| File name: | 3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe |
| Full analysis: | https://app.any.run/tasks/8c02c0eb-a9f6-42bb-b8ad-216631dad807 |
| Verdict: | Malicious activity |
| Analysis date: | May 21, 2024, 02:16:49 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 20B71D9DA27BEC702E901AAF7F44FFB0 |
| SHA1: | B613AA8E8E022FC4BFFEFAE9419CAF35A5E8CA2F |
| SHA256: | 3CC86FFA9CBDA978789C4CC22E7F93FFAB62EB5B7F77C0A94D3771FA2F3EDCD0 |
| SSDEEP: | 6144://JZVQ83chNfrlWjHhbCl7nq/q8s3FE0668:/dfiliA7q/EJ668 |
| .exe | | | Win64 Executable (generic) (49.4) |
|---|---|---|
| .scr | | | Windows screen saver (23.4) |
| .dll | | | Win32 Dynamic Link Library (generic) (11.7) |
| .exe | | | Win32 Executable (generic) (8) |
| .exe | | | Generic Win/DOS Executable (3.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1976:08:18 05:39:38+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.55 |
| CodeSize: | 53248 |
| InitializedDataSize: | 18944 |
| UninitializedDataSize: | 125440 |
| EntryPoint: | 0x33000 |
| OSVersion: | 1 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 708 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Minimized -Command "Start-Process C:\Users\admin\Desktop\3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe -Verb runas ; echo 'Started the file with administrator privileges, this is not part of the sample!' ; exit 0 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1428 | C:\WINDOWS\system32\Gliqcmjk.exe | C:\Windows\SysWOW64\Gliqcmjk.exe | Geohgc32.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 1492 | C:\WINDOWS\system32\Gekoldgc.exe | C:\Windows\SysWOW64\Gekoldgc.exe | Gnqgoj32.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 1512 | C:\WINDOWS\system32\Glgdnnln.exe | C:\Windows\SysWOW64\Glgdnnln.exe | Ghkhmodd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 1604 | "C:\Users\admin\Desktop\3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe" | C:\Users\admin\Desktop\3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2524 | C:\WINDOWS\system32\Ghkhmodd.exe | C:\Windows\SysWOW64\Ghkhmodd.exe | Gaapqe32.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2528 | C:\WINDOWS\system32\Fgphaqnb.exe | C:\Windows\SysWOW64\Fgphaqnb.exe | Fealeeon.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2540 | C:\WINDOWS\system32\Gnqgoj32.exe | C:\Windows\SysWOW64\Gnqgoj32.exe | Gckbaapa.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2592 | C:\WINDOWS\system32\Gllmimhh.exe | C:\Windows\SysWOW64\Gllmimhh.exe | Gddehpgf.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2600 | C:\WINDOWS\system32\Fecikeml.exe | C:\Windows\SysWOW64\Fecikeml.exe | Fmlajgli.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| (PID) Process: | (708) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (708) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (708) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (708) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1604) 3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Apartment | |||
| (PID) Process: | (1604) 3cc86ffa9cbda978789c4cc22e7f93ffab62eb5b7f77c0a94d3771fa2f3edcd0.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad |
| Operation: | write | Name: | Web Event Logger |
Value: {79FAA099-1BAE-816E-D711-115290CEE717} | |||
| (PID) Process: | (5752) Fngdik32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Apartment | |||
| (PID) Process: | (5752) Fngdik32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad |
| Operation: | write | Name: | Web Event Logger |
Value: {79FAA099-1BAE-816E-D711-115290CEE717} | |||
| (PID) Process: | (5824) Fealeeon.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Apartment | |||
| (PID) Process: | (5824) Fealeeon.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad |
| Operation: | write | Name: | Web Event Logger |
Value: {79FAA099-1BAE-816E-D711-115290CEE717} | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 708 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | — | |
MD5:— | SHA256:— | |||
| 708 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ywsxllbd.dpj.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 708 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VFUWOQ5ZFUV4E0V0QKN4.temp | binary | |
MD5:C4BD57DF0CE27469FB775EBE84E25100 | SHA256:8F0A5EA9418F0327F8FEDC1AF6D1C1E554D09690F685B75A633DC5A390D0A2DE | |||
| 708 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ydy321ab.wt5.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 708 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF114b5e.TMP | binary | |
MD5:D040F64E9E7A2BB91ABCA5613424598E | SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670 | |||
| 5996 | Flnahodh.exe | C:\WINDOWS\SysWOW64\Mfnbjb32.dll | executable | |
MD5:668BB9F9F97DF16CDEAF5B13F86197AA | SHA256:D5F620027AD476B2C872C244C1F8967720EF03AA7B264A8D4EBA6C15B4ACE1A1 | |||
| 4852 | Fajjpfbp.exe | C:\WINDOWS\SysWOW64\Fciflaac.exe | executable | |
MD5:CC964BD6785E2B7EA7C4929959A516E6 | SHA256:CA098FB71FB696CF1D70F8EE3594371A2CCC6F0A045ACA5D945D459080E31BCB | |||
| 5824 | Fealeeon.exe | C:\WINDOWS\SysWOW64\Nioohggo.dll | executable | |
MD5:470FFDB9CA997DC1E3EC5CE9EA69DB22 | SHA256:3A144A9BF325CDFE7D8C9206247E4606ADD1AC435E5194D1C10D5AAA88857974 | |||
| 5996 | Flnahodh.exe | C:\WINDOWS\SysWOW64\Fajjpfbp.exe | executable | |
MD5:D40EA2D8B14C1E9267AAABB605AF23F8 | SHA256:F0F7FE45FDED612A6B164DB332DA8B2AEC6E4460FA52F55BEA87C95355608B12 | |||
| 4280 | Fmlajgli.exe | C:\WINDOWS\SysWOW64\Fecikeml.exe | executable | |
MD5:16BC9F3F73604AB1C39348FF3D1672B6 | SHA256:555E6679BB14CFB5DEC15CD02847BBA6F1DF3C5D72AA0B8C9CA6795E123DB868 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5548 | svchost.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
5996 | RUXIMICS.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
5140 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
5548 | svchost.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
5996 | RUXIMICS.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
5140 | MoUsoCoreWorker.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
2908 | OfficeClickToRun.exe | POST | 200 | 52.168.112.67:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5548 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5996 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5140 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5548 | svchost.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | unknown |
5996 | RUXIMICS.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | unknown |
5140 | MoUsoCoreWorker.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | unknown |
5548 | svchost.exe | 88.221.125.143:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
5996 | RUXIMICS.exe | 88.221.125.143:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
5140 | MoUsoCoreWorker.exe | 88.221.125.143:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
5140 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |