File name:

45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00

Full analysis: https://app.any.run/tasks/a1e85f6d-ae46-46ea-b412-f139d169c87d
Verdict: Malicious activity
Analysis date: December 13, 2024, 20:56:01
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 2 sections
MD5:

5A016957B7AA6EEA811681EBBC2756DF

SHA1:

5DE3E5EAF15413067B1C0FFF80F5738051673236

SHA256:

45C404247EF243DDBCB9836C01D536A0CCC35A71DA78D64D36467B972AD43B00

SSDEEP:

49152:J++ddAKY5uswTclyLenEtdjUhl0DUDCnhm2my/c94GNzHUcrWjAcDgLxLgzL:JXix5wGG+EtdIhl0DUp94Lef

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for self-deleting

      • 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe (PID: 6680)
  • SUSPICIOUS

    • Executes as Windows Service

      • Wxypq.exe (PID: 6700)
    • Executable content was dropped or overwritten

      • 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe (PID: 6680)
      • Wxypq.exe (PID: 6744)
    • Application launched itself

      • Wxypq.exe (PID: 6700)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6732)
    • Hides command output

      • cmd.exe (PID: 6732)
    • Creates files in the driver directory

      • Wxypq.exe (PID: 6744)
    • Starts CMD.EXE for commands execution

      • 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe (PID: 6680)
    • Drops a system driver (possible attempt to evade defenses)

      • Wxypq.exe (PID: 6744)
    • Creates or modifies Windows services

      • Wxypq.exe (PID: 6744)
    • Reads security settings of Internet Explorer

      • Wxypq.exe (PID: 6744)
    • Connects to unusual port

      • Wxypq.exe (PID: 6744)
  • INFO

    • Reads the computer name

      • Wxypq.exe (PID: 6700)
      • Wxypq.exe (PID: 6744)
      • 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe (PID: 6680)
    • Checks supported languages

      • Wxypq.exe (PID: 6700)
      • Wxypq.exe (PID: 6744)
      • 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe (PID: 6680)
    • Reads CPU info

      • Wxypq.exe (PID: 6744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:08:06 16:38:04+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: -
InitializedDataSize: 1312256
UninitializedDataSize: -
EntryPoint: 0x137cc9
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
7
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe no specs 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe wxypq.exe no specs cmd.exe no specs wxypq.exe conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6520"C:\Users\admin\Desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe" C:\Users\admin\Desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6680"C:\Users\admin\Desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe" C:\Users\admin\Desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6700C:\WINDOWS\SysWOW64\Wxypq.exe -autoC:\Windows\SysWOW64\Wxypq.exeservices.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\windows\syswow64\wxypq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6732C:\WINDOWS\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\admin\Desktop\45C404~1.EXE > nulC:\Windows\SysWOW64\cmd.exe45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6744C:\WINDOWS\SysWOW64\Wxypq.exe -acsiC:\Windows\SysWOW64\Wxypq.exe
Wxypq.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Modules
Images
c:\windows\syswow64\wxypq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6756\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6844ping -n 2 127.0.0.1 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
955
Read events
940
Write events
15
Delete events
0

Modification events

(PID) Process:(6680) 45c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:MarkTime
Value:
2024-12-13 20:56
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Type
Value:
2
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Start
Value:
1
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ErrorControl
Value:
0
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ImagePath
Value:
system32\DRIVERS\QAssist.sys
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:DisplayName
Value:
QAssist
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Group
Value:
FSFilter Activity Monitor
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:DependOnService
Value:
FltMgr
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:DebugFlags
Value:
0
(PID) Process:(6744) Wxypq.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:SupportedFeatures
Value:
3
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
668045c404247ef243ddbcb9836c01d536a0ccc35a71da78d64d36467b972ad43b00.exeC:\Windows\SysWOW64\Wxypq.exeexecutable
MD5:5A016957B7AA6EEA811681EBBC2756DF
SHA256:45C404247EF243DDBCB9836C01D536A0CCC35A71DA78D64D36467B972AD43B00
6744Wxypq.exeC:\Windows\System32\drivers\QAssist.sysexecutable
MD5:4E34C068E764AD0FF0CB58BC4F143197
SHA256:6CCE28B275D5EC20992BB13790976CAF434AB46DDBFD5CFD431D33424943122B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
22
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4536
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4536
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4536
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.140:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4536
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4536
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.209.140
  • 2.23.209.176
  • 2.23.209.182
  • 2.23.209.148
  • 2.23.209.177
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.179
  • 2.23.209.189
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
steven918.e1.luyouxia.net
  • 123.99.198.201
malicious
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 104.46.162.225
whitelisted

Threats

No threats detected
No debug info