File name:

Auto System Care.exe

Full analysis: https://app.any.run/tasks/d2818fd1-fdd8-434e-a1ed-a02ae63f98f1
Verdict: Malicious activity
Analysis date: August 22, 2024, 02:39:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

844F27C28A2EEE84FB25AAD61C077790

SHA1:

8CDDBABFB306154B599A90029A36483D48AEDA70

SHA256:

4AFC95390AD33C320FD7D0F168AB8395F564BEA3EE880EFD9249879483094DC6

SSDEEP:

98304:59/culVFh4/tDwAjTPYxIGGddnT3+uz0UgEMmTtFAXOHLJgQ+aB7K6EY/dzwFnvp:t+3Wj0QqH9k+9qIrri3v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • iytr.exe (PID: 1608)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Auto System Care.exe (PID: 6628)
      • Auto System Care.exe (PID: 6720)
      • Auto System Care.tmp (PID: 6744)
    • Reads the date of Windows installation

      • Auto System Care.tmp (PID: 6648)
      • Auto System Care.tmp (PID: 6744)
    • Drops the executable file immediately after the start

      • Auto System Care.exe (PID: 6628)
      • Auto System Care.exe (PID: 6720)
      • Auto System Care.tmp (PID: 6744)
    • Reads security settings of Internet Explorer

      • Auto System Care.tmp (PID: 6648)
      • Auto System Care.tmp (PID: 6744)
      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Reads the Windows owner or organization settings

      • Auto System Care.tmp (PID: 6744)
    • Process drops legitimate windows executable

      • Auto System Care.tmp (PID: 6744)
    • Uses TASKKILL.EXE to kill process

      • Auto System Care.tmp (PID: 6744)
    • Reads Microsoft Outlook installation path

      • iytr.exe (PID: 1608)
    • Reads Internet Explorer settings

      • iytr.exe (PID: 1608)
  • INFO

    • Create files in a temporary directory

      • Auto System Care.exe (PID: 6628)
      • Auto System Care.exe (PID: 6720)
      • Auto System Care.tmp (PID: 6744)
    • Reads the computer name

      • Auto System Care.tmp (PID: 6648)
      • Auto System Care.tmp (PID: 6744)
      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Process checks computer location settings

      • Auto System Care.tmp (PID: 6648)
      • Auto System Care.tmp (PID: 6744)
    • Checks supported languages

      • Auto System Care.tmp (PID: 6648)
      • Auto System Care.exe (PID: 6628)
      • Auto System Care.tmp (PID: 6744)
      • Auto System Care.exe (PID: 6720)
      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Creates a software uninstall entry

      • Auto System Care.tmp (PID: 6744)
    • Creates files in the program directory

      • Auto System Care.tmp (PID: 6744)
    • Reads the machine GUID from the registry

      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Creates files or folders in the user directory

      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Checks proxy server information

      • iytr.exe (PID: 6420)
      • iytr.exe (PID: 1608)
    • Reads Environment values

      • iytr.exe (PID: 1608)
      • iytr.exe (PID: 6420)
    • Process checks Internet Explorer phishing filters

      • iytr.exe (PID: 1608)
    • Disables trace logs

      • iytr.exe (PID: 6420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (57.2)
.exe | Win32 Executable (generic) (18.2)
.exe | Win16/32 Executable Delphi generic (8.3)
.exe | Generic Win/DOS Executable (8)
.exe | DOS Executable Generic (8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:01:15 08:22:50+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 65024
InitializedDataSize: 104448
UninitializedDataSize: -
EntryPoint: 0x113bc
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.2
ProductVersionNumber: 1.0.0.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Auto~System Care Setup
FileVersion: 1.0.0.2
LegalCopyright:
ProductName: Auto~System Care
ProductVersion: 1.0.0.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
10
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start auto system care.exe auto system care.tmp no specs auto system care.exe auto system care.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs iytr.exe iytr.exe

