| File name: | wSpam1.1.exe |
| Full analysis: | https://app.any.run/tasks/fdc219af-9bd9-4a03-92e0-f14e23bdd791 |
| Verdict: | Malicious activity |
| Analysis date: | July 27, 2024, 10:58:59 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 0A6CFC7C55A66793DD61734E855948AB |
| SHA1: | 88FBA9035DCD422B12610F12D6DBE2C3B0164A5C |
| SHA256: | 48A1672EEF39C1F4D3330BEB8737C13C0630066B7E7F6C803CFB6E5CDD903645 |
| SSDEEP: | 196608:qMc6x6mQTqvueYgB6R7yUPS0G3lCMCBcMKzHgrjTQeq7PM:bpx6mQTguXgOPiL1HgrjTQeq7 |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2020:08:08 12:28:52+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14 |
| CodeSize: | 133120 |
| InitializedDataSize: | 180224 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8808 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4468 | "C:\Users\admin\Desktop\wSpam1.1.exe" | C:\Users\admin\Desktop\wSpam1.1.exe | wSpam1.1.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 5696 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6872 | "C:\Users\admin\Desktop\wSpam1.1.exe" | C:\Users\admin\Desktop\wSpam1.1.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\PIL\_webp.cp39-win_amd64.pyd | executable | |
MD5:D3727DAAA57A89A271B4C1F98F2FB52B | SHA256:7037B1F581796D9F44319BA8D25DAB598E0D87EB5B6E34ADF37E02456599948F | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_elementtree.pyd | executable | |
MD5:048EA61F0C0F7FD42DFE8CA3203D5E99 | SHA256:9B9ABF5672BEC167B854A106EB25701433B34A0C877ED5E363202247E5BADA58 | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_ctypes.pyd | executable | |
MD5:29DA9B022C16DA461392795951CE32D9 | SHA256:3B4012343EF7A266DB0B077BBB239833779192840D1E2C43DFCBC48FFD4C5372 | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\libopenblas.QVLO2T66WEPI7JZ63PS3HMOHFEY472BC.gfortran-win_amd64.dll | — | |
MD5:— | SHA256:— | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_lzma.pyd | executable | |
MD5:B5355DD319FB3C122BB7BF4598AD7570 | SHA256:B9BC7F1D8AA8498CB8B5DC75BB0DBB6E721B48953A3F295870938B27267FB5F5 | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_overlapped.pyd | executable | |
MD5:BF495600C3D758141BED531FAABF2A4F | SHA256:AF74C3FC4BC87E1ED70E11A700A073DF77C4C891B6FAD17A9F019DF0D32C18FC | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_queue.pyd | executable | |
MD5:4AB2CEB88276EBA7E41628387EACB41E | SHA256:D82AB111224C54BAB3EEFDCFEB3BA406D74D2884518C5A2E9174E5C6101BD839 | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_hashlib.pyd | executable | |
MD5:F377A418ADDEEB02F223F45F6F168FE6 | SHA256:9551431425E9680660C6BAF7B67A262040FD2EFCEB241E4C9430560C3C1FAFAC | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_bz2.pyd | executable | |
MD5:6C7565C1EFFFE44CB0616F5B34FAA628 | SHA256:FE63361F6C439C6AA26FD795AF3FD805FF5B60B3B14F9B8C60C50A8F3449060A | |||
| 6872 | wSpam1.1.exe | C:\Users\admin\AppData\Local\Temp\_MEI68722\_multiprocessing.pyd | executable | |
MD5:E06C0C8EC05EADBEECB3083F8EC26BE6 | SHA256:91ADAC3AF53EEDB4508F554E48DFEE6E17252C28B017534124B43DF856EA84EF | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | — | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | — | — | — |
— | — | POST | 200 | 13.89.178.26:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | — |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3392 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6012 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 131.253.33.254:443 | a-ring-fallback.msedge.net | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 184.86.251.4:443 | www.bing.com | Akamai International B.V. | DE | unknown |
6716 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1340 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3952 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
t-ring-fdv2.msedge.net |
| unknown |
a-ring-fallback.msedge.net |
| unknown |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |