File name:

2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye

Full analysis: https://app.any.run/tasks/49c43063-35d2-4e61-b497-d1d568bf6798
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 29, 2025, 03:46:04
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sality
sainbox
rat
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

DF9848CBBC589EC9BEE3F5C5BEB00F8F

SHA1:

2928DA1546109296643F77518095B6405BCAD6BB

SHA256:

468D863E99661A0E9C8CBC472F5E24D9916DD1EB747B8242B4178E7255BB6019

SSDEEP:

98304:ii7EurJl5hOyCWYOzhZE19wIJwrB/pX3QJ5TpZ33JcFonys73e8W6zPdd1AfS0EQ:43HKv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SALITY has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • SALITY mutex has been found

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • SAINBOX has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • The process creates files with name similar to system file names

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Executable content was dropped or overwritten

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads security settings of Internet Explorer

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Searches for installed software

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Creates file in the systems drive root

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
  • INFO

    • The sample compiled with english language support

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Checks supported languages

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Create files in a temporary directory

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads the computer name

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Reads the machine GUID from the registry

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Process checks computer location settings

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • UPX packer has been detected

      • 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe (PID: 7676)
    • Checks proxy server information

      • slui.exe (PID: 6800)
    • Reads the software policy settings

      • slui.exe (PID: 6800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:03:19 23:35:18+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14
CodeSize: 298496
InitializedDataSize: 163328
UninitializedDataSize: -
EntryPoint: 0x29d42
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 10.1.1.45
ProductVersionNumber: 10.1.1.45
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Intel(R) Corporation
FileDescription: Intel(R) Chipset Device Software
FileVersion: 10.1.1.45
InternalName: setup
LegalCopyright: Copyright (c) Intel(R) Corporation. All rights reserved.
OriginalFileName: SetupChipset.exe
ProductName: Intel(R) Chipset Device Software
ProductVersion: 10.1.1.45
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #SALITY 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
6800C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7676"C:\Users\admin\Desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe" C:\Users\admin\Desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe
explorer.exe
User:
admin
Company:
Intel(R) Corporation
Integrity Level:
MEDIUM
Description:
Intel(R) Chipset Device Software
Exit code:
193
Version:
10.1.1.45
Modules
Images
c:\users\admin\desktop\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
4 321
Read events
4 267
Write events
54
Delete events
0

Modification events

(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_0
Value:
864422203
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_0
Value:
6989
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_0
Value:
17001001
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_0
Value:
0
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_1
Value:
86872797
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a2_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a3_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a4_1
Value:
(PID) Process:(7676) 2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tvidl
Operation:writeName:a1_2
Value:
Executable files
74
Suspicious files
1
Text files
28
Unknown types
0

Dropped files

PID
Process
Filename
Type
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\0010C13E_Rar\2025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeexecutable
MD5:DF9848CBBC589EC9BEE3F5C5BEB00F8F
SHA256:468D863E99661A0E9C8CBC472F5E24D9916DD1EB747B8242B4178E7255BB6019
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1038\mbapreq.wxlxml
MD5:F40A084C4B41D752A5C518D62ABD12E2
SHA256:43E00163C060A09C66AE65BDABD5A9943C55BBE8D11F8DDF95BA20008A605075
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1035\mbapreq.wxlxml
MD5:D16DA30005059D92E295C50D145AA066
SHA256:3DBD6BC3779F577AF30EE5005581F5C0B1C503F859502BE076CE49A15F73DE55
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1041\mbapreq.wxlxml
MD5:14A1279359281B86936E9BD3921829DF
SHA256:13635769DB1F48F0E5226721268B0FF2BA3F8B391DA13D877C9CAAE08D4C58C1
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1043\mbapreq.wxlxml
MD5:D82150BEE4CC7CEBFFA96CDF3762E320
SHA256:41D9D9363935702730A09FA9FEDF730CEBC51DB962E05FA4B05841840895C92C
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1042\mbapreq.wxlxml
MD5:4D530FBCD8A7CF63A60D2D2E79C7880E
SHA256:00A5F823904E2D6849BB82F2170E798EB33898317FEC7C39E2AAC2452B900667
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1044\mbapreq.wxlxml
MD5:DE3ACE5CD8E4CE57B6D3379AE9E66540
SHA256:AE7AA89299F00E43364D2627B46B78DC04F80279D8A0D905A8517C322115D21F
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\hbme.exeexecutable
MD5:B360FA63134A63F9ACFE046D2DFE10D9
SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1046\mbapreq.wxlxml
MD5:F96B3463B3D35F1F169238C737A62897
SHA256:EBC2BF04A4F378AEA26E5CB9F4AD334F3713DC36A4A98056E8384C87A33CDA4D
76762025-04-29_df9848cbbc589ec9bee3f5c5beb00f8f_black-basta_coinminer_elex_hawkeye.exeC:\Users\admin\AppData\Local\Temp\{a2167b7c-e567-4ae5-9c88-8e1349a01363}\.ba1\1060\mbapreq.wxlxml
MD5:FB797985DBD06B555A8AB8E43A0DD8E9
SHA256:8E069B1722A4FC499C545A6CC0827D83B017EF6ADFC59B8D06DA501EB0A3BFFE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
43
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
unknown
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
40.69.42.241:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
unknown
8080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8080
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8080
SIHClient.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
8080
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
8080
SIHClient.exe
20.242.39.171:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7324
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.131
  • 20.190.160.65
  • 20.190.160.2
  • 40.126.32.74
  • 20.190.160.4
  • 20.190.160.17
  • 20.190.160.5
whitelisted

Threats

No threats detected
No debug info