File name:

SA-x64.exe

Full analysis: https://app.any.run/tasks/9aefaaee-6419-4d92-b9db-306f31fbf7dc
Verdict: Malicious activity
Analysis date: July 01, 2024, 04:25:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

9DFFA351B676502A78C758475B5AFB2A

SHA1:

1A60D8837C1E8B22AC10699CA9B9ECF5F7232068

SHA256:

38EFD327C54645FB59ED871D46ADE8CDE4FB74E04A77AB290FA63FE5FE118276

SSDEEP:

98304:3dsM+kC/XBhPe5lfJShPsgTH26qawz9MAFa6cU85KuNEp9yyADOdpprFzU1OfUM5:t4HNx/aIEWa2FPNs2tK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • cmd.exe (PID: 5816)
      • SA-x64.exe (PID: 3720)
      • cmd.exe (PID: 5932)
  • SUSPICIOUS

    • Process uses IPCONFIG to discover network configuration

      • SA-x64.exe (PID: 3720)
    • Starts CMD.EXE for commands execution

      • NETSTAT.EXE (PID: 256)
      • NETSTAT.EXE (PID: 2668)
      • SA-x64.exe (PID: 3720)
    • Executes as Windows Service

      • WmiApSrv.exe (PID: 3224)
    • Executable content was dropped or overwritten

      • SA-x64.exe (PID: 3720)
      • cmd.exe (PID: 5932)
      • cmd.exe (PID: 5816)
    • Detected use of alternative data streams (AltDS)

      • SA-x64.exe (PID: 3720)
    • Uses ROUTE.EXE to obtain the routing table information

      • cmd.exe (PID: 2660)
      • cmd.exe (PID: 3944)
    • Process uses ARP to discover network configuration

      • SA-x64.exe (PID: 3720)
  • INFO

    • Checks supported languages

      • SA-x64.exe (PID: 3720)
    • Reads the computer name

      • SA-x64.exe (PID: 3720)
    • Create files in a temporary directory

      • SA-x64.exe (PID: 3720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2012:11:13 09:56:07+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware
PEType: PE32+
LinkerVersion: 8
CodeSize: 67072
InitializedDataSize: 8996352
UninitializedDataSize: -
EntryPoint: 0x3760
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: SSRINC.
FileDescription: SSR SuperAgent
FileVersion: 1.0.0.0
ProductName: SSR
ProductVersion: 1.0.0.0
LegalCopyright: SSRINC.CO.KR
LegalTrademarks: -
OriginalFileName: SA-x64.exe
InternalName: SA-x64.exe
Comments: SSR SuperAgent
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
14
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sa-x64.exe conhost.exe no specs netstat.exe no specs cmd.exe no specs route.exe no specs ipconfig.exe no specs wmiapsrv.exe no specs ipconfig.exe no specs netstat.exe no specs cmd.exe no specs route.exe no specs arp.exe no specs cmd.exe cmd.exe

Process information

PID
CMD
Path
Indicators
Parent process
256netstat -rnC:\Windows\System32\NETSTAT.EXESA-x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netstat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
2176C:\WINDOWS\system32\route.exe printC:\Windows\System32\ROUTE.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Route Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\route.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
2660C:\WINDOWS\system32\cmd.exe /c "C:\WINDOWS\system32\route.exe" printC:\Windows\System32\cmd.exeNETSTAT.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2668netstat -rnC:\Windows\System32\NETSTAT.EXESA-x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netstat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\snmpapi.dll
3224C:\WINDOWS\system32\wbem\WmiApSrv.exeC:\Windows\System32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\psapi.dll
3720"C:\Users\admin\AppData\Local\Temp\SA-x64.exe" C:\Users\admin\AppData\Local\Temp\SA-x64.exe
explorer.exe
User:
admin
Company:
SSRINC.
Integrity Level:
MEDIUM
Description:
SSR SuperAgent
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\sa-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_60b6a03d71f818d5\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
3748ipconfig /allC:\Windows\System32\ipconfig.exeSA-x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\dhcpcsvc.dll
3756ipconfig /allC:\Windows\System32\ipconfig.exeSA-x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
3932\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSA-x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3940C:\WINDOWS\system32\route.exe printC:\Windows\System32\ROUTE.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Route Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\route.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
Total events
2 641
Read events
2 640
Write events
1
Delete events
0

