File name:

what.exe

Full analysis: https://app.any.run/tasks/e88c46fe-4b2b-4d1c-b856-6663618545ea
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 21, 2025, 17:26:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

863ED00B96D140425392277CE1ADACB8

SHA1:

BF76134295D25B40D042C0BD0C4A4E9D2A701D07

SHA256:

5A948DB60FB494608C9FA91C74F39F3F25B8E02C83793E85375DD8F24BCCB122

SSDEEP:

3072:KylfiYmdcRvOzoScDoq8tVrjD3sTJlfLPMvOxNQ9rd7aR4j:L4HEScQVr8JFy7W4j

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • what.exe (PID: 6600)
    • Potential Corporate Privacy Violation

      • what.exe (PID: 6600)
    • Executable content was dropped or overwritten

      • what.exe (PID: 6600)
      • winhts.exe (PID: 7156)
    • Process requests binary or script from the Internet

      • what.exe (PID: 6600)
    • Starts application with an unusual extension

      • winhts.exe (PID: 7156)
    • Connects to unusual port

      • SrTasksa.dat (PID: 1684)
    • Starts itself from another location

      • winhts.exe (PID: 7156)
  • INFO

    • Checks supported languages

      • what.exe (PID: 6600)
      • mailx.exe (PID: 7120)
      • winhts.exe (PID: 7156)
      • SrTasksa.dat (PID: 1684)
    • Creates files in the program directory

      • what.exe (PID: 6600)
      • winhts.exe (PID: 7156)
    • Create files in a temporary directory

      • what.exe (PID: 6600)
    • Reads the computer name

      • what.exe (PID: 6600)
    • The sample compiled with english language support

      • what.exe (PID: 6600)
    • Checks proxy server information

      • SrTasksa.dat (PID: 1684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:20 03:22:16+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 62976
InitializedDataSize: 37376
UninitializedDataSize: -
EntryPoint: 0x1c70
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start what.exe mailx.exe no specs winhts.exe conhost.exe no specs srtasksa.dat conhost.exe no specs what.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1684SrTasksa.dat hiddenC:\Program Files (x86)\Windows MailX\1.0.0.0\SrTasksa.dat
winhts.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\windows mailx\1.0.0.0\srtasksa.dat
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
4932\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasksa.dat
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6436"C:\Users\admin\AppData\Local\Temp\what.exe" C:\Users\admin\AppData\Local\Temp\what.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\what.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6600"C:\Users\admin\AppData\Local\Temp\what.exe" C:\Users\admin\AppData\Local\Temp\what.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\what.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
7120"C:\Program Files (x86)\Windows MailX\mailx.exe"C:\Program Files (x86)\Windows MailX\mailx.exewhat.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files (x86)\windows mailx\mailx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7156"C:\Program Files (x86)\Windows MailX\1.0.0.0\winhts.exe"C:\Program Files (x86)\Windows MailX\1.0.0.0\winhts.exe
mailx.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files (x86)\windows mailx\1.0.0.0\winhts.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewinhts.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
648
Read events
648
Write events
0
Delete events
0

Modification events

No data
Executable files
11
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6600what.exeC:\Users\admin\AppData\Local\Temp\mailx.zipcompressed
MD5:B33968DE5440FFE0182275E279505A2E
SHA256:810E4789C0D8C74D5523D76EC587EA73C38A41F3B2A0502AA9A855979CE75DCE
6600what.exeC:\Users\admin\AppData\Local\Temp\aisinolove.dllexecutable
MD5:EC203098F0E1D9AB5DB48E0B73CED3F7
SHA256:E56AF0FE01834FD6C75200DDD87D4F6EF7E1D32A97D6F329BF2DBD25410C65DD
6600what.exeC:\Program Files (x86)\Windows MailX\Launcher.initext
MD5:8F8ADB8D3B4C2EAFDFD7645883EDC37E
SHA256:D4E5F7CD4E83D38CA21D1190B2F122C6EE37B6289156FEFDD2BB260A6B15B87E
6600what.exeC:\Program Files (x86)\Windows MailX\1.0.0.0\7z.exeexecutable
MD5:A51D90F2F9394F5EA0A3ACAE3BD2B219
SHA256:AC9674FEB8F2FAD20C1E046DE67F899419276AE79A60E8CC021A4BF472AE044F
6600what.exeC:\Program Files (x86)\Windows MailX\1.0.0.0\7z.dllexecutable
MD5:04AD4B80880B32C94BE8D0886482C774
SHA256:A1E1D1F0FFF4FCCCFBDFA313F3BDFEA4D3DFE2C2D9174A615BBC39A0A6929338
6600what.exeC:\Program Files (x86)\Windows MailX\taskconfig.initext
MD5:4A81EB02DB4BC6FDBA11AD33104F2859
SHA256:AABFEAFEB3642817B2BECABA878332F076F411062C4CCFE5D676F36E4866672C
6600what.exeC:\Program Files (x86)\zserv\zserv.exeexecutable
MD5:602B787B01AB3D44A0192DA076820472
SHA256:112F2465BEA86E6A744C23677762C742B32E92E94CFB4AF2DD2D3DB4E2FC2051
6600what.exeC:\Program Files (x86)\Windows MailX\mailx.exeexecutable
MD5:E267D004A2C3D488BADFE2348C2E2173
SHA256:8EDCC688C1159CBD13B5FB12A00F3781C403DBF54B0F91C204EC6E644CB9BE12
6600what.exeC:\Program Files (x86)\Windows MailX\1.0.0.0\winhts.exeexecutable
MD5:E21750740F1DFE2E86D29D7CF712131D
SHA256:49F95CFB92A782B99B9C5B20A86B2363FAA739124A89791A56C116729FB2A1E8
7156winhts.exeC:\Program Files (x86)\Windows MailX\1.0.0.0\SrTasksa.datexecutable
MD5:E21750740F1DFE2E86D29D7CF712131D
SHA256:49F95CFB92A782B99B9C5B20A86B2363FAA739124A89791A56C116729FB2A1E8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
21
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2380
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2548
svchost.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2548
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1684
SrTasksa.dat
POST
200
101.200.238.210:8802
http://101.200.238.210:8802/seed/task/download
unknown
unknown
2380
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6844
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2548
svchost.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2548
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.17.22.48:443
www.bing.com
AKAMAI-AS
GB
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6600
what.exe
120.52.95.246:80
digitalsoft.efapiao.com
China Unicom IP network
CN
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
www.bing.com
  • 2.17.22.48
  • 2.17.22.34
  • 95.101.79.99
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
digitalsoft.efapiao.com
  • 120.52.95.246
  • 120.52.95.247
  • 218.12.76.152
  • 218.12.76.156
unknown
login.live.com
  • 20.190.160.14
  • 40.126.32.74
  • 20.190.160.132
  • 40.126.32.140
  • 40.126.32.136
  • 20.190.160.17
  • 40.126.32.76
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 2.19.106.8
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
6600
what.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Process
Message
what.exe
aisinolove1