File name:

windows-privesc-check2.exe

Full analysis: https://app.any.run/tasks/fbac23c3-3802-40e6-84c9-a44f1e8550bd
Verdict: Malicious activity
Analysis date: June 05, 2019, 10:55:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

0F4471B3F8B3485268DFA7E825A217B4

SHA1:

1FBC3F8CF90DCFFEFB8F42436F9DB2EC6F9AE12D

SHA256:

483622FB3A2B1287DBD15C3C73A91025FFACC8A485134054BCDFB9592E7E9718

SSDEEP:

196608:NvPGP3TjBcWivlGV0Es2OkbtFELnZMEvEQWARzAF:NvOHBvm2Ns2OkpeZMXAOF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • windows-privesc-check2.exe (PID: 584)
      • windows-privesc-check2.exe (PID: 3324)
      • windows-privesc-check2.exe (PID: 2912)
  • SUSPICIOUS

    • Loads Python modules

      • windows-privesc-check2.exe (PID: 584)
      • windows-privesc-check2.exe (PID: 3324)
      • windows-privesc-check2.exe (PID: 2912)
    • Executable content was dropped or overwritten

      • windows-privesc-check2.exe (PID: 3092)
      • windows-privesc-check2.exe (PID: 2736)
      • windows-privesc-check2.exe (PID: 1136)
    • Application launched itself

      • windows-privesc-check2.exe (PID: 3092)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 2008)
      • explorer.exe (PID: 3608)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:12 17:08:38+01:00
PEType: PE32
LinkerVersion: 7.1
CodeSize: 57344
InitializedDataSize: 36864
UninitializedDataSize: -
EntryPoint: 0x6a0b
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date: 12-Nov-2010 16:08:38

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 12-Nov-2010 16:08:38
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000D18E
0x0000E000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.47947
.rdata
0x0000F000
0x00004FD6
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.83391
.data
0x00014000
0x000026C4
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.18751
.rsrc
0x00017000
0x000003A0
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.976058

Resources

Title
Entropy
Size
Codepage
Language
Type
1
2.74586
744
UNKNOWN
UNKNOWN
RT_ICON
101
2.16096
20
UNKNOWN
UNKNOWN
RT_GROUP_ICON

Imports

COMCTL32.dll
KERNEL32.dll
WS2_32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
8
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start windows-privesc-check2.exe windows-privesc-check2.exe no specs explorer.exe no specs cmd.exe no specs windows-privesc-check2.exe windows-privesc-check2.exe no specs windows-privesc-check2.exe windows-privesc-check2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
584"C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exe" C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exewindows-privesc-check2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1136windows-privesc-check2.exe --dump -E -f -F -G -H -I -j -k -L -O -n -N -R -S -t C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2008"cmd.exe" /s /k pushd "C:\Users\admin\AppData\Local\Temp"C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2736windows-privesc-check2.exe --dump -E -f -F -G -H -I -j -k -L -O -n -N -R -S -t -e -r C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2912windows-privesc-check2.exe --dump -E -f -F -G -H -I -j -k -L -O -n -N -R -S -t -e -r C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exewindows-privesc-check2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3092"C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exe" C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3324windows-privesc-check2.exe --dump -E -f -F -G -H -I -j -k -L -O -n -N -R -S -t C:\Users\admin\AppData\Local\Temp\windows-privesc-check2.exewindows-privesc-check2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\windows-privesc-check2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3608"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
44
Read events
44
Write events
0
Delete events
0

Modification events

No data
Executable files
90
Suspicious files
0
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\_hashlib.pydexecutable
MD5:8E05C1EFD3345194B059ADA0A4CD71E8
SHA256:FC9F52148793457A28C99E7A5AA114806C23EFCD10516DDF311907546A4D1C57
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\unicodedata.pydexecutable
MD5:0F0DEB93E54A9F1B88264F7A0361693B
SHA256:929397BBFB0E34DDA5D18B6C4E5D271B4EE6A63A32E5F0C328A53B1C55A9590E
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\win32file.pydexecutable
MD5:D4F8743311FFF7DACB9D5AE68B49BFE3
SHA256:9AA650A9117918B9C57F89B573BB597C91C18E77E4EAE0145829A3E283C74B82
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\_ssl.pydexecutable
MD5:1984F73F94D11E197EFAEC2DC41232F5
SHA256:BCAD190AB35F96A8F360131C0B7138DCD826BA8A903679510FFB34CA4F73CC77
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\PyWinTypes27.dllexecutable
MD5:F3EF005E60F838EAAA44529DAEEB93AB
SHA256:241ECBD87410E9B23339D494F9ECA7DDF8083472661989F489FDD7FE0B8776B4
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\win32service.pydexecutable
MD5:E13134CD2996BAE2E9573EA7568A0648
SHA256:FBB43981B5DFB0B7392724831855AC7B9AD4980CD625B0A14EE8B90320EA0B34
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\_win32sysloader.pydexecutable
MD5:0DDC179AAEFD31BE60FE5611CE372CF4
SHA256:6842DF5C73F1D7DE30C6FC8F811143EC530312BD7A389294763ACE96A8F97835
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\_ctypes.pydexecutable
MD5:6027866CC7E8A639FE7300B2558112A3
SHA256:552AA528F998319DD95D95EA13CD37615A725155D171E88BD15ADE707723FFD7
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\win32ts.pydexecutable
MD5:EC45CC5611C0CF5F4E0430F438DC3486
SHA256:2B2BF3A3D1A1175A81416686132CD6CE45C6E7DA8969DE03FED2E150264EF5FE
3092windows-privesc-check2.exeC:\Users\admin\AppData\Local\Temp\_MEI30922\lxml.etree.pydexecutable
MD5:6A21F6FBBF3108AD99C84652EA95658B
SHA256:FD6B56D9F66189B7FAC18B5F6C886A088CCE22878A09D241DCDDF3EE72EEEF83
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info