Modification events

(PID) Process:(3224) WmiApSrv.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\PROVIDERS\Performance
Operation:writeName:Performance Refreshed
Value:
0
Executable files
40
Suspicious files
0
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\03131a0b1bf5498f874e6acca48844e3\Cwd.dllexecutable
MD5:03131A0B1BF5498F874E6ACCA48844E3
SHA256:3266378CA7CC86F510D3B682D05A61FE1F9FB75289E719E7735DBD2E03BB152D
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\5e3c5fd2c7c9cdcf4d5b7a9bcfb508d5\Glob.dllexecutable
MD5:5E3C5FD2C7C9CDCF4D5B7A9BCFB508D5
SHA256:8A256C55FCAC3F33EDC7B5F4310EF26D4B87CC9FFFE5E1B38567D5AAEBDB4BD0
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\e27de15a8506354b1ce5921410755644\Registry.dllexecutable
MD5:E27DE15A8506354B1CE5921410755644
SHA256:CFAF05F471721354E2D9E8CD62884BAF77494AEBB6FF793B02A6C39CF6012B19
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin-3720\zlib1__.dllexecutable
MD5:DBD0F0D32A22CFDC7D46F51362587362
SHA256:923B4EAF4234FE02D36BE62E4ED08EF82A1CA57DB91124C31CF2187E2861834E
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\3e88b2653434364d5618bdeb842bf5c7\Zlib.dllexecutable
MD5:3E88B2653434364D5618BDEB842BF5C7
SHA256:123222A527D392A9FB1B9A038BDAF2D9A6113FBF0D4554ED6B1D50E128529A4F
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\6953efd7deb8e53bd56fd1b3fbfc153b\Encode.dllexecutable
MD5:6953EFD7DEB8E53BD56FD1B3FBFC153B
SHA256:00B2D77531EF256D134BB6C41BD2058243656DEFEACF28D9ABCAD2A2498F1FD1
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\3d7e98589d74de8280fd17e4fc1334ed\VersionInfo.dllexecutable
MD5:3D7E98589D74DE8280FD17E4FC1334ED
SHA256:CB187E9820358D92278484B4CA2E7AD2C0559008B5EFF99351A1B39B851659AC
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\204d4cc22d5ba691f4b57f03f656c800\Storable.dllexecutable
MD5:204D4CC22D5BA691F4B57F03F656C800
SHA256:CC899D795EF4D0C13700B23E4179A7805BA64959C9585CC1532C344654BFC928
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\489c0c87f6fd8bb41973eab630ef3a2d\HiRes.dllexecutable
MD5:489C0C87F6FD8BB41973EAB630EF3A2D
SHA256:A241EE912E64907AB8171CBA97BE0E65F77C9443B1A6D77F994CFBE083063B17
3720SA-x64.exeC:\Users\admin\AppData\Local\Temp\pdk-admin\d982eb9fe6c5742255f58d71a6c6c28b\ANSI.dllexecutable
MD5:D982EB9FE6C5742255F58D71A6C6C28B
SHA256:08A4A3A2DCBF9CBE0806FACBA4D249A1901690FEE61023277B0E3398AE25412C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
65
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2276
svchost.exe
GET
200
23.216.77.23:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
2276
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
unknown
1588
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
32
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
4092
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
4092
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
whitelisted
3792
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2212
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
unknown
2276
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2276
svchost.exe
23.216.77.23:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
2276
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown
3040
OfficeClickToRun.exe
20.189.173.3:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3040
OfficeClickToRun.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4656
SearchApp.exe
104.126.37.130:443
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.23
  • 23.216.77.18
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
self.events.data.microsoft.com
  • 20.189.173.3
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
r.bing.com
  • 104.126.37.155
  • 104.126.37.177
  • 104.126.37.163
  • 104.126.37.123
  • 104.126.37.170
  • 104.126.37.137
  • 104.126.37.176
  • 104.126.37.145
  • 104.126.37.179
  • 104.126.37.128
  • 104.126.37.162
  • 104.126.37.136
  • 104.126.37.139
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.76
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.136
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.133
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info