File name:

2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830

Full analysis: https://app.any.run/tasks/45dae19f-b181-4719-bc4e-9936b4c7dd48
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:06:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

F86802B1BB0A800E5C44F00199EFE411

SHA1:

03965BB688E2AF58383670B335C5E8F6BB316B61

SHA256:

2A0583BCA42E77DA30DFE87CD9416AB1788D1B4DDCEBABF6ED3276373AB41830

SSDEEP:

1536:BPl52z7Q707Q7Jts4hcWk7U+SK+a53nN3J3IEhzW:9lk7Q707Q7JtrOR+a5NZYEhK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • Creates file in the systems drive root

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • The process creates files with name similar to system file names

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
  • INFO

    • Checks supported languages

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
    • Creates files or folders in the user directory

      • 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe (PID: 5628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe

Process information

PID
CMD
Path
Indicators
Parent process
5628"C:\Users\admin\Desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe" C:\Users\admin\Desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 639
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exe
MD5:
SHA256:
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmpexecutable
MD5:F4B7CE8E33EA1970AA1121C06AD392DA
SHA256:FD7913E48DDC580EC668454A81BF1B307265D50D2C917F67324CBE12E68C46F5
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:B658806195502C68AFE6226105D1774A
SHA256:EBAB154247F561344EBC3FC7E9CEC298A675603B7A93A577AEEE7870DFFF7496
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:AFC5BDC0321ED07008EABD99FD4FF174
SHA256:BCA4A98A3A0D1014A874EC9AE1E0AF2698EC09EB859693ABAB6F1DDC0E0E24D9
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:B8A7C32953363E10B4C07A9E8CF5BFF8
SHA256:D407D2227FA57EC8C663ED094BBD6EC975F5DA65F810E72384C8CEA8556AD2A5
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll.tmpexecutable
MD5:D645F8041A48D6AFF7556474DC3DBAC7
SHA256:C17EB9322BF87344FC57290C947EA6BB939C67BD78C894C850A668250579D491
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.tmpexecutable
MD5:7C4C9FA778AD2CA569079074CF29E708
SHA256:D1AD1AA67B9AC369A0F7AF59F45256DC28CD6AB418735F51E2754F03ED87AD3A
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:807BBD801979FEF9935DA872479BD95E
SHA256:C98A6B4EA4F45410577DABCE29844D713F6D811F40C43CF8050660478FE4A9A5
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb.tmpexecutable
MD5:B56135485926BC4D7C4B7F5CF285D04D
SHA256:D492EFBE6DD810BC8AFAB37ED57C50EF7FD8B3822E37A9671A44D57156D4086D
56282a0583bca42e77da30dfe87cd9416ab1788d1b4ddcebabf6ed3276373ab41830.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:CC53A676CD0D686275906DDDD875878F
SHA256:07846B4681F66714B009D6D5C5CB3D8D23AFAD82D723DA5F27C3948A3E109B07
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
18
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
880
svchost.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
880
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
880
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
880
svchost.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
880
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
self.events.data.microsoft.com
  • 52.168.112.67
whitelisted

Threats

No threats detected
No debug info