File name:

conhost.exe

Full analysis: https://app.any.run/tasks/f15db5e2-d48e-4343-a539-94ebf8658b08
Verdict: Malicious activity
Analysis date: December 02, 2023, 16:47:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

144C9D72C4ABF8F3F052929522749DC5

SHA1:

B3172F803604089A2DAE8296D00D5E60BA394F4C

SHA256:

45081E83D7D860FC7316761A9F88B5F0B607FF6500683E500B18551FA95AD048

SSDEEP:

12288:PJ7Cr3m/xK0t3LMbod6oCZEhcg6zf3f1d:PJ7Cr3m/PuodBKEhc5zVd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • conhost.exe (PID: 2144)
      • zyersydiabb.exe (PID: 3976)
      • WinMail.exe (PID: 1152)
    • Scans artifacts that could help determine the target

      • WinMail.exe (PID: 1152)
    • Runs injected code in another process

      • zyersydiabb.exe (PID: 3976)
    • Application was injected by another process

      • dwm.exe (PID: 932)
    • Actions looks like stealing of personal data

      • dwm.exe (PID: 932)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • conhost.exe (PID: 2144)
      • zyersydiabb.exe (PID: 3976)
    • Starts itself from another location

      • conhost.exe (PID: 2144)
    • Reads Internet Explorer settings

      • WinMail.exe (PID: 1152)
    • Reads Microsoft Outlook installation path

      • WinMail.exe (PID: 1152)
    • Reads security settings of Internet Explorer

      • WinMail.exe (PID: 1152)
    • Reads settings of System Certificates

      • WinMail.exe (PID: 1152)
    • Drops a self-deleting batch file

      • conhost.exe (PID: 2144)
    • Starts CMD.EXE for commands execution

      • conhost.exe (PID: 2144)
    • Reads the Internet Settings

      • dwm.exe (PID: 932)
      • conhost.exe (PID: 2144)
      • WinMail.exe (PID: 1152)
      • cmd.exe (PID: 2696)
    • Executing commands from a ".bat" file

      • conhost.exe (PID: 2144)
    • Detected use of alternative data streams (AltDS)

      • WinMail.exe (PID: 1152)
    • Checks Windows Trust Settings

      • WinMail.exe (PID: 1152)
  • INFO

    • Create files in a temporary directory

      • conhost.exe (PID: 2144)
      • zyersydiabb.exe (PID: 3976)
      • WinMail.exe (PID: 1152)
    • Reads the computer name

      • conhost.exe (PID: 2144)
      • zyersydiabb.exe (PID: 3976)
      • WinMail.exe (PID: 1152)
    • Checks supported languages

      • conhost.exe (PID: 2144)
      • zyersydiabb.exe (PID: 3976)
      • WinMail.exe (PID: 1152)
    • Creates files or folders in the user directory

      • conhost.exe (PID: 2144)
      • WinMail.exe (PID: 1152)
    • Reads the machine GUID from the registry

      • WinMail.exe (PID: 1152)
      • conhost.exe (PID: 2144)
    • Checks proxy server information

      • WinMail.exe (PID: 1152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.5)
.exe | DOS Executable Borland Pascal 7.0x (19.2)
.exe | Generic Win/DOS Executable (18.8)
.exe | DOS Executable Generic (18.8)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:10:12 17:42:38+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 255488
InitializedDataSize: 22528
UninitializedDataSize: -
EntryPoint: 0x3f4d4
OSVersion: 5.1
ImageVersion: 1
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject conhost.exe no specs zyersydiabb.exe no specs winmail.exe no specs dwm.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
932"C:\Windows\system32\Dwm.exe"C:\Windows\System32\dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
1152"C:\Program Files\Windows Mail\WinMail.exe" -EmbeddingC:\Program Files\Windows Mail\WinMail.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Mail
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows mail\winmail.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2144"C:\Users\admin\AppData\Local\Temp\conhost.exe" C:\Users\admin\AppData\Local\Temp\conhost.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2696"C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\tmpdb7d2ac7.bat"C:\Windows\System32\cmd.execonhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3976"C:\Users\admin\AppData\Roaming\Myokuhesism\zyersydiabb.exe"C:\Users\admin\AppData\Roaming\Myokuhesism\zyersydiabb.execonhost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\myokuhesism\zyersydiabb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
4 547
Read events
4 507
Write events
34
Delete events
6

