download:

/vir/Email-Worm.Win32.Sobig.c

Full analysis: https://app.any.run/tasks/a4b59ea8-d061-4d4a-a3bb-a9a6ea9712db
Verdict: Malicious activity
Analysis date: November 29, 2024, 19:27:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

6FFABB00D059B6C4656EA20948AB42BE

SHA1:

00B82AC93BB0A0A9193FD22984B751EF0CD01817

SHA256:

50AA3D1B780554CF6353C9D67B1338F45978270942FDEA0BC2A1C6E31D4F158C

SSDEEP:

1536:7iJNuXejwUFdb/hpB/tGJZgRnEC66OeN5sM:mvwejwU/ZIJZgBEBeNL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Email-Worm.Win32.Sobig.c.exe (PID: 2076)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Email-Worm.Win32.Sobig.c.exe (PID: 2076)
    • Starts itself from another location

      • Email-Worm.Win32.Sobig.c.exe (PID: 2076)
    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 1040)
  • INFO

    • Checks supported languages

      • Email-Worm.Win32.Sobig.c.exe (PID: 2076)
      • mscvb32.exe (PID: 2260)
      • wmpnscfg.exe (PID: 2280)
    • Reads the computer name

      • mscvb32.exe (PID: 2260)
      • wmpnscfg.exe (PID: 2280)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE Yoda's Crypter (63.7)
.dll | Win32 Dynamic Link Library (generic) (15.7)
.exe | Win32 Executable (generic) (10.8)
.exe | Generic Win/DOS Executable (4.8)
.exe | DOS Executable Generic (4.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2003:05:30 17:22:12+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 57344
InitializedDataSize: 4096
UninitializedDataSize: 69632
EntryPoint: 0x1f2d0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start runas.exe no specs email-worm.win32.sobig.c.exe mscvb32.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1040"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\Email-Worm.Win32.Sobig.c.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2076C:\Users\admin\Desktop\Email-Worm.Win32.Sobig.c.exeC:\Users\admin\Desktop\Email-Worm.Win32.Sobig.c.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\email-worm.win32.sobig.c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mpr.dll
c:\windows\system32\ole32.dll
2260C:\Windows\mscvb32.exe dwaqrC:\Windows\mscvb32.exe
Email-Worm.Win32.Sobig.c.exe
User:
Administrator
Integrity Level:
HIGH
Modules
Images
c:\windows\mscvb32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mpr.dll
c:\windows\system32\ole32.dll
2280"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
207
Read events
205
Write events
2
Delete events
0

Modification events

(PID) Process:(2076) Email-Worm.Win32.Sobig.c.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:System MScvb
Value:
C:\Windows\mscvb32.exe
(PID) Process:(2076) Email-Worm.Win32.Sobig.c.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:System MScvb
Value:
C:\Windows\mscvb32.exe
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2076Email-Worm.Win32.Sobig.c.exeC:\Windows\mscvb32.exeexecutable
MD5:6FFABB00D059B6C4656EA20948AB42BE
SHA256:50AA3D1B780554CF6353C9D67B1338F45978270942FDEA0BC2A1C6E31D4F158C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
2260
mscvb32.exe
129.132.2.21:123
unknown
2260
mscvb32.exe
138.96.64.10:123
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
A.ROOT-SERVERS.NET
  • 198.41.0.4
unknown

Threats

No threats detected
No debug info