOW64\svchost.exe28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6304C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2072 -s 760C:\Windows\SysWOW64\WerFault.exe
28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 096
Read events
3 096
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
8
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6304WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_28132e1015622452_d62031a2dfb8f983f53befbea5cea97d32ef7fa_fddc0755_7602af10-017f-468d-bcba-a88c3cdb413a\Report.wer
MD5:
SHA256:
6304WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
207228132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exeC:\Users\admin\AppData\Local\Temp\aut51EC.tmpbinary
MD5:2572EE5DC98A7F0F61BB2E638EC70FB7
SHA256:32523E9C443A2033F3D6B3701BDD6A767FDCC676994469AB10B2CFEABF2F661F
207228132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exeC:\Users\admin\AppData\Local\Temp\gobioidbinary
MD5:2572EE5DC98A7F0F61BB2E638EC70FB7
SHA256:32523E9C443A2033F3D6B3701BDD6A767FDCC676994469AB10B2CFEABF2F661F
6304WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\28132e1015622452ad4e449031910968d4c5b85d180de1211a34b0ac9ba7f335.exe.2072.dmpbinary
MD5:10875A28AFC3BA6AA482AFE88D4EFC42
SHA256:F6C0BE57ACDB36F8CB7905651DAF48F9BA53E875343FE3DE720D2E56D0F8731D
6304WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6304WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:EE4D3FDD02524757FDAF55EE29297549
SHA256:D2C2F673E65D4B66F7A3809EFA258BF40B2A54A1EC10BA3FE2E38ADC7A5609DA
6304WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER58B4.tmp.xmlxml
MD5:EA3895EB9B2A9D3D5AAD83042E1AA820
SHA256:A04EB68D056DFBCB43E24C6362DFDD3025C07028ADE3DAF89BCC88B3A0332107
6304WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5884.tmp.WERInternalMetadata.xmlxml
MD5:9508156BF751D5A543D3A2130B23BACF
SHA256:5D2029D3CEBFA4C3B28115F718C2894F47EEAC7CC823B6B4DE273FDBED50C3A5
6304WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:461C7F90462076DB15AF216789B06E72
SHA256:5B61853C0BA113CAEA5637E856B6A64BAF92E43D8BFD6D4D761421BB84757561
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
35
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6304
WerFault.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
900
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
900
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6304
WerFault.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6164
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
900
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
900
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 172.217.16.142
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
login.live.com
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.71
  • 20.190.159.73
  • 20.190.159.23
  • 40.126.31.73
  • 20.190.159.68
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info