File name:

webplugin.exe

Full analysis: https://app.any.run/tasks/bb99d9b6-b885-4906-abe0-56db2c4addcb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 20, 2024, 12:17:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

18F5C05BBA2E71D88795DB3AED200894

SHA1:

0944984F1C23A8D70B1C0CC362984A337459F692

SHA256:

3A3395F0272F1666F97365F1551FB8B39C26FFE763FA80FBAD5956ED8CCD005E

SSDEEP:

49152:9x/PX+3VzAD2/5DvUDZkFYa8EDp9QR2bLFpRIbL7q8hKCExWg6s//lu+0QGx3qYN:n/f+3V0u5DvUDZyX9w2bLFbIb74CN9sm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • conhost.exe (PID: 6436)
      • csrss.exe (PID: 616)
      • WebActiveX.exe (PID: 6592)
      • taskkill.exe (PID: 6428)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • webplugin.exe (PID: 6232)
    • Executable content was dropped or overwritten

      • webplugin.exe (PID: 6232)
  • INFO

    • The sample compiled with english language support

      • webplugin.exe (PID: 6232)
    • Reads the computer name

      • webplugin.exe (PID: 6232)
      • WebActiveX.exe (PID: 6592)
    • Checks supported languages

      • WebActiveX.exe (PID: 6592)
      • webplugin.exe (PID: 6232)
    • The sample compiled with chinese language support

      • webplugin.exe (PID: 6232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23552
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x323c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.0.0.3
ProductVersionNumber: 3.0.0.3
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: ASCII
FileVersion: 3.0.0.3
ProductName: WebPlugin 3.0.0.3
ProductVersion: 3.0.0.3
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start webplugin.exe taskkill.exe conhost.exe webactivex.exe csrss.exe webplugin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Version:
10.0.19041.1 (WinBuild.160101.0800)
1380"C:\Users\admin\AppData\Local\Temp\webplugin.exe" C:\Users\admin\AppData\Local\Temp\webplugin.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
3.0.0.3
Modules
Images
c:\users\admin\appdata\local\temp\webplugin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6232"C:\Users\admin\AppData\Local\Temp\webplugin.exe" C:\Users\admin\AppData\Local\Temp\webplugin.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
3.0.0.3
Modules
Images
c:\users\admin\appdata\local\temp\webplugin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6428TASKKILL /F /IM WebActiveX.exeC:\Windows\SysWOW64\taskkill.exe
webplugin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe
taskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6592"C:\Program Files\webrec\Torch\3.0.0.3\WebActiveX.exe" /regserverC:\Program Files\webrec\Torch\3.0.0.3\WebActiveX.exe
webplugin.exe
User:
admin
Integrity Level:
HIGH
Description:
Activecam ActiveX Module
Exit code:
0
Version:
3, 0, 0, 3
Modules
Images
c:\program files\webrec\torch\3.0.0.3\webactivex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
358
Read events
351
Write events
7
Delete events
0

Modification events

(PID) Process:(6232) webplugin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\MozillaPlugins\@IPC/npmedia3.0.0.3,version=3.0.0.3
Operation:writeName:Path
Value:
C:\Program Files\webrec\Torch\3.0.0.3\npmedia3.0.0.3.dll
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\WebActiveX3.0.0.3.EXE
Operation:writeName:AppID
Value:
{6447B426-4B25-4BBE-A6A3-98540AB40039}
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED1EDBF5-CCC7-4171-A559-6578BD6D3003}
Operation:writeName:AppID
Value:
{6447B426-4B25-4BBE-A6A3-98540AB40039}
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EA2088A5-7A56-47E1-85CE-F47217398A91}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EA2088A5-7A56-47E1-85CE-F47217398A91}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F28019AD-6F02-4DE5-9543-8F1B44D0C725}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6592) WebActiveX.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F28019AD-6F02-4DE5-9543-8F1B44D0C725}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
17
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6232webplugin.exeC:\Users\admin\AppData\Local\Temp\nsz55A7.tmp\nsExec.dllexecutable
MD5:ACC2B699EDFEA5BF5AAE45ABA3A41E96
SHA256:168A974EAA3F588D759DB3F47C1A9FDC3494BA1FA1A73A84E5E3B2A4D58ABD7E
6232webplugin.exeC:\Users\admin\AppData\Local\Temp\nsj54AC.tmp
MD5:
SHA256:
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\VideoWindow.dllexecutable
MD5:3F13108A5E3F17BEEE3130BA16EA75D7
SHA256:D5192B8B27FAA9D71EECECBECE70FA29C8CD785BDA022F248D8527BFD55A35F2
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\FileOperator.dllexecutable
MD5:5D7BDB2AD3797888653DA45ADD038A65
SHA256:5960706CF2DEAC76016B270307CD21EB3D43F265517DD8969D312B430B9B7934
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\Surveillance.dllexecutable
MD5:E845087DADCB43B5E46B6BA256427E21
SHA256:4070895A930C7753A472E343871E7AB48CFA381339F8FE5071CE5B0C302C2614
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\mp2dec.dllexecutable
MD5:C7DF9D4A0713BCC246DF662A77422BEB
SHA256:B0BF49E8AC60A71AFDE4B5F6AA98F90040224E14692132043AFC255E7E4E0303
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\StreamClient.dllexecutable
MD5:25471DCC60620231E1508F30E247DF65
SHA256:74687869EC04A38DA116B945BCA64A7E78173840C84F06AC146085715B722E51
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\WebActiveX.exeexecutable
MD5:0548AEFCA5FA9CCEE4FB07ADD39A1198
SHA256:DF55F733E68411919E9FDB2CDE51DF8DD068CB904A7E097160C6CA86BF37E132
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\IVSJsonSdk.dllexecutable
MD5:EA5DC179FCE34B8491D187BF9F2C9CE2
SHA256:5EC13D18E15D220058BEDEC2CE4CC51CD73B3CC8A16C409C1D2313FC90BC5B74
6232webplugin.exeC:\Program Files\webrec\Torch\3.0.0.3\npmedia3.0.0.3.dllexecutable
MD5:A4D313F297712592B24B18D3DFBFCE02
SHA256:7B171326165EBD505777794D12A15A4F60C9DFF2BCEBA59C552A1CA5A7B8AAF8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6332
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3188
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3188
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
372
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.128:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.128
  • 104.126.37.146
  • 104.126.37.130
  • 104.126.37.186
  • 104.126.37.137
  • 104.126.37.153
  • 104.126.37.145
  • 104.126.37.136
  • 104.126.37.139
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.133
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.14
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.105.99.58
whitelisted

Threats

No threats detected
No debug info