File name:

4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d

Full analysis: https://app.any.run/tasks/1bd89e1e-acc6-44e3-80e2-e161f62cf348
Verdict: Malicious activity
Analysis date: May 15, 2025, 16:05:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 5 sections
MD5:

75E47756EFF98D74C8037A1575BE0BA8

SHA1:

FA83040DA3D105E4D5B06446B0401EFF62001EA4

SHA256:

4310D4F3B058A11732439DDB8B2CD0C0CEA5CF81B13E1F8BFD9D6C57E6F6218D

SSDEEP:

384:rU1IqlRwRebut+bbu2EB9F8xiwEB9F8xiCnRznRd:Q1Iqlwebhbur9F8xi59F8xiCnRznRd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
    • Executable content was dropped or overwritten

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
    • The process creates files with name similar to system file names

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
  • INFO

    • Checks supported languages

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
    • Creates files or folders in the user directory

      • 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe (PID: 5332)
    • Checks proxy server information

      • slui.exe (PID: 1272)
    • Reads the software policy settings

      • slui.exe (PID: 1272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.4)
.exe | Win16/32 Executable Delphi generic (19.5)
.exe | Generic Win/DOS Executable (18.8)
.exe | DOS Executable Generic (18.8)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: -
CodeSize: -
InitializedDataSize: -
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1272C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5332"C:\Users\admin\Desktop\4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe" C:\Users\admin\Desktop\4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\4310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 372
Read events
3 372
Write events
0
Delete events
0

Modification events

No data
Executable files
1 856
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exe
MD5:
SHA256:
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:594BF0E75806F40CB76327EE810DF539
SHA256:E040B8016DDF9E01FF338C358C0B5554B9E4ADFF0F294918FBBE484B96F5F10F
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb.tmpexecutable
MD5:7BFA4D18A976FB38F5251B7573C1A173
SHA256:5D55E5BB965E05EB005332C60E656A7F62792C27B679AF77BAD125ED9A3AC803
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmpexecutable
MD5:5FD732521A7A453568746A4BBA6CB1B2
SHA256:7341DDCC2D97CA1B05E730171CC1D5FB418F91D5F0F02F31344D5FBE13F82811
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmpexecutable
MD5:5984954823FCC5F049C605451EE2C25E
SHA256:E040F6F153981A8FAF3296DBBB6F8828B6949169F294DF48675CCCE016BE496B
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:C86D0FEA7EC6EEADE109D0D7A8A43E9C
SHA256:2C0B3DD51768BD2A288437F5D77D65E31D1D724B263915BC815DACAB8CAB622A
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:5984954823FCC5F049C605451EE2C25E
SHA256:E040F6F153981A8FAF3296DBBB6F8828B6949169F294DF48675CCCE016BE496B
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmpexecutable
MD5:4282FB2F27ECFA39D050095CA5CE30AC
SHA256:13EA414DCAD5BCEF9C0DF81C4EBF72EFA8658C87B0D0F9051E252D36B58FCDD5
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:996B35EDB0294DCB7FC21F29056F895E
SHA256:3FA22803178A5D283B473DFF76748CA186345F919B3CE6881EBAA76825B6B15D
53324310d4f3b058a11732439ddb8b2cd0c0cea5cf81b13e1f8bfd9d6c57e6f6218d.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.tmpexecutable
MD5:A7A3ECFD01B457BBBD5EA5ACFB20856C
SHA256:A7464862D390AAB74FF7D6A3EC02FEE949695B47FB902CFEB95655FB49C88930
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
52
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1912
SIHClient.exe
GET
200
23.48.23.161:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
23.48.23.161:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
23.48.23.161:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
1912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1912
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
1912
SIHClient.exe
23.48.23.161:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1912
SIHClient.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1912
SIHClient.exe
13.85.23.206:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 172.217.16.142
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
crl.microsoft.com
  • 23.48.23.161
  • 23.48.23.168
  • 23.48.23.166
  • 23.48.23.177
  • 23.48.23.176
  • 23.48.23.169
  • 23.48.23.164
  • 23.48.23.162
  • 23.48.23.174
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.64
  • 40.126.31.67
  • 40.126.31.2
  • 40.126.31.128
  • 20.190.159.68
  • 20.190.159.130
  • 20.190.159.23
whitelisted

Threats

No threats detected
No debug info