Process information

PID
CMD
Path
Indicators
Parent process
1608"C:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exe" firstshowC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exe
Auto System Care.tmp
User:
admin
Integrity Level:
HIGH
Description:
System Booster
Version:
1.0.0.2
Modules
Images
c:\program files\auto~system care for desktop-jglljld\iytr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6420"C:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exe" getwebparamC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exe
Auto System Care.tmp
User:
admin
Integrity Level:
HIGH
Description:
System Booster
Exit code:
1
Version:
1.0.0.2
Modules
Images
c:\program files\auto~system care for desktop-jglljld\iytr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6628"C:\Users\admin\AppData\Local\Temp\Auto System Care.exe" C:\Users\admin\AppData\Local\Temp\Auto System Care.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Auto~System Care Setup
Exit code:
0
Version:
1.0.0.2
Modules
Images
c:\users\admin\appdata\local\temp\auto system care.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6648"C:\Users\admin\AppData\Local\Temp\is-11U3E.tmp\Auto System Care.tmp" /SL5="$503C8,7265007,170496,C:\Users\admin\AppData\Local\Temp\Auto System Care.exe" C:\Users\admin\AppData\Local\Temp\is-11U3E.tmp\Auto System Care.tmpAuto System Care.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-11u3e.tmp\auto system care.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6720"C:\Users\admin\AppData\Local\Temp\Auto System Care.exe" /SPAWNWND=$503A4 /NOTIFYWND=$503C8 C:\Users\admin\AppData\Local\Temp\Auto System Care.exe
Auto System Care.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
Auto~System Care Setup
Exit code:
0
Version:
1.0.0.2
Modules
Images
c:\users\admin\appdata\local\temp\auto system care.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6744"C:\Users\admin\AppData\Local\Temp\is-8CDE4.tmp\Auto System Care.tmp" /SL5="$603A8,7265007,170496,C:\Users\admin\AppData\Local\Temp\Auto System Care.exe" /SPAWNWND=$503A4 /NOTIFYWND=$503C8 C:\Users\admin\AppData\Local\Temp\is-8CDE4.tmp\Auto System Care.tmp
Auto System Care.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-8cde4.tmp\auto system care.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6780"C:\Windows\System32\taskkill.exe" /f /im "iytr.exe"C:\Windows\SysWOW64\taskkill.exeAuto System Care.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6788\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6912"C:\Windows\System32\taskkill.exe" /f /im "ASCValidatorService.exe"C:\Windows\SysWOW64\taskkill.exeAuto System Care.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6920\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
11 443
Read events
11 272
Write events
161
Delete events
10

Modification events

(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
581A0000058AD88A3CF4DA01
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
9A0E42B8C94124A3EE99C0E728EEA53A12390DD2B3FB3E2C9330603BE7AFE7D3
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exe
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
837E13174D9B47388883BF67D562AEA721847057512FE60B4E9EB74727102B89
(PID) Process:(6744) Auto System Care.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Auto~System Care
Value:
Executable files
36
Suspicious files
7
Text files
30
Unknown types
30

Dropped files

PID
Process
Filename
Type
6720Auto System Care.exeC:\Users\admin\AppData\Local\Temp\is-8CDE4.tmp\Auto System Care.tmpexecutable
MD5:5EA709C238E19609B581039ED605B75D
SHA256:030BF0EEF4DCC92C20F9873F9F46F585D00C4C7338E2A2C6566796FB09816388
6744Auto System Care.tmpC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\iytr.exeexecutable
MD5:008419DC105F119B35C484D6B80CE051
SHA256:6FD7C8D3DF96FBCDB52040CE75510BD1669F26F77FE4798862CE4EF84175FB45
6744Auto System Care.tmpC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\is-0DN33.tmpexecutable
MD5:008419DC105F119B35C484D6B80CE051
SHA256:6FD7C8D3DF96FBCDB52040CE75510BD1669F26F77FE4798862CE4EF84175FB45
6628Auto System Care.exeC:\Users\admin\AppData\Local\Temp\is-11U3E.tmp\Auto System Care.tmpexecutable
MD5:5EA709C238E19609B581039ED605B75D
SHA256:030BF0EEF4DCC92C20F9873F9F46F585D00C4C7338E2A2C6566796FB09816388
6744Auto System Care.tmpC:\Users\admin\AppData\Local\Temp\is-36U6L.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
6744Auto System Care.tmpC:\Users\admin\AppData\Local\Temp\is-36U6L.tmp\_isetup\_iscrypt.dllexecutable
MD5:A69559718AB506675E907FE49DEB71E9
SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
6744Auto System Care.tmpC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\is-FL951.tmpexecutable
MD5:E943BE64A2C359A32E3FEF8ADD9D245A
SHA256:319AF925E50DF13CE348A8B160E5264284C74A42E53AEEABA802FD1EACF7D34A
6744Auto System Care.tmpC:\Users\admin\AppData\Local\Temp\is-36U6L.tmp\setup_en.bmpimage
MD5:201296DBF6350096C191EFE1015C8B5D
SHA256:BCB734AB835112C8BB2624B5B648F51C86020FBF6EFD94949CC967CCE105E6D0
6744Auto System Care.tmpC:\Users\admin\AppData\Local\Temp\is-36U6L.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6744Auto System Care.tmpC:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\Newtonsoft.Json.dllexecutable
MD5:9489172D766FEC33C762BEF9905CE180
SHA256:990D363D9A8F750718CC3793F93963599C6F2EDE0B986DA9DE5CD64AA5B39355
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
13
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5468
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1020
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
2580
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5468
svchost.exe
40.126.35.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
unknown
5468
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.142
whitelisted
cc.alfactiv.com
malicious
www.alfactiv.com
unknown
ins1.alfactiv.com
unknown
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.35.64
  • 20.190.163.20
  • 40.126.35.80
  • 40.126.35.86
  • 40.126.35.150
  • 40.126.35.81
  • 40.126.35.19
  • 40.126.35.84
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

No threats detected
Process
Message
iytr.exe
Native library pre-loader is trying to load native SQLite library "C:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\x64\SQLite.Interop.dll"...
iytr.exe
Native library pre-loader is trying to load native SQLite library "C:\Program Files\Auto~System Care for DESKTOP-JGLLJLD\x64\SQLite.Interop.dll"...