File name:

57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e

Full analysis: https://app.any.run/tasks/636ef401-f240-4956-bf46-c7cb67e19380
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:04:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections
MD5:

49B9B2EF6749FCD8BDE23F8DB150E3EF

SHA1:

F3C6D44E4B8CEA4F0BA485EE4BF7EDF128A07EFA

SHA256:

57EAAB58DA64D80D5D7456BC7F47AD8321B781F92165C26E975C47946D23B50E

SSDEEP:

12288:CvVVVVVVVVGuFTDhSfWJUNo5kUe7UvVVVVVVVVguFTDhSfWJUNo5kUe7IcqtPrEM:BuFRSfWJUq5kUehuFRSfWJUq5kUeccqj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • Executable content was dropped or overwritten

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • The process creates files with name similar to system file names

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
  • INFO

    • Creates files or folders in the user directory

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • Checks supported languages

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
    • UPX packer has been detected

      • 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe (PID: 6032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (30.9)
.exe | Win64 Executable (generic) (27.3)
.exe | UPX compressed Win32 Executable (26.8)
.dll | Win32 Dynamic Link Library (generic) (6.5)
.exe | Win32 Executable (generic) (4.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x2130
UninitializedDataSize: 24576
InitializedDataSize: 4096
CodeSize: 8192
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
TimeStamp: 2011:03:15 04:06:07+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE 57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe

Process information

PID
CMD
Path
Indicators
Parent process
6032"C:\Users\admin\Desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe" C:\Users\admin\Desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\57eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 189
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exe
MD5:
SHA256:
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:7BF6FFCCD88FA9DE0ADBE762A50F3218
SHA256:F11640D9E9344928D5B4FFE8FCCA5965207ED416E4585486014349A5B3F11059
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroBroker.exe.tmpexecutable
MD5:5E8C3F800FDE8BB9F0B30BA9990C27B3
SHA256:A5C8D682E9D692BB1F1FE1AEB38FB50C666ADEAC85165295E3171AE210899000
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.tmpexecutable
MD5:4DE0AB47F6A3A01FB3FD564F514DE5B1
SHA256:2BC6F3CB03B99954AA465FD9890E1E64ED48F4F4B2F6C145FBF19A3CDC7BAF6F
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:7CA59DA02D0E8B510ACAD61AC57A44E5
SHA256:82318D8724C4DE98F1A7F087D3A64891D47738F35A1C05DB454E5AE132FA54B0
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:2D7264E05242F45968A00765B602BFC9
SHA256:03D088A7BDA7CD96DAA3B976D0C6B44A916029D18A60F748DCF5A83AE7C62B8D
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll.tmpexecutable
MD5:8E402B9006CBDCB4B3EE19D718ACE2D1
SHA256:C2A28B6C847BECBB26C95F7F9BBC59202473D6F74EFBA0399D76ECCF3208591A
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:051B4D942E9EC24D6281D7CA6178E47A
SHA256:D47CCF7B12DF51658FCC2420A01878B079CEF2CF00FC26960A0414AFDA7C8736
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe.tmpexecutable
MD5:76842B3CE0EFECD4876732704EC5ABCF
SHA256:EFBA8EBEEF3E5154D37B71668DA853EB418E8010C5DE780A161497E4D17AE3FA
603257eaab58da64d80d5d7456bc7f47ad8321b781f92165c26e975c47946d23b50e.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmpexecutable
MD5:7E51DE440CCF5A13DAE38F6C440D7FFB
SHA256:065EF06EAFDDB2EE3C335F3D9F764A620BC26AB573B9457EA22F2E144ED70A79
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
20
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.131:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1460
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1460
svchost.exe
GET
200
2.16.164.131:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1460
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1460
svchost.exe
2.16.164.131:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.131:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1460
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1460
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 2.16.164.131
  • 2.16.164.128
  • 2.16.164.107
  • 2.16.164.34
  • 2.16.164.112
  • 2.16.164.113
  • 2.16.164.96
  • 2.16.164.67
  • 2.16.164.130
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 20.189.173.24
whitelisted

Threats

No threats detected
No debug info