File name:

098765456789.exe

Full analysis: https://app.any.run/tasks/c82e97da-96c7-4687-8a64-0b8b920830b7
Verdict: Malicious activity
Analysis date: May 23, 2024, 05:42:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

C3300BF4583BAB1294FDC76DC40FC8FC

SHA1:

FB49582F3FC1CD31417D2CE8B6FEBA053CCD1A0D

SHA256:

56930A32806C50B82146EF0B6557E3B6C8B3D82F28B25C4392E712536AE98204

SSDEEP:

24576:zBDttv+bm6Oi6CgTB9kyzGgkRPRK76DVFh6CTDFDkQVgqE:zBDttvGm6OnCgTB9kyigkRPRK76DVFhe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 098765456789.exe (PID: 3968)
      • powershell.exe (PID: 2364)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2364)
    • Changes the autorun value in the registry

      • reg.exe (PID: 992)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • 098765456789.exe (PID: 3968)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 2364)
      • Synagoges.exe (PID: 1960)
    • Evaluates numerical expressions in cmd (potential data obfuscation)

      • powershell.exe (PID: 2364)
    • Gets information about processes (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Converts a string into array of characters (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2364)
    • Reads the Internet Settings

      • Synagoges.exe (PID: 1960)
    • Reads security settings of Internet Explorer

      • Synagoges.exe (PID: 1960)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2624)
  • INFO

    • Reads the computer name

      • 098765456789.exe (PID: 3968)
      • Synagoges.exe (PID: 1960)
    • Checks supported languages

      • 098765456789.exe (PID: 3968)
      • Synagoges.exe (PID: 1960)
    • Creates files or folders in the user directory

      • 098765456789.exe (PID: 3968)
    • Create files in a temporary directory

      • 098765456789.exe (PID: 3968)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2364)
    • The executable file from the user directory is run by the Powershell process

      • Synagoges.exe (PID: 1960)
    • Checks proxy server information

      • Synagoges.exe (PID: 1960)
    • Reads the machine GUID from the registry

      • Synagoges.exe (PID: 1960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:12:16 00:50:29+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25088
InitializedDataSize: 3782656
UninitializedDataSize: 1024
EntryPoint: 0x3248
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.2.0.0
ProductVersionNumber: 3.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: overtimers
FileDescription: planometry
InternalName: semirelief.exe
OriginalFileName: semirelief.exe
ProductName: klasseundervisningernes
ProductVersion: 3.2.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 098765456789.exe no specs powershell.exe cmd.exe no specs synagoges.exe no specs cmd.exe no specs reg.exe

Process information

PID
CMD
Path
Indicators
Parent process
992REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)"C:\Windows\System32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1072"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"C:\Windows\System32\cmd.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1960"C:\Users\admin\AppData\Local\Temp\Synagoges.exe"C:\Users\admin\AppData\Local\Temp\Synagoges.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Description:
planometry
Modules
Images
c:\windows\system32\mshtml.dll
c:\users\admin\appdata\local\temp\synagoges.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2364"powershell.exe" -windowstyle hidden "$Krumspring=Get-Content 'C:\Users\admin\AppData\Roaming\fertiliseringer\Acidise.Rin';$Delebrn=$Krumspring.SubString(50256,3);.$Delebrn($Krumspring)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
098765456789.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2624"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)"C:\Windows\System32\cmd.exeSynagoges.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3968"C:\Users\admin\Desktop\098765456789.exe" C:\Users\admin\Desktop\098765456789.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
planometry
Exit code:
4294967295
Modules
Images
c:\users\admin\desktop\098765456789.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
5 612
Read events
5 368
Write events
202
Delete events
42

Modification events

(PID) Process:(3968) 098765456789.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{93412589-74D4-4E4E-AD0E-E0CB621440FD} {000214E6-0000-0000-C000-000000000046} 0xFFFF
Value:
01000000000000005AC3AFF8D3ACDA01
(PID) Process:(3968) 098765456789.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3968) 098765456789.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@fontext.dll,-8007
Value:
Font settings
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Vandrelav
Operation:writeName:Indstiftelser
Value:
$Krumspring=Get-Content 'C:\Users\admin\AppData\Roaming\fertiliseringer\Acidise.Rin';$Delebrn=$Krumspring.SubString(50256,3);.$Delebrn($Krumspring)
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:Halvdagsbeskftigelsers
Value:
c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe
(PID) Process:(992) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Startup key
Value:
%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)
Executable files
1
Suspicious files
17
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\cellinas.prebinary
MD5:B7EDD8491A7D5EAA339DA0C7AB729554
SHA256:3DF2282AA8313730D7B01545096423CA26DCB1EDEA7F25AF6DF7E1BE0F626DA6
3968098765456789.exeC:\Users\admin\AppData\Local\Temp\acrometer.initext
MD5:E4E43E6724DF47009F84EA08F72ABE1B
SHA256:4D5734BD9C25A985E2185B77944F55461F7151F4E234C6B8D35DE32F546A625A
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Betnksomst.sirbinary
MD5:13562D161E0932E108EEEC7A9A080CC4
SHA256:A208A8F361E56DCC29AC934C293FE16EB3D8228621CCF4C414555899BB74C782
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Elfhood\philopornist.antbinary
MD5:3F28B68878DB110B099C2AA9285ABEC7
SHA256:2A775985173B2EC6CDC5BEA576D6B10F35D852A03EDF5C788DCC1C7403538394
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\flokken.avebinary
MD5:17AE8090149D5A89E58B7272BA5B0912
SHA256:7BDE00AA9C021C743ACD1C8FA1D6B1B3A88B944FA1828A5AAC901A6E1167B401
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Deagol.lynbinary
MD5:F01C9151A434D50C2BC0A02EEAB55643
SHA256:AA75AD97A7B1714CD4908B3349DDFF92AD6CCB3CCC00E5E85D362CC820CBFB9B
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Hennaens.Parabr
MD5:86272EAE184CBD33D3D537FE3076A111
SHA256:79CE3071E8C0285A9AA6DA027DC80017046C0B4D4A0432B0F8FF57CDFE4FF585
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Hjemlaante\initialiser.gaubinary
MD5:807140EEB4D1C087B3B27FB683108487
SHA256:87EBEBE148D9C97623F21A9847E07B6CCBCF3194BA56886D889989D0ACF7DBEA
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Hjemlaante\hydrolytisk.cunbinary
MD5:DF35D40A84AFCB121969409BC40F79D4
SHA256:82B0E73A730C6791CFB20F24499FC915A95CECD40F86A0A651D0990A96552130
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\computerbrugeres.stsbinary
MD5:7A362FEC7FE89A2BFF10F4CE7DB4168E
SHA256:E8E5CC5E7AC2564E58A619F93B4F0A2CDB84B6F8940EC42B808E6ACA4517005A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
134
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
www.vibrantbhutan.com
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info