File name:

57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e

Full analysis: https://app.any.run/tasks/636ef401-f240-4956-bf46-c7cb67e19380
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:04:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections
MD5:

49B9B2EF6749FCD8BDE23F8DB150E3EF

SHA1:

F3C6D44E4B8CEA4F0BA485EE4BF7EDF128A07EFA

SHA256:

57EAAB58DA64D80D5D7456BC7F47AD8321B781F92165C26E975C47946D23B50E

SSDEEP:

12288:CvVVVVVVVVGuFTDhSfWJUNo5kUe7UvVVVVVVVVguFTDhSfWJUNo5kUe7IcqtPrEM:BuFRSfWJUq5kUehuFRSfWJUq5kUeccqj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • Creates file in the systems drive root

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • The process creates files with name similar to system file names

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
  • INFO

    • Creates files or folders in the user directory

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • Checks supported languages

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • UPX packer has been detected

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (30.9)
.exe | Win64 Executable (generic) (27.3)
.exe | UPX compressed Win32 Executable (26.8)
.dll | Win32 Dynamic Link Library (generic) (6.5)
.exe | Win32 Executable (generic) (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 4096
UninitializedDataSize: 24576
EntryPoint: 0x2130
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe

Process information

PID
CMD
Path
Indicators
Parent process
6032"C:\Users\admin\Desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe" C:\Users\admin\Desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 189
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
MD5:
SHA256:
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:933BCB806FE470F1442759768102F4FB
SHA256:2AA4B54E55E2CDFBBB65E1A3EC908B5AE2B20B7235E3051D0F5C4F18C345A47F
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:1E1880B8B8546B8CB17AE6DC64864F90
SHA256:81DADE12A573791C31216E263FFDF8AB932725777A86B5FBC1B9C36D9F5D13B2
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:2D7264E05242F45968A00765B602BFC9
SHA256:03D088A7BDA7CD96DAA3B976D0C6B44A916029D18A60F748DCF5A83AE7C62B8D
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:051B4D942E9EC24D6281D7CA6178E47A
SHA256:D47CCF7B12DF51658FCC2420A01878B079CEF2CF00FC26960A0414AFDA7C8736
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll.tmpexecutable
MD5:8E402B9006CBDCB4B3EE19D718ACE2D1
SHA256:C2A28B6C847BECBB26C95F7F9BBC59202473D6F74EFBA0399D76ECCF3208591A
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe.tmpexecutable
MD5:76842B3CE0EFECD4876732704EC5ABCF
SHA256:EFBA8EBEEF3E5154D37B71668DA853EB418E8010C5DE780A161497E4D17AE3FA
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmpexecutable
MD5:7E51DE440CCF5A13DAE38F6C440D7FFB
SHA256:065EF06EAFDDB2EE3C335F3D9F764A620BC26AB573B9457EA22F2E144ED70A79
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe.tmpexecutable
MD5:B774AD6BD40A781ECB59D2D0A5C1DF15
SHA256:7365A5C2BB39CDF6EB8A6DA40907EC83C048099F4D145C1D848895FE6BBB1DCF
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:7BF6FFCCD88FA9DE0ADBE762A50F3218
SHA256:F11640D9E9344928D5B4FFE8FCCA5965207ED416E4585486014349A5B3F11059
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
20
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1460
svchost.exe
GET
200
2.16.164.131:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.131:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1460
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1460
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1460
svchost.exe
2.16.164.131:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.131:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1460
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1460
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 2.16.164.131
  • 2.16.164.128
  • 2.16.164.107
  • 2.16.164.34
  • 2.16.164.112
  • 2.16.164.113
  • 2.16.164.96
  • 2.16.164.67
  • 2.16.164.130
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 20.189.173.24
whitelisted

Threats

No threats detected
No debug info