File name:

drop_66

Full analysis: https://app.any.run/tasks/ccd0c69c-19d0-47c5-beb0-ace652d89526
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: November 19, 2024, 03:44:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
api-base64
rat
imminent
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 11 sections
MD5:

77B40EDC8FBCEA2F6690DFE908406E52

SHA1:

37E234330D2DEA5B7C74B4046993815655603642

SHA256:

314FD2FF24D1D081E127527119255B569E84E2BFE9D91D5A6F117C5C159D67C1

SSDEEP:

49152:bcISoveHJNDUmBCQU+K7mXcwyjK5y7XdpghpaYZaF4Vvpj1xitnNkEEQKh3ajP2:bcIk7UmB1U+8yPqipaaaF4KbkHw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for self-deleting

      • yhusfpymwx.exe (PID: 6424)
    • Imminent RAT is detected

      • yhusfpymwx.exe (PID: 5580)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • drop_66.exe (PID: 4076)
      • yhusfpymwx.exe (PID: 6424)
    • Reads security settings of Internet Explorer

      • yhusfpymwx.exe (PID: 6424)
      • yhusfpymwx.exe (PID: 5580)
    • Starts itself from another location

      • yhusfpymwx.exe (PID: 6424)
    • Hides command output

      • cmd.exe (PID: 6736)
    • Starts CMD.EXE for commands execution

      • yhusfpymwx.exe (PID: 6424)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6736)
    • Write to the desktop.ini file (may be used to cloak folders)

      • yhusfpymwx.exe (PID: 5580)
    • Connects to unusual port

      • yhusfpymwx.exe (PID: 5580)
  • INFO

    • Checks supported languages

      • yhusfpymwx.exe (PID: 6424)
      • drop_66.exe (PID: 4076)
      • yhusfpymwx.exe (PID: 5580)
    • Create files in a temporary directory

      • drop_66.exe (PID: 4076)
      • yhusfpymwx.exe (PID: 6424)
    • Reads the computer name

      • yhusfpymwx.exe (PID: 6424)
      • yhusfpymwx.exe (PID: 5580)
    • The process uses the downloaded file

      • yhusfpymwx.exe (PID: 6424)
      • yhusfpymwx.exe (PID: 5580)
    • Process checks computer location settings

      • yhusfpymwx.exe (PID: 6424)
      • yhusfpymwx.exe (PID: 5580)
    • Creates files or folders in the user directory

      • yhusfpymwx.exe (PID: 5580)
    • Reads the machine GUID from the registry

      • yhusfpymwx.exe (PID: 5580)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 5564)
    • Potential library load (Base64 Encoded 'LoadLibrary')

      • yhusfpymwx.exe (PID: 5580)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:18 02:08:58+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 4608
InitializedDataSize: 356864
UninitializedDataSize: -
EntryPoint: 0x1810
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: TODO: <Company name>
FileDescription: TODO: <File description>
FileVersion: 1.0.0.1
InternalName: Dropper.exe
LegalCopyright: Copyright (C) 2024
OriginalFileName: Dropper.exe
ProductName: TODO: <Product name>
ProductVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop_66.exe conhost.exe no specs yhusfpymwx.exe #IMMINENT yhusfpymwx.exe cmd.exe no specs conhost.exe no specs ping.exe no specs taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
1500"C:\Windows\System32\Taskmgr.exe" C:\Windows\SysWOW64\Taskmgr.exeyhusfpymwx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3276\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedrop_66.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4076"C:\Users\admin\AppData\Local\Temp\drop_66.exe" C:\Users\admin\AppData\Local\Temp\drop_66.exe
explorer.exe
User:
admin
Company:
TODO: <Company name>
Integrity Level:
MEDIUM
Description:
TODO: <File description>
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\drop_66.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5564"C:\WINDOWS\SysWOW64\Taskmgr.exe" C:\Windows\SysWOW64\Taskmgr.exe
yhusfpymwx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
5580"C:\Users\admin\AppData\Local\Temp\yhusfpymwx\yhusfpymwx.exe" C:\Users\admin\AppData\Local\Temp\yhusfpymwx\yhusfpymwx.exe
yhusfpymwx.exe
User:
admin
Integrity Level:
MEDIUM
Description:
testsadf.exe
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\yhusfpymwx\yhusfpymwx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5828\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6368ping 1.1.1.1 -n 1 -w 1000 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6424"yhusfpymwx.exe"C:\Users\admin\AppData\Local\Temp\yhusfpymwx.exe
drop_66.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\yhusfpymwx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6736"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\admin\AppData\Local\Temp\yhusfpymwx.exe"C:\Windows\SysWOW64\cmd.exeyhusfpymwx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 060
Read events
3 057
Write events
2
Delete events
1

Modification events

(PID) Process:(5580) yhusfpymwx.exeKey:HKEY_CURRENT_USER\SOFTWARE\Clients
Operation:writeName:PID
Value:
5580
(PID) Process:(5564) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
(PID) Process:(5564) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:writeName:Preferences
Value:
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
Executable files
2
Suspicious files
3
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6424yhusfpymwx.exeC:\Users\admin\AppData\Local\Temp\yhusfpymwx\yhusfpymwx.exeexecutable
MD5:32DA4A57B39A3C3A3112F136C660817D
SHA256:91B2624897CCFDB9D2DFA44BA00CF79F8AE2E504C4576E674FB898DCB866F5A7
4076drop_66.exeC:\Users\admin\AppData\Local\Temp\yhusfpymwx.exeexecutable
MD5:32DA4A57B39A3C3A3112F136C660817D
SHA256:91B2624897CCFDB9D2DFA44BA00CF79F8AE2E504C4576E674FB898DCB866F5A7
5580yhusfpymwx.exeC:\Users\admin\AppData\Local\VirtualStore\Windows\assembly\Desktop.inibinary
MD5:F7F759A5CD40BC52172E83486B6DE404
SHA256:A709C2551B8818D7849D31A65446DC2F8C4CCA2DCBBC5385604286F49CFDAF1C
5564Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\e313ddc235b088d6\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
5564Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\e313ddc235b088d6\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.valbinary
MD5:AEA4F521B527615E27F4718F4D58ADD1
SHA256:280C7D47E5CAD7D6208B6572F17E0099AB15E2C1DD1E824C9DBA87E279AA2C53
5580yhusfpymwx.exeC:\Users\admin\AppData\Roaming\Imminent\Logs\19-11-2024text
MD5:33BE604F8044D5984E8E3E3B694D710A
SHA256:3F785F1CC535B0987139623200C7910B2B28F92DFE3309E8E071C091D0CE7313
5564Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\e313ddc235b088d6\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idxbinary
MD5:09C22002C807370C27681FBB1E76D387
SHA256:09D981C774EE5623A9439AE02458477937C011552F2E01C1BF48D75100E689BB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
47
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6888
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
632
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6888
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6296
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2464
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
92.123.104.63:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5580
yhusfpymwx.exe
46.36.36.115:6661
SecurityNet.cz s.r.o.
CZ
unknown
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 92.123.104.63
  • 92.123.104.38
  • 92.123.104.32
  • 92.123.104.34
  • 92.123.104.31
whitelisted
google.com
  • 142.251.140.78
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.68
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.17
  • 40.126.32.76
  • 20.190.160.22
whitelisted
th.bing.com
  • 92.123.104.32
  • 92.123.104.63
  • 92.123.104.38
  • 92.123.104.34
  • 92.123.104.31
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info