File name:

2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830

Full analysis: https://app.any.run/tasks/45dae19f-b181-4719-bc4e-9936b4c7dd48
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:06:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

F86802B1BB0A800E5C44F00199EFE411

SHA1:

03965BB688E2AF58383670B335C5E8F6BB316B61

SHA256:

2A0583BCA42E77DA30DFE87CD9416AB1788D1B4DDCEBABF6ED3276373AB41830

SSDEEP:

1536:BPl52z7Q707Q7Jts4hcWk7U+SK+a53nN3J3IEhzW:9lk7Q707Q7JtrOR+a5NZYEhK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • The process creates files with name similar to system file names

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • Executable content was dropped or overwritten

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
  • INFO

    • Creates files or folders in the user directory

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • Checks supported languages

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe

Process information

PID
CMD
Path
Indicators
Parent process
5628"C:\Users\admin\Desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe" C:\Users\admin\Desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 639
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
MD5:
SHA256:
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe.tmpexecutable
MD5:695EED021D24D5D484F20AD746E6F31C
SHA256:C18987BE908902257752DAAA95EC3596A4143EE42E2647C91CBCD7392D466AD0
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef_200_percent.pak.tmpexecutable
MD5:D3200AE037ADA947D49590D37F218E80
SHA256:C032E8A3FFE67663291A28CFA2A3A585B9C70351FC41C139670F6C70EB0FB15B
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb.tmpexecutable
MD5:B56135485926BC4D7C4B7F5CF285D04D
SHA256:D492EFBE6DD810BC8AFAB37ED57C50EF7FD8B3822E37A9671A44D57156D4086D
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.tmpexecutable
MD5:BE30DCAE6671F5FD394167055CD117FE
SHA256:35FA1A28D14AD11047656FB30FC901D8F705CC8FC0F0A5F09215670CC511C681
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:807BBD801979FEF9935DA872479BD95E
SHA256:C98A6B4EA4F45410577DABCE29844D713F6D811F40C43CF8050660478FE4A9A5
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:B658806195502C68AFE6226105D1774A
SHA256:EBAB154247F561344EBC3FC7E9CEC298A675603B7A93A577AEEE7870DFFF7496
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe.tmpexecutable
MD5:E945EC4DD94677B6FE7824D155B7C983
SHA256:3C03EC19A9DDD1B2EB57BB65CB6D5434B8A9CDD894C4CD9B69C9264101DE7592
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:CC53A676CD0D686275906DDDD875878F
SHA256:07846B4681F66714B009D6D5C5CB3D8D23AFAD82D723DA5F27C3948A3E109B07
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:0362FC4CAC8334D6C7C02E4D25394ECD
SHA256:EEBE691333C661218F71918AB0A1000AE7C0C0F979C6789D74A1BE57F76813C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
18
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
880
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
880
svchost.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
880
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
880
svchost.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
880
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
self.events.data.microsoft.com
  • 52.168.112.67
whitelisted

Threats

No threats detected
No debug info