File name:

what.exe

Full analysis: https://app.any.run/tasks/e88c46fe-4b2b-4d1c-b856-6663618545ea
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 21, 2025, 17:26:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

863ED00B96D140425392277CE1ADACB8

SHA1:

BF76134295D25B40D042C0BD0C4A4E9D2A701D07

SHA256:

5A948DB60FB494608C9FA91C74F39F3F25B8E02C83793E85375DD8F24BCCB122

SSDEEP:

3072:KylfiYmdcRvOzoScDoq8tVrjD3sTJlfLPMvOxNQ9rd7aR4j:L4HEScQVr8JFy7W4j

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • what.exe (PID: 6600)
    • Drops 7-zip archiver for unpacking

      • what.exe (PID: 6600)
    • Executable content was dropped or overwritten

      • what.exe (PID: 6600)
      • winhts.exe (PID: 7156)
    • Starts itself from another location

      • winhts.exe (PID: 7156)
    • Process requests binary or script from the Internet

      • what.exe (PID: 6600)
    • Starts application with an unusual extension

      • winhts.exe (PID: 7156)
    • Connects to unusual port

      • SrTasksa.dat (PID: 1684)
  • INFO

    • Reads the computer name

      • what.exe (PID: 6600)
    • Creates files in the program directory

      • what.exe (PID: 6600)
      • winhts.exe (PID: 7156)
    • The sample compiled with english language support

      • what.exe (PID: 6600)
    • Checks supported languages

      • what.exe (PID: 6600)
      • winhts.exe (PID: 7156)
      • mailx.exe (PID: 7120)
      • SrTasksa.dat (PID: 1684)
    • Create files in a temporary directory

      • what.exe (PID: 6600)
    • Checks proxy server information

      • SrTasksa.dat (PID: 1684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:20 03:22:16+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 62976
InitializedDataSize: 37376
UninitializedDataSize: -
EntryPoint: 0x1c70
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start what.exe mailx.exe no specs winhts.exe conhost.exe no specs srtasksa.dat conhost.exe no specs what.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1684SrTasksa.dat hiddenC:\Program Files (x86)\Windows MailX\1.0.0.0\SrTasksa.dat
winhts.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\windows mailx\1.0.0.0\srtasksa.dat
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
4932\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasksa.dat
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6436"C:\Users\admin\AppData\Local\Temp\what.exe" C:\Users\admin\AppData\Local\Temp\what.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\what.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6600"C:\Users\admin\AppData\Local\Temp\what.exe" C:\Users\admin\AppData\Local\Temp\what.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\what.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
7120"C:\Program Files (x86)\Windows MailX\mailx.exe"C:\Program Files (x86)\Windows MailX\mailx.exewhat.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files (x86)\windows mailx\mailx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7156"C:\Program Files (x86)\Windows MailX\1.0.0.0\winhts.exe"C:\Program Files (x86)\Windows MailX\1.0.0.0\winhts.exe
mailx.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files (x86)\windows mailx\1.0.0.0\winhts.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewinhts.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
648
Read events
648
Write events
0
Delete events
0

Modification events

No data
Executable files
11
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6600what.exeC:\Program Files (x86)\Windows MailX\Launcher.initext
MD5:8F8ADB8D3B4C2EAFDFD7645883EDC37E
SHA256:D4E5F7CD4E83D38CA21D1190B2F122C6EE37B6289156FEFDD2BB260A6B15B87E
6600what.exeC:\Users\admin\AppData\Local\Temp\aisinolove.dllexecutable
MD5:EC203098F0E1D9AB5DB48E0B73CED3F7
SHA256:E56AF0FE01834FD6C75200DDD87D4F6EF7E1D32A97D6F329BF2DBD25410C65DD
6600what.exeC:\Program Files (x86)\Windows MailX\1.0.0.0\zcurl.exeexecutable
MD5:70C8CA566B81A514ED4FF41E21444884
SHA256:2B414518373B4970DD05848ED141B5E75B4E2C736397051E703797B2346EEDE7
6600what.exeC:\Program Files (x86)\Windows MailX\first.runtext
MD5:6B2DED51D81A4403D8A4BD25FA1E57EE
SHA256:A4C3ED04A95A3DA14A9D235C83D868BED7C0F45CF7F3FAA751EE8F50598D2211
6600what.exeC:\Program Files (x86)\zserv\first.runtext
MD5:6B2DED51D81A4403D8A4BD25FA1E57EE
SHA256:A4C3ED04A95A3DA14A9D235C83D868BED7C0F45CF7F3FAA751EE8F50598D2211
6600what.exeC:\Users\admin\AppData\Local\Temp\mailx.zipcompressed
MD5:B33968DE5440FFE0182275E279505A2E
SHA256:810E4789C0D8C74D5523D76EC587EA73C38A41F3B2A0502AA9A855979CE75DCE
6600what.exeC:\Program Files (x86)\Windows MailX\mailx.exeexecutable
MD5:E267D004A2C3D488BADFE2348C2E2173
SHA256:8EDCC688C1159CBD13B5FB12A00F3781C403DBF54B0F91C204EC6E644CB9BE12
6600what.exeC:\Users\admin\AppData\Local\Temp\zzz.zipcompressed
MD5:F98A338B564BD3F372FF7E425E1657C6
SHA256:3B79647E0D0FD627E785FC3E3A8C43D4E423381D08B41F017DD6EE53C9C933EF
6600what.exeC:\Program Files (x86)\zserv\zserv.exeexecutable
MD5:602B787B01AB3D44A0192DA076820472
SHA256:112F2465BEA86E6A744C23677762C742B32E92E94CFB4AF2DD2D3DB4E2FC2051
6600what.exeC:\Program Files (x86)\zserv\zprog.datexecutable
MD5:EC203098F0E1D9AB5DB48E0B73CED3F7
SHA256:E56AF0FE01834FD6C75200DDD87D4F6EF7E1D32A97D6F329BF2DBD25410C65DD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
21
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2548
svchost.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2548
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6844
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1684
SrTasksa.dat
POST
200
101.200.238.210:8802
http://101.200.238.210:8802/seed/task/download
unknown
unknown
2380
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6600
what.exe
GET
200
120.52.95.246:80
http://digitalsoft.efapiao.com/kp/AnsinoPlugin.dll
unknown
unknown
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2548
svchost.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2548
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.17.22.48:443
www.bing.com
AKAMAI-AS
GB
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6600
what.exe
120.52.95.246:80
digitalsoft.efapiao.com
China Unicom IP network
CN
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
www.bing.com
  • 2.17.22.48
  • 2.17.22.34
  • 95.101.79.99
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
digitalsoft.efapiao.com
  • 120.52.95.246
  • 120.52.95.247
  • 218.12.76.152
  • 218.12.76.156
unknown
login.live.com
  • 20.190.160.14
  • 40.126.32.74
  • 20.190.160.132
  • 40.126.32.140
  • 40.126.32.136
  • 20.190.160.17
  • 40.126.32.76
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 2.19.106.8
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
6600
what.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Process
Message
what.exe
aisinolove1