File name: | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe |
Full analysis: | https://app.any.run/tasks/5e92c9e0-2374-44eb-87da-4d79c421e077 |
Verdict: | Malicious activity |
Analysis date: | January 10, 2025, 22:09:12 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections |
MD5: | 6856E8C6EC26620A99E54833E0D823C6 |
SHA1: | 80601C36AFF4F77D8E1EF992294075F415E5C37C |
SHA256: | 4F04BE02707A3CCCD80D1E49DFF4F0E5F9CDB4136E929ABEBF00EE4E2688C41B |
SSDEEP: | 12288:XvVVVVVVVVrfuj5qNvVVVVVVVVTfuj5qOuFTDhSfWJUNo5kUe7z:zfuj5ufuj5NuFRSfWJUq5kUeX |
.exe | | | Win32 Executable MS Visual C++ (generic) (30.9) |
---|---|---|
.exe | | | Win64 Executable (generic) (27.3) |
.exe | | | UPX compressed Win32 Executable (26.8) |
.dll | | | Win32 Dynamic Link Library (generic) (6.5) |
.exe | | | Win32 Executable (generic) (4.4) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2011:03:15 04:06:07+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
PEType: | PE32 |
LinkerVersion: | 6 |
CodeSize: | 8192 |
InitializedDataSize: | 4096 |
UninitializedDataSize: | 24576 |
EntryPoint: | 0x2130 |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
5404 | "C:\Users\admin\Desktop\4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe" | C:\Users\admin\Desktop\4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | — | ||
MD5:— | SHA256:— | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exe | executable | |
MD5:C288386DAC031131DCD12B4CE3052C4A | SHA256:30EC417C48D84155DB15AA6582886D48176CF8704F11DA430ED22AE252DF5B54 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef_100_percent.pak.tmp | executable | |
MD5:3208EF51C361CE8D31497D3522E9DFFC | SHA256:3A6F240939F7C62EC64E59D8DA665099BDD289F1B17411B78B4E10F763E3E944 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmp | executable | |
MD5:5E6946A0840F045F9EE1CF3370B3C6FF | SHA256:291DDB32B5EC65833E7BE293F816A3DD603CA8BEFFB19A35F34040AF3760FC16 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmp | executable | |
MD5:6E49978C5D3D8467EC3F36A08BDFD038 | SHA256:D0772FEF2A034F26531FA88DCE95F89520EBFEAF52020A971C3D5B4BCA5E7307 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmp | executable | |
MD5:9B37DA90CF200F021D071B488127D93C | SHA256:B2EB67CBBD6348CA65AD60E9AE565D9FA2681A4C071D0ABDD5F1D6626010A236 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.tmp | executable | |
MD5:FFE9BAFD8C08B66CB01652548238F981 | SHA256:CF7708DCC6556686791E5A8164BA7487D404126AF6AC3E5B528EEB8B6FB3802A | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmp | executable | |
MD5:C288386DAC031131DCD12B4CE3052C4A | SHA256:30EC417C48D84155DB15AA6582886D48176CF8704F11DA430ED22AE252DF5B54 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmp | executable | |
MD5:AA74714B63B5305F6B60B96F6AF45317 | SHA256:0A6F9DDB03CBA5226B6232EED142307F77F0C6556024E2EEADF23E16E0FA6684 | |||
5404 | 4f04be02707a3cccd80d1e49dff4f0e5f9cdb4136e929abebf00ee4e2688c41b.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmp | executable | |
MD5:E1F6552873504323012CAE5500A71F1E | SHA256:C563F0E3DE5C88BA81756DD0EB2E74B59456EDE2B25525A4AA1B875072C45E7A |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
828 | svchost.exe | GET | 200 | 23.48.23.177:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
828 | svchost.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
828 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
828 | svchost.exe | 23.48.23.177:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
828 | svchost.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
828 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |