File name:

Alien Romulus 2024 1080p WEBRip.exe

Full analysis: https://app.any.run/tasks/1f1a9f55-4ede-4f50-87b5-1472deddb604
Verdict: Malicious activity
Analysis date: November 22, 2024, 09:15:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

E49A60F982925153410F9FDD4FC1CA46

SHA1:

8B4639FA19B29517A5A525458C4C3392D68018CE

SHA256:

557ED5AD5E48A28AB2A20D28E7BE7436CE6EA82C4AAF3E0CB2B4D3A1BD2DD8EA

SSDEEP:

98304:Iuiiu0a2VHmXYl06MV0cAMTjFc8+ZuomS3BGFUa845S8zIE9/GL7oiICcGBPPiwd:ChEN5llt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Alien Romulus 2024 1080p WEBRip.exe (PID: 1616)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:21 15:46:25+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 5041664
InitializedDataSize: 202240
UninitializedDataSize: -
EntryPoint: 0x4d0d2e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.1.9091.31992
ProductVersionNumber: 1.1.9091.31992
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: MYWebWatch.Installer
FileVersion: 1.1.9091.31992
InternalName: MYWebWatch.Installer.exe
LegalCopyright: Copyright © 2024
LegalTrademarks: -
OriginalFileName: MYWebWatch.Installer.exe
ProductName: MYWebWatch.Installer
ProductVersion: 1.1.9091.31992
AssemblyVersion: 1.1.9091.31992
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
112
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start alien romulus 2024 1080p webrip.exe alien romulus 2024 1080p webrip.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1616"C:\Users\admin\AppData\Local\Temp\Alien Romulus 2024 1080p WEBRip.exe" C:\Users\admin\AppData\Local\Temp\Alien Romulus 2024 1080p WEBRip.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MYWebWatch.Installer
Exit code:
3221226540
Version:
1.1.9091.31992
5488"C:\Users\admin\AppData\Local\Temp\Alien Romulus 2024 1080p WEBRip.exe" C:\Users\admin\AppData\Local\Temp\Alien Romulus 2024 1080p WEBRip.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
MYWebWatch.Installer
Version:
1.1.9091.31992
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
98
DNS requests
114
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
HEAD
200
2.19.126.157:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/c4ce8060-975e-4ce5-8e2b-31e027f5ae99?P1=1732466244&P2=404&P3=2&P4=jkajAojIB4Q%2bSqMN%2fJONcFt4BOyE2LWSkMljQ94niJk87GPHSgTcXaggYUuBLankOnxdkBpwO%2bB7vEvE8cbFiQ%3d%3d
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.168.100.255:138
whitelisted
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
188.114.97.3:443
seekspot.io
CLOUDFLARENET
NL
unknown
13.107.253.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.74.206
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
seekspot.io
  • 188.114.97.3
  • 188.114.96.3
unknown
edge-mobile-static.azureedge.net
  • 13.107.253.45
whitelisted
bzib.nelreports.net
  • 23.50.131.74
  • 23.50.131.78
  • 2.19.126.152
  • 2.19.126.145
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO URL Shortener Service Domain in DNS Lookup (2ly .link)
Misc activity
ET INFO URL Shortener Service Domain in DNS Lookup (2ly .link)
Misc activity
ET INFO Observed URL Shortener Service Domain (2ly .link in TLS SNI)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
No debug info