File name:

2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye

Full analysis: https://app.any.run/tasks/49c43063-35d2-4e61-b497-d1d568bf6798
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 29, 2025, 03:46:04
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sality
sainbox
rat
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

DF9848CBBC589EC9BEE3F5C5BEB00F8F

SHA1:

2928DA1546109296643F77518095B6405BCAD6BB

SHA256:

468D863E99661A0E9C8CBC472F5E24D9916DD1EB747B8242B4178E7255BB6019

SSDEEP:

98304:ii7EurJl5hOyCWYOzhZE19wIJwrB/pX3QJ5TpZ33JcFonys73e8W6zPdd1AfS0EQ:43HKv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SALITY has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • SALITY mutex has been found

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • SAINBOX has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Process drops legitimate windows executable

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Searches for installed software

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Executable content was dropped or overwritten

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads security settings of Internet Explorer

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Creates file in the systems drive root

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
  • INFO

    • Reads the computer name

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Checks supported languages

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • The sample compiled with english language support

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Create files in a temporary directory

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads the machine GUID from the registry

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • UPX packer has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Process checks computer location settings

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads the software policy settings

      • slui.exe (PID: 6800)
    • Checks proxy server information

      • slui.exe (PID: 6800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:03:19 23:35:18+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14
CodeSize: 298496
InitializedDataSize: 163328
UninitializedDataSize: -
EntryPoint: 0x29d42
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 10.1.1.45
ProductVersionNumber: 10.1.1.45
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Intel(R) Corporation
FileDescription: Intel(R) Chipset Device Software
FileVersion: 10.1.1.45
InternalName: setup
LegalCopyright: Copyright (c) Intel(R) Corporation. All rights reserved.
OriginalFileName: SetupChipset.exe
ProductName: Intel(R) Chipset Device Software
ProductVersion: 10.1.1.45
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #SALITY 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
6800C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7676"C:\Users\admin\Desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe" C:\Users\admin\Desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe
explorer.exe
User:
admin
Company:
Intel(R) Corporation
Integrity Level:
MEDIUM
Description:
Intel(R) Chipset Device Software
Exit code:
193
Version:
10.1.1.45
Modules
Images
c:\users\admin\desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
4 321
Read events
4 267
Write events
54
Delete events
0

Modification events

(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_0
Value:
864422203
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_0
Value:
6989
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_0
Value:
17001001
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_0
Value:
0
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_1
Value:
86872797
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_2
Value:
Executable files
74
Suspicious files
1
Text files
28
Unknown types
0

Dropped files

PID
Process
Filename
Type
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\mbahost.dllexecutable
MD5:CFF4519E29094D2910BE86A161F9723A
SHA256:B20F93BF47634C29F7149E359C0DCF30619DAF1CDE1F8EEE79ADEB2E1BE2B961
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\hbme.exeexecutable
MD5:B360FA63134A63F9ACFE046D2DFE10D9
SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\0010C13E_Rar\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeexecutable
MD5:DF9848CBBC589EC9BEE3F5C5BEB00F8F
SHA256:468D863E99661A0E9C8CBC472F5E24D9916DD1EB747B8242B4178E7255BB6019
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\BootstrapperCore.dllexecutable
MD5:E21AFB634CBF51DC9F1F87611FD1FA29
SHA256:D20BEAC0ECD2301F7715A89773F8297C75353E7486A39BA21ECE9CA4920E1CE4
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1038\mbapreq.wxlxml
MD5:F40A084C4B41D752A5C518D62ABD12E2
SHA256:43E00163C060A09C66AE65BDABD5A9943C55BBE8D11F8DDF95BA20008A605075
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1035\mbapreq.wxlxml
MD5:D16DA30005059D92E295C50D145AA066
SHA256:3DBD6BC3779F577AF30EE5005581F5C0B1C503F859502BE076CE49A15F73DE55
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1030\mbapreq.wxlxml
MD5:AA3E13A2DAA064E8DA8CF2F4ACC25900
SHA256:90680E9500A2014137D92EA0988B92EC34648D6826F18C9646A318E26BD1A511
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1036\mbapreq.wxlxml
MD5:C3B54DF5EC1503888ABF1D4153C0A789
SHA256:C5F1D0966EF658437B9C47056C01B479A988339593C7416A4E5A35417D44E7AB
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1031\mbapreq.wxlxml
MD5:2A45ABDB37643F7A9F1F3BD1FC54E219
SHA256:9FF48ACB76F4EBE9274DE0499C4043C7E81C08EDB9124DCADB1785F1705C8558
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1042\mbapreq.wxlxml
MD5:4D530FBCD8A7CF63A60D2D2E79C7880E
SHA256:00A5F823904E2D6849BB82F2170E798EB33898317FEC7C39E2AAC2452B900667
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
43
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
40.69.42.241:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8080
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8080
SIHClient.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
8080
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
8080
SIHClient.exe
20.242.39.171:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7324
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.131
  • 20.190.160.65
  • 20.190.160.2
  • 40.126.32.74
  • 20.190.160.4
  • 20.190.160.17
  • 20.190.160.5
whitelisted

Threats

No threats detected
No debug info