| File name: | rpaExtract.exe |
| Full analysis: | https://app.any.run/tasks/92bc8f53-6ff9-4f29-a7ae-983806f6fb42 |
| Verdict: | Malicious activity |
| Analysis date: | November 11, 2024, 21:37:49 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386, for MS Windows, 6 sections |
| MD5: | B236B8BAFC27A28284CC31E3C77108CF |
| SHA1: | A086AB54B05FD7C5C0B13725BC51734F1EE10B16 |
| SHA256: | 3E96B47E6E5A6D3755AF557AE523C78B993D251B1CD83F074190A71C76FCB708 |
| SSDEEP: | 98304:wGPWcY1jdrvUv11NhYvFeBm6+SVnzOMRK8EScIjIqNM7VQ4uCUY/urnuwdkg7CmH:57kXTaR |
| .exe | | | InstallShield setup (50.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (32.2) |
| .dll | | | Win32 Dynamic Link Library (generic) (7.6) |
| .exe | | | Win32 Executable (generic) (5.2) |
| .exe | | | Generic Win/DOS Executable (2.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:12:11 15:09:08+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 127488 |
| InitializedDataSize: | 112640 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x769a |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1008 | "C:\Users\admin\AppData\Local\Temp\rpaExtract.exe" | C:\Users\admin\AppData\Local\Temp\rpaExtract.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 2 Modules
| |||||||||||||||
| 1176 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | rpaExtract.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1732 | "C:\Users\admin\AppData\Local\Temp\rpaExtract.exe" | C:\Users\admin\AppData\Local\Temp\rpaExtract.exe | — | rpaExtract.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 2 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\_hashlib.pyd | executable | |
MD5:24C2F70FF5C6EADDB995F2CBB4BC4890 | SHA256:8DCEAFAAEC28740385B1CB8CF2655DB68ECF2E561053BFE494795019542491E4 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\msvcm90.dll | executable | |
MD5:96C7B7470ABE61BBC6F6E39FA06427DB | SHA256:B6691A3FEF03C385641D2FFD56BEBDBC19950750571C31C01383FA78C637DC57 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\msvcp90.dll | executable | |
MD5:9928E1B8853C8D8A35FBFEB9E45957A8 | SHA256:EA0325B1B61DB1759D3692BCF80EEF9B69E8E599A49E79DDAC551F53138B6E23 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\bz2.pyd | executable | |
MD5:9897FB7CFE7F78B4E4521D8D437BEA0E | SHA256:D99399BD6CA916C0490AF907FB06530839D0797B18A997ED5C091393FC2292F8 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\Microsoft.VC90.CRT.manifest | xml | |
MD5:241A0EC0580005E5FEE986AFC78F6864 | SHA256:3993E65E8BCD38CAA3DD1CB8CC6507B4D98558A3FEAD96671FD00BFB3985CEE7 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\python27.dll | executable | |
MD5:C8B2B47E4DDB9658D348B3DB218F3B71 | SHA256:5395A6824967AFA02C515763646C48B27836C8CACCBECB9B2EF690AB7D4FD5DF | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\select.pyd | executable | |
MD5:BDC7B944B9319F9708AF1949B42BAE4B | SHA256:83B5C76D938BC50E58C851D56EF8CBC1001D2E81A1E1F8F5DFED2245244C1472 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\rpaextract.exe.manifest | xml | |
MD5:B72E91061370FE12D6F6DA525EE417C3 | SHA256:C63EBF1EB99A976C1514CFB18C7A2E6E23201E16FD0550E5ABA3A5A58738770E | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\unicodedata.pyd | executable | |
MD5:CFA3517E25C37E808AF38FBEAF7F456E | SHA256:061926AEAAF4F7E0212552CD4BB5D6AF0E8607EC77F6EB836B6612AB86645AC9 | |||
| 1008 | rpaExtract.exe | C:\Users\admin\AppData\Local\Temp\_MEI10082\msvcr90.dll | executable | |
MD5:5BC75D03ABF8EBAF9C5EA4E354DFB840 | SHA256:92281334CF905C35E7C93DD526B5C199EA9823CD52922F55F14E3008F98CD4E1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4700 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6268 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6268 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3396 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4360 | SearchApp.exe | 2.23.209.150:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4700 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4700 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4360 | SearchApp.exe | 2.23.209.133:443 | th.bing.com | Akamai International B.V. | GB | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |