File name:

2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f

Full analysis: https://app.any.run/tasks/5a99893d-3a2f-4f31-9ff5-741502461477
Verdict: Malicious activity
Analysis date: January 10, 2025, 21:46:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
basun
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 3 sections
MD5:

BCE0F9B9D4B3137697F349C11A201943

SHA1:

9AEDF2693509BE9CC1E118ABBD5B1BB4974F07EB

SHA256:

2AD774B823ACF2B24ECB107C49A33DBDB9D4CD3801C59AFDA9DA338A47D5A08F

SSDEEP:

768:svuq8VubpcFHdjiqjAMs7sBjQtwIq57uoXSjrneTNMcuIv2dGn:svFpcF9WqjPs7sBjQqIpjeTNMcuIv2An

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
      • admin.exe (PID: 6012)
    • BASUN has been detected

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
      • admin.exe (PID: 6012)
    • Connects to the CnC server

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
    • Executable content was dropped or overwritten

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
    • Contacting a server suspected of hosting an CnC

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
  • INFO

    • Reads the computer name

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
      • admin.exe (PID: 6012)
    • The process uses the downloaded file

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
    • The sample compiled with english language support

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
    • Process checks computer location settings

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
    • Checks supported languages

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
      • admin.exe (PID: 6012)
    • Checks proxy server information

      • 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe (PID: 4328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)
.vxd | VXD Driver (0.2)

EXIF

EXE

CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 1
OSVersion: 4
EntryPoint: 0x1164
UninitializedDataSize: -
InitializedDataSize: 512
CodeSize: 30720
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
TimeStamp: 2000:01:01 12:00:00+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
118
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BASUN 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe #BASUN admin.exe

Process information

PID
CMD
Path
Indicators
Parent process
4328"C:\Users\admin\Desktop\2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe" C:\Users\admin\Desktop\2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6012"C:\Users\admin\admin.exe" C:\Users\admin\admin.exe
2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\admin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
Total events
1 104
Read events
807
Write events
297
Delete events
0

Modification events

(PID) Process:(4328) 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:admin
Value:
C:\Users\admin\admin.exe
(PID) Process:(4328) 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(4328) 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4328) 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4328) 2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6012) admin.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:admin
Value:
C:\Users\admin\admin.exe
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
43282ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeC:\Users\admin\NYNSPXWJ.exebinary
MD5:A48249517F2F7A1B7E87E31B58D676D2
SHA256:18CF01CDFE2084E965E0358192DE6B8FB2ABDEEE6EC47F00E772642E97BC5326
43282ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exeC:\Users\admin\admin.exeexecutable
MD5:12837644448C0796B067F5D9F3698913
SHA256:2B6F369BFE5144B802EDF87942F818B0250259F2D65EC493F1037D4D6C56CC39
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
9
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4328
2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe
GET
200
45.196.163.119:80
http://imagehut4.cn/update/utu.dat
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3700
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4328
2ad774b823acf2b24ecb107c49a33dbdb9d4cd3801c59afda9da338a47d5a08f.exe
45.196.163.119:80
imagehut4.cn
MULTA-ASN1
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
imagehut4.cn
  • 45.196.163.119
malicious
self.events.data.microsoft.com
  • 20.189.173.16
whitelisted

Threats

PID
Process
Class
Message
Malware Command and Control Activity Detected
ET MALWARE Request for utu.dat Likely Ponmocup checkin
No debug info