| File name: | 47040b942f874d377548c8743b8a4e443d4f281c29af2d23d670e0ccf9b6ea2e |
| Full analysis: | https://app.any.run/tasks/11eec3ef-c5ce-461a-a4ed-a86a1db08b38 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | April 29, 2025, 04:26:29 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 8 sections |
| MD5: | 13A3A9E06440F78E8911045EC5CADEE0 |
| SHA1: | 213DEC2BE8945D3130358E5D88F08874BF2B100B |
| SHA256: | 47040B942F874D377548C8743B8A4E443D4F281C29AF2D23D670E0CCF9B6EA2E |
| SSDEEP: | 98304:w9Cr0Sq1+v6TBVnjMcucYd5oolKjudCpeBtbcScJYRzkOvgYhFxfO0v9lXtaxSot:9jw |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:04:28 07:06:13+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 10 |
| CodeSize: | 2565632 |
| InitializedDataSize: | 1611776 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x22173c |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 300 | C:\ProgramData\x3WNqF\BpyoMZ.exe | C:\ProgramData\x3WNqF\BpyoMZ.exe | — | explorer.exe | |||||||||||
User: admin Company: Alibaba Group. Integrity Level: MEDIUM Description: DingTalk Exit code: 0 Version: 3.5.6.2 Modules
| |||||||||||||||
| 736 | C:\ProgramData\kFBUDX\o1KvuM.exe | C:\ProgramData\kFBUDX\o1KvuM.exe | — | explorer.exe | |||||||||||
User: admin Company: Alibaba Group. Integrity Level: MEDIUM Description: DingTalk Exit code: 0 Version: 3.5.6.2 Modules
| |||||||||||||||
| 1812 | C:\\Windows\\explorer.exe | C:\Windows\explorer.exe | DingTalk.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2564 | C:\\Windows\\explorer.exe | C:\Windows\explorer.exe | DingTalk.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3100 | C:\\Windows\\explorer.exe | C:\Windows\explorer.exe | DingTalk.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3332 | "C:\ProgramData\kFBUDX\main\current\DingTalk.exe" | C:\ProgramData\kFBUDX\main\current\DingTalk.exe | — | o1KvuM.exe | |||||||||||
User: admin Company: VMware, Inc. Integrity Level: MEDIUM Description: VMware Tools Core Service Exit code: 1307 Version: 12.1.0.37487 Modules
| |||||||||||||||
| 5048 | "C:\ProgramData\hQakUK\main\current\DingTalk.exe" | C:\ProgramData\hQakUK\main\current\DingTalk.exe | — | kcMWh5.exe | |||||||||||
User: admin Company: VMware, Inc. Integrity Level: MEDIUM Description: VMware Tools Core Service Exit code: 1307 Version: 12.1.0.37487 Modules
| |||||||||||||||
| 5352 | C:\ProgramData\hQakUK\kcMWh5.exe | C:\ProgramData\hQakUK\kcMWh5.exe | — | explorer.exe | |||||||||||
User: admin Company: Alibaba Group. Integrity Level: MEDIUM Description: DingTalk Exit code: 0 Version: 3.5.6.2 Modules
| |||||||||||||||
| 5492 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: FE54106800000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath0 |
Value: C:\Windows\web\wallpaper\Windows\img0.jpg | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath1 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath2 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath3 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath4 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | write | Name: | BackgroundHistoryPath0 |
Value: C:\Windows\web\wallpaper\Windows\img0.jpg | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\Network |
| Operation: | delete value | Name: | INSTALLTIME |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6040 | DingTalk.exe | C:\Windows\Temp\vmware-vmtoolsd-admin.log | — | |
MD5:— | SHA256:— | |||
| 6040 | DingTalk.exe | C:\Windows\Temp\vmware-vmsvc-admin.log | — | |
MD5:— | SHA256:— | |||
| 6388 | 47040b942f874d377548c8743b8a4e443d4f281c29af2d23d670e0ccf9b6ea2e.exe | C:\Users\Public\Downloads\bb.jpg | binary | |
MD5:BD2427C035344F701530C481EA6B0C49 | SHA256:A2C4A313604A818526BC3D3424AEF7F664E30DB6C858A7F3B0054A56F4B57F62 | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\main\current\gobject-2.0.dll | executable | |
MD5:04F3300D00CA0AB0964DD14C71639D36 | SHA256:D701B3F556B370D6C0BE5F37B5028AC8A61169F06D9B4065AEAE23621F122572 | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\BpyoMZ.exe | executable | |
MD5:627E4A4FF89ECB9FD9C812A8D86B28C3 | SHA256:2BD7CA5EE774736AF3C23D30C400B416D6AC41FC814D6F9F239EB1E7BE599EB3 | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\main\current\pcre.dll | executable | |
MD5:04893181E2960F4AAE9971B5A15A056F | SHA256:1BA88E206A9F415D839ED94F8B1633E2559E031FAC1E976B4689BFDD5B8E2749 | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\main\current\gmodule-2.0.dll | executable | |
MD5:D541E6AFF57DAB928B8C3CBA7C5EFDF2 | SHA256:5E3169122A06885A06ACA3E95B894884165B944FD79EFB5AAF133863E1E7F0F9 | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\main\current\glib-2.0.dll | executable | |
MD5:B31B5E53BCDB3058EF6BE7D7563FF338 | SHA256:5A61B9BD7AAD0F585BE70EFB3FD1E5CB939610A198335E5A2E2D5AAC661B4C9B | |||
| 5492 | explorer.exe | C:\ProgramData\x3WNqF\main\current\vmtools.dll | executable | |
MD5:BBE654291DACFB41E7374F5D1F5C0946 | SHA256:79CF86BA86F95A3A169724E605C900FBB7C6084CC87A547CD1629B1E468AE11B | |||
| 5492 | explorer.exe | C:\Users\Public\Downloads\QQgames.exe | executable | |
MD5:C3AF518D7BB5F7F368FEBCE09C7E57CE | SHA256:8F490791F7164633E2BC3BFE129C829986A45B918566C2FE1D63F3C77B0EB28C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 304 | 20.109.210.53:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
2384 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
2384 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 13.95.31.18:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
2384 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
5492 | explorer.exe | 192.238.129.9:7777 | td.ldxwpedf.cn | LEASEWEB-USA-LAX | US | malicious |
2384 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2384 | SIHClient.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2384 | SIHClient.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2384 | SIHClient.exe | 20.3.187.198:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5492 | explorer.exe | 8.134.199.119:80 | — | Hangzhou Alibaba Advertising Co.,Ltd. | CN | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
td.ldxwpedf.cn |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5492 | explorer.exe | A Network Trojan was detected | ET MALWARE Win32/ProcessKiller CnC Initialization M2 |
5492 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
5492 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
5492 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox TCP Init Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message CnC Server Response |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Encrypted Client Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Keep-Alive Client Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Keep-Alive Client Packet |
5492 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspicious User Agent Detected (RookIE) - Common with Downloaders |