File name:

b9dfccbd557a3318a6d0e672ca155da0.exe

Full analysis: https://app.any.run/tasks/20aa3b19-6bb4-4d0f-9e3c-d830a45d43e6
Verdict: Malicious activity
Analysis date: December 02, 2023, 16:53:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B9DFCCBD557A3318A6D0E672CA155DA0

SHA1:

3F7C923BC8724173B9672962FA3D1F16240663DA

SHA256:

3E2951EC613371B90746D93B2EFFDF16D1D7B743498F3040886FA40CD782E55C

SSDEEP:

6144:I5BY16gBYVmSqoj9cApPIV4eKPpCRbDVKTtCcT4dpu3qDogylVVVVV3jX:I5BYemq7AlKmJylVVVVVj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs injected code in another process

      • b9dfccbd557a3318a6d0e672ca155da0.exe (PID: 2560)
    • Application was injected by another process

      • explorer.exe (PID: 1944)
  • SUSPICIOUS

    • Application launched itself

      • b9dfccbd557a3318a6d0e672ca155da0.exe (PID: 2208)
  • INFO

    • Checks supported languages

      • b9dfccbd557a3318a6d0e672ca155da0.exe (PID: 2560)
      • b9dfccbd557a3318a6d0e672ca155da0.exe (PID: 2208)
    • Drops the executable file immediately after the start

      • explorer.exe (PID: 1944)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 1944)
    • Reads the Internet Settings

      • explorer.exe (PID: 1944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:04 20:34:05+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 166912
InitializedDataSize: 40488448
UninitializedDataSize: -
EntryPoint: 0x3704
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 37.0.0.0
ProductVersionNumber: 46.0.0.0
FileFlagsMask: 0x145a
FileFlags: (none)
FileOS: Unknown (0x20723)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Unknown (0452)
CharacterSet: Unknown (30F3)
FileDescription: Mabling
LegalCopyright: Copyright (C) 2022, Crazy
OriginalFileName: Munpler
ProductsVersion: 19.3.71.61
ProductionVersion: 16.78.79.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start inject b9dfccbd557a3318a6d0e672ca155da0.exe no specs b9dfccbd557a3318a6d0e672ca155da0.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
1944C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2208"C:\Users\admin\AppData\Local\Temp\b9dfccbd557a3318a6d0e672ca155da0.exe" C:\Users\admin\AppData\Local\Temp\b9dfccbd557a3318a6d0e672ca155da0.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\b9dfccbd557a3318a6d0e672ca155da0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2560"C:\Users\admin\AppData\Local\Temp\b9dfccbd557a3318a6d0e672ca155da0.exe" C:\Users\admin\AppData\Local\Temp\b9dfccbd557a3318a6d0e672ca155da0.exeb9dfccbd557a3318a6d0e672ca155da0.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\b9dfccbd557a3318a6d0e672ca155da0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
96
Read events
95
Write events
1
Delete events
0

Modification events

(PID) Process:(1944) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944explorer.exeC:\Users\admin\AppData\Roaming\evhtujvexecutable
MD5:B9DFCCBD557A3318A6D0E672CA155DA0
SHA256:3E2951EC613371B90746D93B2EFFDF16D1D7B743498F3040886FA40CD782E55C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
1944
explorer.exe
212.193.56.210:80
host-host-file8.com
Trader soft LLC
RU
unknown

DNS requests

Domain
IP
Reputation
host-file-host6.com
unknown
host-host-file8.com
  • 212.193.56.210
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info