| File name: | lem.exe |
| Full analysis: | https://app.any.run/tasks/e7a65bb6-bbe7-4f42-ba0e-96c6b2abbe05 |
| Verdict: | Malicious activity |
| Analysis date: | July 09, 2024, 15:32:12 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 325A606EA2DBEC3A47BEFB19F0AD3DA6 |
| SHA1: | 99F955CBD4D8287898FFA9F682EB1C78FCEF5374 |
| SHA256: | 3D739FABBA56B79F84E7CDDD183DFA59429F3C9FB9DA92EB0D6B75815EDACD53 |
| SSDEEP: | 49152:eJ1jRhp/I1M5FNEW2iRTQXAHXQOi8Hy2OkrzkVZ9h10JghgvNdd2Gbdbn40:ePjRhpw1M5ZqAHXLi8ROkkthVudrbdbL |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:19:54+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 28160 |
| InitializedDataSize: | 445952 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x3883 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | cmd /c md 95034 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1048 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1304 | findstr /I "wrsa.exe opssvc.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1332 | cmd /c md 95034 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1436 | findstr /I "wrsa.exe opssvc.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1496 | timeout /t 10 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1660 | "C:\Windows\System32\cmd.exe" /k copy Comments Comments.cmd & Comments.cmd & exit | C:\Windows\SysWOW64\cmd.exe | lem.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 9009 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1784 | findstr /V "EnsuresMerchantsGeographicHearing" Sms | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1920 | findstr /V "EnsuresMerchantsGeographicHearing" Sms | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1992 | cmd /c copy /b Chest + Old + Debate 95034\H | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5732) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (5732) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (5732) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (5732) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3108) Bathrooms.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Reproduced | binary | |
MD5:FA8318506C6020D76D99BA2585DAF761 | SHA256:7058460B66FFD8B00A7A5999840E75F893C77565B835C1AE4393C6FFCF7E6D2B | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Ll | binary | |
MD5:754E8C090842779B387848B6C7D05056 | SHA256:B88053861C4DC89836B806277ADA36BECE6EBE24C91F0A969A205BDF555973D3 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Liechtenstein | binary | |
MD5:4A1700A382EEBBFA707BD35B1A16C7B6 | SHA256:F3C1C5310F5E73465E8ABF9EFC45FD58999905CE94E84D75F3026E7FF8E12748 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Prototype | binary | |
MD5:9D929650F45059B6008B262DCA4C38AD | SHA256:EE0B94E9674580C951CEC93BB24BE984C40FCD0FCDDB440EDDAF473FC0C38B53 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Magnitude | binary | |
MD5:F8854AB901789B4CA195EE7DA3A56996 | SHA256:B801E1770079542C301ACBFA94CD4BA71998750ADD0A391D4C42113283D5CCA6 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Shuttle | mp3 | |
MD5:2DBD9A70801F9884623298015AFC3081 | SHA256:5B18712950B044D893977CCDBD956EF29DB4668FC9A6AA84536EB869B5B1843B | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Of | binary | |
MD5:3454C5CF55502AF90CC76A45F112232C | SHA256:912E53B30A0AE30B2C3AB6F00CB1D5216E9ACEC555EC7973C9E65E7E61DDF29D | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Mode | binary | |
MD5:BE93BC804BB05D03FE6E96BA8D625D84 | SHA256:FD7512930282A3A69422EC2344FCD612E9DB736B798F68D311245725CF2CB4A6 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Thomas | binary | |
MD5:96648E2982F59739C075FDECE1B98824 | SHA256:4D04F9C5D88C45A465B4E851F12BABAFBB020F9F180E6D7B70EC14EB9197C5D0 | |||
| 5732 | lem.exe | C:\Users\admin\AppData\Local\Temp\Inappropriate | binary | |
MD5:EF22F8B52666ADD4C1DEFD4728AB6FBE | SHA256:EFC6EFFE9A009893DB32B200B874F1BBED9E2AA650600F3EE16CB8650DF00954 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1972 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
3108 | Bathrooms.pif | POST | — | 185.107.56.203:80 | http://tea.arpdabl.org/ | unknown | — | — | unknown |
1792 | RUXIMICS.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
1792 | RUXIMICS.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
— | — | GET | 200 | 23.212.216.106:443 | https://steamcommunity.com/profiles/76561199735694209 | unknown | html | 33.9 Kb | unknown |
— | — | POST | 200 | 20.42.73.28:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | — | — | unknown |
1972 | MoUsoCoreWorker.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
— | — | GET | 200 | 149.154.167.99:443 | https://t.me/puffclou | unknown | html | 12.0 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2064 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
1792 | RUXIMICS.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1972 | MoUsoCoreWorker.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1792 | RUXIMICS.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
2064 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1972 | MoUsoCoreWorker.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
1972 | MoUsoCoreWorker.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
1792 | RUXIMICS.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
mNLLDjOMLqNop.mNLLDjOMLqNop |
| unknown |
www.microsoft.com |
| whitelisted |
steamcommunity.com |
| whitelisted |
t.me |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
tea.arpdabl.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3108 | Bathrooms.pif | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
— | — | Malware Command and Control Activity Detected | SUSPICIOUS [ANY.RUN] Used Steam website as a dead drop resolver (DDR) |
— | — | Malware Command and Control Activity Detected | SUSPICIOUS [ANY.RUN] Dead Drop Resolver (DDR) inside Telegram Contact |