File name:

Net-Worm.Win32.Blaster.E

Full analysis: https://app.any.run/tasks/778afae2-60ee-449f-a7c0-cf49f4fa89b4
Verdict: Malicious activity
Analysis date: August 06, 2024, 18:37:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8676210E6246948201AA014DB471DE90

SHA1:

86B30D1A8B7515DCAB6C8D2781B85C6983709DBF

SHA256:

2E481059B9BC9686C676D69A80202EED5022C9A53ECD8CAC215E70C601DD7FDC

SSDEEP:

192:f3AnYJq6/eKxjEMfMVj78aCFExiLSnnaUJaW5j5I:fQnYJJ/RhMV/1yEo4aU0WZ5I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Changes the autorun value in the registry

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Connects to unusual port

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
  • INFO

    • Checks proxy server information

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Reads the computer name

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
      • wmpnscfg.exe (PID: 3604)
    • Checks supported languages

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
      • wmpnscfg.exe (PID: 3604)
    • UPX packer has been detected

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3604)
      • iexplore.exe (PID: 2088)
    • Application launched itself

      • iexplore.exe (PID: 2088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE Yoda's Crypter (63.7)
.dll | Win32 Dynamic Link Library (generic) (15.7)
.exe | Win32 Executable (generic) (10.8)
.exe | Generic Win/DOS Executable (4.8)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2003:08:11 11:21:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.55
CodeSize: 8192
InitializedDataSize: 4096
UninitializedDataSize: 20480
EntryPoint: 0x71f0
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT net-worm.win32.blaster.e.exe wmpnscfg.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2088"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2484"C:\Users\admin\AppData\Local\Temp\Net-Worm.Win32.Blaster.E.exe" C:\Users\admin\AppData\Local\Temp\Net-Worm.Win32.Blaster.E.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\net-worm.win32.blaster.e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crtdll.dll
c:\windows\system32\wininet.dll
2604"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2088 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3604"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 844
Read events
15 604
Write events
130
Delete events
110

Modification events

(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Windows Automation
Value:
mslaugh.exe
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31123503
Executable files
0
Suspicious files
21
Text files
46
Unknown types
10

Dropped files

PID
Process
Filename
Type
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\9D8LHJM7.txttext
MD5:31A3D3A22CF40D7C2168F826390B300B
SHA256:DD38AF0200E30D4AC6531D9C46C1437C8B1462319757BEFDF7B4FB3C065AC0C6
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Abinary
MD5:5340989DDF8376A34A556F84214EC59F
SHA256:8A78EEE788F41244C0209DB1D1729512E487ADD65F9EB9E9130D77EC679748E7
2088iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:4760C52C95B359971F8E722F279833BF
SHA256:DF11E12F053AB916DA9C4143E1B73E3A6C6AA2075F7D59373FD74C67E22134B1
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\K50MPO7W.txttext
MD5:2DD9B8FF97CA317C824447ED1071F6EE
SHA256:A2345C49E0A2B1E610205CFDE3FCAC3F7EA4AC8BC558AE128DD8B6DA3D4EDC06
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\7BED3SFB.txttext
MD5:429311EC3494A445F687D575BF31F56E
SHA256:E3C8C6360D898C9A7F9267A6D8C1A45DE2FE48BBCD1A7214AE10A1152DB9735E
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\SXO7T26D.txttext
MD5:DA7084FD7E3A258C3EDA13C1D4A8832D
SHA256:B93033D899AE06D7DF4390D16485B40D3DF9E1C277069D3D940AE90754FA9EC6
2088iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Ader
MD5:C062BA61533D9B0DE64133E5E2010BE2
SHA256:53D3A835A2DE9589C163CD9B38CFD6076477AC5F40D1687018376E541D97AD68
2088iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\USDRYHC2.txttext
MD5:8FEA36EC06A630E2995E540F625EBE57
SHA256:42B7C19044822FD7865685D25951E8AF5E3EEA70F97A0C9A221C52BCC61BE9F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
1 314
DNS requests
19
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
217.20.57.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fbe613066ac7852b
unknown
whitelisted
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1372
svchost.exe
GET
200
23.48.23.168:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2088
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2604
iexplore.exe
GET
200
216.58.206.35:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
2604
iexplore.exe
GET
429
142.250.186.132:80
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgTYGNXtGLPbybUGIjC8BTjUzkr9DpvDxizNJZZh8_P0Qgkz-8Y3-W9NDPacH96amYQFBIyhTufWmmL7Ah0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
unknown
whitelisted
2604
iexplore.exe
GET
200
142.250.186.67:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEGSmfK2o2tshCmPh6FdfeUg%3D
unknown
whitelisted
2604
iexplore.exe
GET
200
142.250.186.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
2604
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.1:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.2:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.3:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.4:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.5:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.6:135
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
  • 217.20.57.35
  • 217.20.57.40
  • 217.20.57.27
  • 217.20.57.20
  • 217.20.57.24
  • 217.20.57.36
whitelisted
crl.microsoft.com
  • 23.48.23.168
  • 23.48.23.185
  • 23.48.23.181
  • 23.48.23.193
  • 23.48.23.194
  • 23.48.23.176
  • 23.48.23.167
  • 23.48.23.137
  • 23.48.23.177
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 104.126.37.184
  • 104.126.37.139
  • 104.126.37.153
  • 104.126.37.145
  • 104.126.37.147
  • 104.126.37.123
  • 104.126.37.128
  • 104.126.37.144
  • 104.126.37.137
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.google.com
  • 142.250.186.132
whitelisted
ocsp.pki.goog
  • 142.250.186.163
whitelisted

Threats

PID
Process
Class
Message
2484
Net-Worm.Win32.Blaster.E.exe
Misc activity
ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection
2484
Net-Worm.Win32.Blaster.E.exe
Misc activity
ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection
No debug info