File name:

rpaExtract.exe

Full analysis: https://app.any.run/tasks/92bc8f53-6ff9-4f29-a7ae-983806f6fb42
Verdict: Malicious activity
Analysis date: November 11, 2024, 21:37:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 6 sections
MD5:

B236B8BAFC27A28284CC31E3C77108CF

SHA1:

A086AB54B05FD7C5C0B13725BC51734F1EE10B16

SHA256:

3E96B47E6E5A6D3755AF557AE523C78B993D251B1CD83F074190A71C76FCB708

SSDEEP:

98304:wGPWcY1jdrvUv11NhYvFeBm6+SVnzOMRK8EScIjIqNM7VQ4uCUY/urnuwdkg7CmH:57kXTaR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • rpaExtract.exe (PID: 1008)
    • The process drops C-runtime libraries

      • rpaExtract.exe (PID: 1008)
    • Process drops legitimate windows executable

      • rpaExtract.exe (PID: 1008)
    • Process drops python dynamic module

      • rpaExtract.exe (PID: 1008)
    • Application launched itself

      • rpaExtract.exe (PID: 1008)
  • INFO

    • Create files in a temporary directory

      • rpaExtract.exe (PID: 1008)
    • Checks supported languages

      • rpaExtract.exe (PID: 1008)
      • rpaExtract.exe (PID: 1732)
    • Reads the machine GUID from the registry

      • rpaExtract.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (50.1)
.exe | Win64 Executable (generic) (32.2)
.dll | Win32 Dynamic Link Library (generic) (7.6)
.exe | Win32 Executable (generic) (5.2)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:12:11 15:09:08+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 127488
InitializedDataSize: 112640
UninitializedDataSize: -
EntryPoint: 0x769a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rpaextract.exe conhost.exe no specs rpaextract.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1008"C:\Users\admin\AppData\Local\Temp\rpaExtract.exe" C:\Users\admin\AppData\Local\Temp\rpaExtract.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\rpaextract.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
1176\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerpaExtract.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1732"C:\Users\admin\AppData\Local\Temp\rpaExtract.exe" C:\Users\admin\AppData\Local\Temp\rpaExtract.exerpaExtract.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\rpaextract.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
76
Read events
76
Write events
0
Delete events
0

Modification events

No data
Executable files
8
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\_hashlib.pydexecutable
MD5:24C2F70FF5C6EADDB995F2CBB4BC4890
SHA256:8DCEAFAAEC28740385B1CB8CF2655DB68ECF2E561053BFE494795019542491E4
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\msvcm90.dllexecutable
MD5:96C7B7470ABE61BBC6F6E39FA06427DB
SHA256:B6691A3FEF03C385641D2FFD56BEBDBC19950750571C31C01383FA78C637DC57
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\msvcp90.dllexecutable
MD5:9928E1B8853C8D8A35FBFEB9E45957A8
SHA256:EA0325B1B61DB1759D3692BCF80EEF9B69E8E599A49E79DDAC551F53138B6E23
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\bz2.pydexecutable
MD5:9897FB7CFE7F78B4E4521D8D437BEA0E
SHA256:D99399BD6CA916C0490AF907FB06530839D0797B18A997ED5C091393FC2292F8
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\Microsoft.VC90.CRT.manifestxml
MD5:241A0EC0580005E5FEE986AFC78F6864
SHA256:3993E65E8BCD38CAA3DD1CB8CC6507B4D98558A3FEAD96671FD00BFB3985CEE7
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\python27.dllexecutable
MD5:C8B2B47E4DDB9658D348B3DB218F3B71
SHA256:5395A6824967AFA02C515763646C48B27836C8CACCBECB9B2EF690AB7D4FD5DF
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\select.pydexecutable
MD5:BDC7B944B9319F9708AF1949B42BAE4B
SHA256:83B5C76D938BC50E58C851D56EF8CBC1001D2E81A1E1F8F5DFED2245244C1472
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\rpaextract.exe.manifestxml
MD5:B72E91061370FE12D6F6DA525EE417C3
SHA256:C63EBF1EB99A976C1514CFB18C7A2E6E23201E16FD0550E5ABA3A5A58738770E
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\unicodedata.pydexecutable
MD5:CFA3517E25C37E808AF38FBEAF7F456E
SHA256:061926AEAAF4F7E0212552CD4BB5D6AF0E8607EC77F6EB836B6612AB86645AC9
1008rpaExtract.exeC:\Users\admin\AppData\Local\Temp\_MEI10082\msvcr90.dllexecutable
MD5:5BC75D03ABF8EBAF9C5EA4E354DFB840
SHA256:92281334CF905C35E7C93DD526B5C199EA9823CD52922F55F14E3008F98CD4E1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
34
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4700
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6268
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6268
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3396
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4360
SearchApp.exe
2.23.209.150:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4700
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4700
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4360
SearchApp.exe
2.23.209.133:443
th.bing.com
Akamai International B.V.
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.124.78.146
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.23.209.150
  • 2.23.209.176
  • 2.23.209.141
  • 2.23.209.179
  • 2.23.209.158
  • 2.23.209.160
  • 2.23.209.177
  • 2.23.209.149
  • 2.23.209.182
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.174
whitelisted
login.live.com
  • 40.126.32.134
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.140
whitelisted
th.bing.com
  • 2.23.209.133
  • 2.23.209.189
  • 2.23.209.150
  • 2.23.209.185
  • 2.23.209.149
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.182
  • 2.23.209.140
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info