download:

release.exe

Full analysis: https://app.any.run/tasks/05f4183a-faa7-41dc-9df0-d0cdcaf21f1c
Verdict: Malicious activity
Analysis date: September 21, 2021, 15:55:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5ACA117237E9C37136529D3778EC0C4D

SHA1:

CC9080C78B4AFCF728FEA50B4774E8977158B300

SHA256:

2BE86F526D00C0647DBE4C9C59A8F2FAA870D7FCAF575EC42F7D47F8C86DEFC0

SSDEEP:

49152:J84p+ldtH7riKKjJlrsJ3jD1jAwGe8mE6cO8GV4ijRE2HiBCbq7Nt8E4U:JzKh7KjJlINX1UwGeZcO5G2CBSUUE4U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • release.exe (PID: 3752)
    • Application was dropped or rewritten from another process

      • Svc_host.exe (PID: 3200)
  • SUSPICIOUS

    • Reads the computer name

      • release.exe (PID: 3752)
      • Svc_host.exe (PID: 3200)
    • Checks supported languages

      • release.exe (PID: 3752)
      • Svc_host.exe (PID: 3200)
    • Executable content was dropped or overwritten

      • release.exe (PID: 3752)
    • Drops a file with too old compile date

      • release.exe (PID: 3752)
    • Starts Internet Explorer

      • Svc_host.exe (PID: 3200)
    • Drops a file that was compiled in debug mode

      • release.exe (PID: 3752)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3344)
  • INFO

    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3344)
      • iexplore.exe (PID: 3104)
    • Changes internet zones settings

      • iexplore.exe (PID: 3104)
    • Application launched itself

      • iexplore.exe (PID: 3104)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3344)
      • iexplore.exe (PID: 3104)
    • Checks supported languages

      • iexplore.exe (PID: 3104)
      • iexplore.exe (PID: 3344)
    • Reads the computer name

      • iexplore.exe (PID: 3104)
      • iexplore.exe (PID: 3344)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3344)
    • Creates files in the user directory

      • iexplore.exe (PID: 3344)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3104)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3104)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x1eef0
UninitializedDataSize: -
InitializedDataSize: 114688
CodeSize: 201728
LinkerVersion: 14
PEType: PE32
TimeStamp: 2021:06:11 11:16:47+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 11-Jun-2021 09:16:47
Debug artifacts:
  • D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 11-Jun-2021 09:16:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000313BA
0x00031400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.70981
.rdata
0x00033000
0x0000A622
0x0000A800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.22268
.data
0x0003E000
0x00023728
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.70882
.didat
0x00062000
0x0000018C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.35543
.rsrc
0x00063000
0x0000E038
0x0000E200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.80268
.reloc
0x00072000
0x0000227C
0x00002400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.56418

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.25329
1875
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
5.10026
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
3
5.25868
3752
Latin 1 / Western European
UNKNOWN
RT_ICON
4
5.02609
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
5
5.18109
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
6
5.04307
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
7
3.66634
508
Latin 1 / Western European
UNKNOWN
RT_STRING
8
3.71728
582
Latin 1 / Western European
UNKNOWN
RT_STRING
9
3.73856
422
Latin 1 / Western European
UNKNOWN
RT_STRING
10
3.55807
220
Latin 1 / Western European
UNKNOWN
RT_STRING

Imports

KERNEL32.dll
USER32.dll (delay-loaded)
gdiplus.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start release.exe svc_host.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3104"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.6.1&processName=Svc_host.exe&platform=0000&osver=5&isServer=0&shimver=4.0.30319.34209C:\Program Files\Internet Explorer\iexplore.exe
Svc_host.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3200"C:\Users\admin\AppData\Local\Temp\RarSFX0\Svc_host.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\Svc_host.exerelease.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Svc_host
Exit code:
3221225547
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\svc_host.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3344"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3104 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3752"C:\Users\admin\AppData\Local\Temp\release.exe" C:\Users\admin\AppData\Local\Temp\release.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\release.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24542_none_5c0717c7a00ddc6d\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
12 467
Read events
12 347
Write events
118
Delete events
2

Modification events

(PID) Process:(3752) release.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3752) release.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3752) release.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3752) release.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
708142928
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30912257
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30912257
(PID) Process:(3104) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
11
Suspicious files
12
Text files
36
Unknown types
13

