File name:

Woofer.exe

Full analysis: https://app.any.run/tasks/ceed2e0b-e2ee-418b-82a1-ed1dc4c0c690
Verdict: Malicious activity
Analysis date: May 16, 2025, 23:09:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

D54C0185F04DEFCD7A7A7C574F5E0E44

SHA1:

8E9992CBF2C630AEDD260ABFC7417AEBDFA591BE

SHA256:

53D74C06A41F7CAFC100F74A1BAD3091E708433C375911588A5F80B835C1A351

SSDEEP:

98304:K85AqGeUZsB4AWVtYrC3dC1cUlyh4twBtzrPIOZgo6r6D0s5Cx0QUZPx5Oim0Jk/:YQdhfmmQ24l4Pfe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes application which crashes

      • Woofer.exe (PID: 2136)
    • Checks for external IP

      • Woofer.exe (PID: 2136)
      • svchost.exe (PID: 2196)
  • INFO

    • Checks supported languages

      • Woofer.exe (PID: 2136)
    • Reads Environment values

      • Woofer.exe (PID: 2136)
    • Disables trace logs

      • Woofer.exe (PID: 2136)
    • Checks proxy server information

      • Woofer.exe (PID: 2136)
    • Reads the machine GUID from the registry

      • Woofer.exe (PID: 2136)
    • Reads the computer name

      • Woofer.exe (PID: 2136)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 680)
    • Reads the software policy settings

      • slui.exe (PID: 4424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:25 21:14:59+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 9444864
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x903dce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: gotem.exe
LegalCopyright:
OriginalFileName: gotem.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start woofer.exe sppextcomobj.exe no specs slui.exe svchost.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
680C:\WINDOWS\system32\WerFault.exe -u -p 2136 -s 1768C:\Windows\System32\WerFault.exeWoofer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
2136"C:\Users\admin\AppData\Local\Temp\Woofer.exe" C:\Users\admin\AppData\Local\Temp\Woofer.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
2148734499
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\woofer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4424"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 262
Read events
3 248
Write events
14
Delete events
0

Modification events

(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2136) Woofer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Woofer_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
680WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Woofer.exe_58aa9884acb5b62ea2e47b57f4ca9501e4971_545722bb_5cb526e6-f531-4a50-9f8a-9eebeefb3b2d\Report.wer
MD5:
SHA256:
680WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Woofer.exe.2136.dmp
MD5:
SHA256:
680WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCE31.tmp.xmlxml
MD5:C0A9445492FD6941CA2B336FDE658765
SHA256:9EAAD8944BEA5DCB7316228AE85EC7F498F62086727DC04C160E28BFB1A63498
680WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCBBE.tmp.dmpbinary
MD5:3981A67CAA34E2F8DD5F93E7E881D38D
SHA256:F3655B0E8F6FAF89A9F30A712730C9E5B9EA8CDBD1298094A5A5154A22C86E81
680WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCE01.tmp.WERInternalMetadata.xmlbinary
MD5:22F8276689E18CAA7D09E23C21A7CE3C
SHA256:C45449CC604B3E0DD14AE1DB636ECBE697C7C3F08D6002F9294BCFF40A2EADC6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
15
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2136
Woofer.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
2852
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2852
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2136
Woofer.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
6544
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.176
  • 23.48.23.166
  • 23.48.23.169
  • 23.48.23.193
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 40.126.31.3
  • 40.126.31.128
  • 20.190.159.131
  • 40.126.31.73
  • 40.126.31.0
  • 40.126.31.131
  • 20.190.159.64
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
2136
Woofer.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2136
Woofer.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
No debug info