File name:

Net-Worm.Win32.Blaster.E

Full analysis: https://app.any.run/tasks/778afae2-60ee-449f-a7c0-cf49f4fa89b4
Verdict: Malicious activity
Analysis date: August 06, 2024, 18:37:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8676210E6246948201AA014DB471DE90

SHA1:

86B30D1A8B7515DCAB6C8D2781B85C6983709DBF

SHA256:

2E481059B9BC9686C676D69A80202EED5022C9A53ECD8CAC215E70C601DD7FDC

SSDEEP:

192:f3AnYJq6/eKxjEMfMVj78aCFExiLSnnaUJaW5j5I:fQnYJJ/RhMV/1yEo4aU0WZ5I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Changes the autorun value in the registry

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Connects to unusual port

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
  • INFO

    • Reads the computer name

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
      • wmpnscfg.exe (PID: 3604)
    • Checks proxy server information

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Checks supported languages

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
      • wmpnscfg.exe (PID: 3604)
    • UPX packer has been detected

      • Net-Worm.Win32.Blaster.E.exe (PID: 2484)
    • Manual execution by a user

      • iexplore.exe (PID: 2088)
      • wmpnscfg.exe (PID: 3604)
    • Application launched itself

      • iexplore.exe (PID: 2088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE Yoda's Crypter (63.7)
.dll | Win32 Dynamic Link Library (generic) (15.7)
.exe | Win32 Executable (generic) (10.8)
.exe | Generic Win/DOS Executable (4.8)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2003:08:11 11:21:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.55
CodeSize: 8192
InitializedDataSize: 4096
UninitializedDataSize: 20480
EntryPoint: 0x71f0
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT net-worm.win32.blaster.e.exe wmpnscfg.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2088"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2484"C:\Users\admin\AppData\Local\Temp\Net-Worm.Win32.Blaster.E.exe" C:\Users\admin\AppData\Local\Temp\Net-Worm.Win32.Blaster.E.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\net-worm.win32.blaster.e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crtdll.dll
c:\windows\system32\wininet.dll
2604"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2088 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3604"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 844
Read events
15 604
Write events
130
Delete events
110

Modification events

(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Windows Automation
Value:
mslaugh.exe
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2484) Net-Worm.Win32.Blaster.E.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2088) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31123503
Executable files
0
Suspicious files
21
Text files
46
Unknown types
10

Dropped files

PID
Process
Filename
Type
2088iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:4760C52C95B359971F8E722F279833BF
SHA256:DF11E12F053AB916DA9C4143E1B73E3A6C6AA2075F7D59373FD74C67E22134B1
2088iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dder
MD5:DF080DE313CE880624B83F1A33AA3831
SHA256:6616C6BE63342012B8CFE6BD3A4447614FB88BAC62B4DA799F00FED046DB5229
2088iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WBZDAM4X.txttext
MD5:F15E9B388F545E7D31183F0E25AC986E
SHA256:1CC5B190CEB701CFA6201717A41065C8079C6143F4508B790C43126F77DCCAAB
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\UP576NNF.txttext
MD5:204F9389156E3CC8E033ACC229972D1F
SHA256:12E5125F4525C67C0E918A4543F574747035A517A6BC386BEAD7DDE0627D2261
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\SXO7T26D.txttext
MD5:DA7084FD7E3A258C3EDA13C1D4A8832D
SHA256:B93033D899AE06D7DF4390D16485B40D3DF9E1C277069D3D940AE90754FA9EC6
2604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\qsml[1].htmxml
MD5:075BE7DCDF0AD098663B0F7473BCE9D4
SHA256:D2E30A0E11C952DA8F2C28DB034571CED4FD52BF0FBCD9BC49401C2783975348
2604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\qsml[1].xmlxml
MD5:075BE7DCDF0AD098663B0F7473BCE9D4
SHA256:D2E30A0E11C952DA8F2C28DB034571CED4FD52BF0FBCD9BC49401C2783975348
2604iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\USDRYHC2.txttext
MD5:8FEA36EC06A630E2995E540F625EBE57
SHA256:42B7C19044822FD7865685D25951E8AF5E3EEA70F97A0C9A221C52BCC61BE9F3
2604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\qsml[1].htmxml
MD5:F0E8AD1B3B7A74CEE2ADAA1CD9B3189F
SHA256:CC637A2055B79DDCB66FE83BFFA627D234C2009804EE54C2DE897331FD28F410
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
1 314
DNS requests
19
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
217.20.57.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fbe613066ac7852b
unknown
whitelisted
1372
svchost.exe
GET
200
23.48.23.168:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2604
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2088
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2604
iexplore.exe
GET
302
142.250.186.132:80
http://www.google.com/
unknown
whitelisted
2604
iexplore.exe
GET
429
142.250.186.132:80
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgTYGNXtGLPbybUGIjC8BTjUzkr9DpvDxizNJZZh8_P0Qgkz-8Y3-W9NDPacH96amYQFBIyhTufWmmL7Ah0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
unknown
whitelisted
2604
iexplore.exe
GET
200
142.250.186.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
2604
iexplore.exe
GET
200
142.250.186.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDAezvzBOn2FxIghPLaMkP6
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.1:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.2:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.3:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.4:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.5:135
US
unknown
2484
Net-Worm.Win32.Blaster.E.exe
68.137.56.6:135
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
  • 217.20.57.35
  • 217.20.57.40
  • 217.20.57.27
  • 217.20.57.20
  • 217.20.57.24
  • 217.20.57.36
whitelisted
crl.microsoft.com
  • 23.48.23.168
  • 23.48.23.185
  • 23.48.23.181
  • 23.48.23.193
  • 23.48.23.194
  • 23.48.23.176
  • 23.48.23.167
  • 23.48.23.137
  • 23.48.23.177
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 104.126.37.184
  • 104.126.37.139
  • 104.126.37.153
  • 104.126.37.145
  • 104.126.37.147
  • 104.126.37.123
  • 104.126.37.128
  • 104.126.37.144
  • 104.126.37.137
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.google.com
  • 142.250.186.132
whitelisted
ocsp.pki.goog
  • 142.250.186.163
whitelisted

Threats

PID
Process
Class
Message
2484
Net-Worm.Win32.Blaster.E.exe
Misc activity
ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection
2484
Net-Worm.Win32.Blaster.E.exe
Misc activity
ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection
No debug info