Dropped files

PID
Process
Filename
Type
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Svc_host.exeexecutable
MD5:
SHA256:
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Svc_host.pdbpdb
MD5:
SHA256:
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Newtonsoft.Json.xmlxml
MD5:AD1A946CDBE4FC83907CF558FB80A37F
SHA256:E3C9CB0CBF4B3BE20B6030F3A4872EDD81E042048D2D19732EAC3EEB9779DC0B
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Memory.xmlxml
MD5:ADD19745A43B2515280CE24671863114
SHA256:D5714C96607EB1A9D0F90F57CA194D8A9C3EDE0656A1D1F461E78B209F054813
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\x64\SQLite.Interop.dllexecutable
MD5:7DE130CE491D63ECB3920687A84DF54A
SHA256:1D534617B38323027A64579A581258A55C3986F5B4B15297126C8A4CEF5AA105
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\BouncyCastle.Crypto.xmlxml
MD5:E6B5750503E89038076B6FBC44D86782
SHA256:F551B9EC31487B259B6034DA923587776D93F0BA35538A8DFE1D9DABF890EAEC
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Data.SQLite.dllexecutable
MD5:83DFD2FE35EFB2154BCDD3B475F378F2
SHA256:7A4DDE948B573B5A92CB1F63A2201006E61EA24107D9668A36EFA378E8D48F08
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Data.SQLite.xmlxml
MD5:D111D791998481A37C62F2D465ECF970
SHA256:B9C98B47E6BD8C4BF59B27E7DAC0C82D2DDDD3C93B794DE8538B4F23CD8E6464
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Numerics.Vectors.xmlxml
MD5:95DD29CA17B63843AD787D3BC9C8C933
SHA256:AE2C3DE9AD57D7091D9F44DCDEE3F88ECCF2BA7CB43ADC9BB24769154A532DC7
3752release.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Newtonsoft.Json.dllexecutable
MD5:6815034209687816D8CF401877EC8133
SHA256:7F912B28A07C226E0BE3ACFB2F57F050538ABA0100FA1F0BF2C39F1A1F1DA814
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
37
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3104
iexplore.exe
GET
304
8.248.131.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?babdc4f47297fa0a
US
whitelisted
3104
iexplore.exe
GET
304
8.248.131.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?db08cc433910c912
US
whitelisted
3344
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
3344
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEF6zheUj6D92CgAAAAD87%2BI%3D
US
der
471 b
whitelisted
3344
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3344
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA9bw6F2y3ieICDHiTyBZ7Q%3D
US
der
1.47 Kb
whitelisted
3104
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3344
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3344
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3344
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3344
iexplore.exe
104.92.93.19:443
go.microsoft.com
Akamai Technologies, Inc.
NL
unknown
8.248.131.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
3344
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3104
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3344
iexplore.exe
2.21.143.74:443
www.microsoft.com
Telia Company AB
malicious
3344
iexplore.exe
92.123.195.73:443
img-prod-cms-rt-microsoft-com.akamaized.net
Akamai International B.V.
whitelisted
3344
iexplore.exe
152.199.21.175:443
az416426.vo.msecnd.net
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3344
iexplore.exe
92.123.195.43:443
statics-marketingsites-wcus-ms-com.akamaized.net
Akamai International B.V.
whitelisted
3344
iexplore.exe
40.90.65.2:443
wcpstatic.microsoft.com
Microsoft Corporation
US
suspicious
3104
iexplore.exe
8.248.131.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
go.microsoft.com
  • 104.92.93.19
whitelisted
ctldl.windowsupdate.com
  • 8.248.131.254
  • 8.253.207.121
  • 8.253.204.120
  • 8.253.207.120
  • 67.27.157.126
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
dotnet.microsoft.com
  • 13.107.246.45
  • 13.107.213.45
whitelisted
www.microsoft.com
  • 2.21.143.74
whitelisted
statics-marketingsites-wcus-ms-com.akamaized.net
  • 92.123.195.43
  • 92.123.195.99
whitelisted
img-prod-cms-rt-microsoft-com.akamaized.net
  • 92.123.195.73
  • 92.123.195.50
  • 92.123.195.35
whitelisted
az416426.vo.msecnd.net
  • 152.199.21.175
whitelisted

Threats

No threats detected
No debug info