File name:

webplugin.exe

Full analysis: https://app.any.run/tasks/559d562c-edce-46e5-8799-ce319340fc02
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 15, 2024, 02:51:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

2A12D0AF9F103E9434C01813A6206EA7

SHA1:

D19AC69C9DEF0E4BC3AA98329E053D855132B666

SHA256:

41098E20111253401470839549DC251ECEC6E19C623B603A8421E0F0AD6D88BE

SSDEEP:

98304:9lmuGVQu2D8VawDDbVIyQFCe7ET8XIzb5xvFMFYPDolmm1WofkFtHEG4gd2P6zjK:eCcTmskfqpKWTI/wk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • taskkill.exe (PID: 6696)
      • conhost.exe (PID: 6664)
      • taskkill.exe (PID: 6516)
      • conhost.exe (PID: 6740)
      • webplugin.exe (PID: 6504)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • webplugin.exe (PID: 6504)
    • Executable content was dropped or overwritten

      • webplugin.exe (PID: 6504)
    • There is functionality for taking screenshot (YARA)

      • WebSocketServer23420.exe (PID: 5744)
  • INFO

    • Reads the computer name

      • webplugin.exe (PID: 6504)
    • Checks supported languages

      • webplugin.exe (PID: 6504)
    • Create files in a temporary directory

      • webplugin.exe (PID: 6504)
    • Creates files in the program directory

      • webplugin.exe (PID: 6504)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23552
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x323c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.1.19434.0
ProductVersionNumber: 5.1.19434.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: ASCII
FileVersion: 5.1.412650.0
ProductName: WebPlugin 5.1.412650.0
ProductVersion: 5.1.412650.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
10
Malicious processes
1
Suspicious processes
4

Behavior graph

Click at the process to see the details
start webplugin.exe taskkill.exe conhost.exe taskkill.exe conhost.exe webactivex5.1.412650.0.exe no specs websocketserver23420.exe sppextcomobj.exe no specs slui.exe no specs webplugin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3008"C:\Users\admin\Downloads\webplugin.exe" C:\Users\admin\Downloads\webplugin.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
5.1.412650.0
Modules
Images
c:\users\admin\downloads\webplugin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4896"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5744"C:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebSocketServer23420.exe" 23420C:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebSocketServer23420.exe
webplugin.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\webrec\torch\5.1.412650.0\websocketserver23420.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
5892C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6312"C:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebActiveX5.1.412650.0.exe" /regserverC:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebActiveX5.1.412650.0.exewebplugin.exe
User:
admin
Integrity Level:
HIGH
Description:
WebActiveX Module
Exit code:
0
Version:
4, 0, 0, 0
Modules
Images
c:\program files (x86)\webrec\torch\5.1.412650.0\webactivex5.1.412650.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6504"C:\Users\admin\Downloads\webplugin.exe" C:\Users\admin\Downloads\webplugin.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
5.1.412650.0
Modules
Images
c:\users\admin\downloads\webplugin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6516TASKKILL /F /IM WebSocketServer23420.exeC:\Windows\SysWOW64\taskkill.exe
webplugin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6664\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe
taskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6696TASKKILL /F /IM WebActiveX5.1.412650.0.exeC:\Windows\SysWOW64\taskkill.exe
webplugin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6740\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe
taskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
745
Read events
719
Write events
11
Delete events
15

Modification events

(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\WebActiveX5.1.412.6.5.0.EXE
Operation:writeName:AppID
Value:
{4C782490-0459-4AAF-95CC-D9B073B5CF60}
(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E67EBEA0-76C3-4654-B685-7E60DAE25F64}
Operation:writeName:AppID
Value:
{4C782490-0459-4AAF-95CC-D9B073B5CF60}
(PID) Process:(6504) webplugin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\MozillaPlugins\@IPC/npmedia5.1.412650.0,version=5.1.412650.0
Operation:writeName:Path
Value:
C:\Program Files (x86)\webrec\Torch\5.1.412650.0\npmedia5.1.412650.0.dll
(PID) Process:(6504) webplugin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:writeName:C:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebActiveX5.1.412650.0.exe
Value:
HIGHDPIAWARE
(PID) Process:(6504) webplugin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WebSocketServer23420
Operation:writeName:URL Protocol
Value:
(PID) Process:(6504) webplugin.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:WebSocketServer23420
Value:
C:\Program Files (x86)\webrec\Torch\5.1.412650.0\WebSocketServer23420.exe 23420
(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E67EBEA0-76C3-4654-B685-7E60DAE25F64}\Control
Operation:delete keyName:(default)
Value:
(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E67EBEA0-76C3-4654-B685-7E60DAE25F64}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
Operation:delete keyName:(default)
Value:
(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E67EBEA0-76C3-4654-B685-7E60DAE25F64}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
Operation:delete keyName:(default)
Value:
(PID) Process:(6312) WebActiveX5.1.412650.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E67EBEA0-76C3-4654-B685-7E60DAE25F64}\Implemented Categories
Operation:delete keyName:(default)
Value:
Executable files
41
Suspicious files
2
Text files
79
Unknown types
0

