File name:

Fortexternal.exe

Full analysis: https://app.any.run/tasks/bbb04d9a-c934-434c-9176-e8e823e47846
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 03, 2024, 04:25:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
upx
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

08DBF0926E763B4F80FA9590B67FC282

SHA1:

CE78C2D8AB88DF7F524670824FD27B1340A64C84

SHA256:

51C9E9667890F9320C2C95E49B1DBD6E2DFBEC73E71F1039868E26535E328525

SSDEEP:

49152:CXMl+ZKLD6kHtnTQFLIZo5Po8EJdm7h0Cdy0kJgPK394h8VXzVd4a3nW9HhmKPnD:CXMlEKf6kHsLIZyEf22Jgw4OZVHiHkkV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Fortexternal.exe (PID: 4724)
    • Actions looks like stealing of personal data

      • Fortexternal.exe (PID: 4724)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Fortexternal.exe (PID: 4724)
    • Checks Windows Trust Settings

      • Fortexternal.exe (PID: 4724)
    • Checks for external IP

      • Fortexternal.exe (PID: 4724)
  • INFO

    • Checks supported languages

      • Fortexternal.exe (PID: 4724)
    • Reads the computer name

      • Fortexternal.exe (PID: 4724)
    • Creates files or folders in the user directory

      • Fortexternal.exe (PID: 4724)
    • Checks proxy server information

      • Fortexternal.exe (PID: 4724)
    • Reads the software policy settings

      • Fortexternal.exe (PID: 4724)
    • Reads the machine GUID from the registry

      • Fortexternal.exe (PID: 4724)
    • UPX packer has been detected

      • Fortexternal.exe (PID: 4724)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | DOS Executable Generic (100)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:12:01 17:16:01+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 1552384
InitializedDataSize: 81920
UninitializedDataSize: 5824512
EntryPoint: 0x709220
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
118
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start fortexternal.exe

Process information

PID
CMD
Path
Indicators
Parent process
4724"C:\Users\admin\Desktop\Fortexternal.exe" C:\Users\admin\Desktop\Fortexternal.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\fortexternal.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
3 458
Read events
3 455
Write events
3
Delete events
0

Modification events

(PID) Process:(4724) Fortexternal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4724) Fortexternal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4724) Fortexternal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
9
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2092
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2092
svchost.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
104.26.8.59:443
https://api.myip.com/
unknown
binary
48 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2092
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.212.110.162:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
4
System
192.168.100.255:138
whitelisted
4724
Fortexternal.exe
104.26.8.59:443
api.myip.com
CLOUDFLARENET
US
whitelisted
4712
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2092
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 23.212.110.162
  • 23.212.110.154
  • 23.212.110.176
  • 23.212.110.152
  • 23.212.110.169
  • 23.212.110.144
  • 23.212.110.163
whitelisted
google.com
  • 216.58.206.78
whitelisted
api.myip.com
  • 104.26.8.59
  • 172.67.75.163
  • 104.26.9.59
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.42
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
self.events.data.microsoft.com
  • 20.189.173.5
whitelisted

Threats

PID
Process
Class
Message
4724
Fortexternal.exe
Device Retrieving External IP Address Detected
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
No debug info