File name:

3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe

Full analysis: https://app.any.run/tasks/70ad77ba-249c-4f39-ad0d-4ac5fa5460a7
Verdict: Malicious activity
Analysis date: February 03, 2024, 13:15:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

0FFA80DD1E9D9C3E8C450F481CDA3A34

SHA1:

3243768EED8F02405709BA3AB2A8101105890636

SHA256:

3C78333EA4390B60B7F704456B1A5CBE73EAB6628BB61CE23F63D777273F99BB

SSDEEP:

6144:scOS+P1s0i6GiQKr8cS1FFpyr0PeJgV6Kz+dbkOkfOrfX:scOTHfAZpJPemV6Kz+d/kfOr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Reads Internet Explorer settings

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Reads the Internet Settings

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
  • INFO

    • Reads the computer name

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Checks proxy server information

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Checks supported languages

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Reads the machine GUID from the registry

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
    • Creates files or folders in the user directory

      • 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe (PID: 2336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (28.6)
.exe | UPX compressed Win32 Executable (28)
.exe | Win32 EXE Yoda's Crypter (27.5)
.dll | Win32 Dynamic Link Library (generic) (6.8)
.exe | Win32 Executable (generic) (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:05:11 07:09:36+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 200704
InitializedDataSize: 8192
UninitializedDataSize: 790528
EntryPoint: 0xf2160
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: -
FileDescription: 烽火 Microsoft 基础类应用程序
FileVersion: 1, 0, 0, 1
InternalName: 烽火
LegalCopyright: 版权所有 (C) 2010
LegalTrademarks: -
OriginalFileName: 烽火.EXE
ProductName: 烽火 应用程序
ProductVersion: 1, 0, 0, 1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2336"C:\Users\admin\AppData\Local\Temp\3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe" C:\Users\admin\AppData\Local\Temp\3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
烽火 Microsoft 基础类应用程序
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
502
Read events
490
Write events
12
Delete events
0

Modification events

(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2336) 3c78333ea4390b60b7f704456b1a5cbe73eab6628bb61ce23f63d777273f99bb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C5000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
352
svchost.exe
224.0.0.252:5355
unknown
1220
svchost.exe
239.255.255.250:3702
unknown

DNS requests

Domain
IP
Reputation
gz.gaa123.com
unknown

Threats

No threats detected
No debug info