Dropped files

PID
Process
Filename
Type
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\netsdk.dllexecutable
MD5:F8620FA6D7A796295E41D7C72DA52D91
SHA256:3983E2DC01917E525061412DB1DD6E1476226B7847256348A4774794E2D20642
6504webplugin.exeC:\Users\admin\AppData\Local\Temp\nsyB706.tmp\nsExec.dllexecutable
MD5:ACC2B699EDFEA5BF5AAE45ABA3A41E96
SHA256:168A974EAA3F588D759DB3F47C1A9FDC3494BA1FA1A73A84E5E3B2A4D58ABD7E
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\plugin.databinary
MD5:C737D1CFD18C12281330696283F5A5A5
SHA256:B0A2F21C436EBD23883E122ACD14E2796CFC9F2EB1660247DB806FD2868EC9BA
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\FileOperator.dllexecutable
MD5:384A70F8F91DEBE10E0577B52FEB7821
SHA256:90C3FF5CBA7A44AF1CB92012EC312FFD2CE7A9A9E85879664F6C0E6B72141FDB
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\play.dllexecutable
MD5:F5C35B8562B9D4A24D5D498243C16E6C
SHA256:6F055BE65099BBAE564A78EABA0CEB2F057EE590D2ECE421E46A768E15E172F4
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\h264dec.dllexecutable
MD5:BBA021731B6AC790A2657A6975925EAC
SHA256:B7FB7A779DEC00EB5CC1689B533A49F48705C3A3593017FBAB6F6DE675CFF86F
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\dllmavaacdec.dllexecutable
MD5:EB6A55A4B3346B36F16BB1D76185B953
SHA256:2B5FFFF62A2CDFCA60E977121237C3D45B0FCB23E86F3E37FD2BA86B0DB82463
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\dllmavg726dec.dllexecutable
MD5:B84C44A1D08427B1E641296CF98C36E0
SHA256:CB5845FF4206B3D021AE72B8DD5AA35F6288A5611DB43450FD7AB535408A2420
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\MediaSvr.dllexecutable
MD5:A454235F929DEBA9E7EE0EC968BFEEDF
SHA256:3718B15400404611D1C463723A3299AFB2D17DBD53C19EDD464D29AABF98B0BE
6504webplugin.exeC:\Program Files (x86)\webrec\Torch\5.1.412650.0\HttpServer.dllexecutable
MD5:D7A24E15CDBEB7C5B844E28E65CCC488
SHA256:1ACDE1D74CDBA261348E780C4B54114DD8FCA39AB2827058583CC424A572E439
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1768
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1804
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1768
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1764
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.130
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.0
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.31.69
  • 20.190.159.71
whitelisted
th.bing.com
  • 2.23.209.130
  • 2.23.209.187
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted

Threats

No threats detected
Process
Message
WebSocketServer23420.exe
WebSocketServer23420.exe
23420
WebSocketServer23420.exe
[02:52:08 trace Unknown 3600 Thread.cpp:115]ThreadBody Enter name:Sock_Timer_Thread, id:3600, prior:N64, stack:022FFF38
WebSocketServer23420.exe
_tWinMain:
WebSocketServer23420.exe
[DHTS][.\Src\queue.cpp:1801]: Create pipe wrfd 492, readfd 496
WebSocketServer23420.exe
[02:52:08 info Unknown 4828 Debug.cpp:68]<NetFrameWork Debug>-------------------------------------------------------------------------------
WebSocketServer23420.exe
[02:52:08 trace Unknown 6212 Thread.cpp:115]ThreadBody Enter name:NetFramework0, id:6212, prior:N64, stack:0364FF38
WebSocketServer23420.exe
[DHTS][.\Src\queue.cpp:1887]: CSchedManager init success
WebSocketServer23420.exe
[02:52:08 trace Unknown 6668 Thread.cpp:115]ThreadBody Enter name:NetFramework0, id:6668, prior:N64, stack:0328FF38
WebSocketServer23420.exe
[02:52:08 trace Unknown 5284 Thread.cpp:115]ThreadBody Enter name:NetFramework0 daemon, id:5284, prior:N64, stack:0314FF38