Modification events

(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
Operation:writeName:StoreMigratedV5
Value:
1
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
Operation:writeName:Settings Upgraded
Value:
10
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\IAM
Operation:writeName:Server ID
Value:
2
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Identities
Operation:writeName:Identity Ordinal
Value:
2
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
Operation:writeName:LastBackup
Value:
E1070A0004000500090014000400CA01
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\IAM
Operation:writeName:Default News Account
Value:
account{30CE7C98-AA27-4327-91CA-78FA20FFA850}.oeaccount
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\WAB
Operation:delete valueName:NamedProps
Value:
0420060000000000C00000000000004604000000000000800E0000000100330032003800350034000000000001800E0000000100330032003800350035000000000002800E0000000100330032003800350036000000000003800E0000000100330032003800350037000000
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\WAB
Operation:delete valueName:NamedPropCount
Value:
1
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\WAB
Operation:delete valueName:NamedProps
Value:
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
(PID) Process:(1152) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\WAB
Operation:delete valueName:NamedPropCount
Value:
2
Executable files
6
Suspicious files
19
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3976zyersydiabb.exeC:\Users\admin\AppData\Local\Temp\tmp7BDB.tmpexecutable
MD5:EBB2B4FD62087283D9448F7F8796727D
SHA256:9C9EA64C0D56BF17D388C58B36AB7A79CA6AA74446B6DD2F614F5CBF9D828529
3976zyersydiabb.exeC:\Users\admin\AppData\Local\Temp\tmp7BFB.tmpexecutable
MD5:BFCB6AA8CEC2B46A696D9573BC3590B9
SHA256:14C770C42C2AB9383540AF594CC546E6BEFEE0AFCCD48B4A24A9D8687711D689
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.folbinary
MD5:1D1A60631EFCF505795FB06471CB6A48
SHA256:87EED194D869F1DEC6EBF639E985101ABAD37F6E5A347237A1B056B2DCBFC481
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStorebinary
MD5:47618B0406DA5BC324763E00D4A0CB93
SHA256:0AE27C8570E08B362D07E902E634CA1C33E921A3C3EBC625E8B5DF0271BDDF60
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.folbinary
MD5:9EF0149FAEFF67AA41DA62C9A4B3226C
SHA256:4B8D7DCC16F962586F50184B40E8AD4D2B6E1980ECCACE178BC4B4D645751E49
2144conhost.exeC:\Users\admin\AppData\Local\Temp\tmp70A1.tmpexecutable
MD5:BFCB6AA8CEC2B46A696D9573BC3590B9
SHA256:14C770C42C2AB9383540AF594CC546E6BEFEE0AFCCD48B4A24A9D8687711D689
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edb.chkbinary
MD5:073F2394E22872C8AAC474B7F40802B5
SHA256:EBF080E39266A308FFF262BB8F076F741F434CF1F6CA1A796A31495B389B63F3
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.patbinary
MD5:01D9836C4D2F53F64107614BE90ADB99
SHA256:27B14F8CD89FA2C2F17D7570B08415D0B1AE79239A55757A7E3B049600C072A1
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edb00002.logbinary
MD5:D5FED0D952B448322A924A0064B3A38B
SHA256:4A087BA30C6AD95313C19A956D25875563A49328F71A4B3259B68959903F7AD2
1152WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edbtmp.logbinary
MD5:07AE2538251773F3825975F7EE7E6270
SHA256:93087DEE00D614C2629CEF76D0FD5ABE6A71C07435885B937C6A3136A373A9FB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
zloy1312.tk
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
No debug info