File name:

wtp_admin.exe

Full analysis: https://app.any.run/tasks/6236fb0b-f5bc-4e3b-98ec-1984bac25398
Verdict: Malicious activity
Analysis date: May 25, 2025, 06:01:51
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

6C43CDC282BA9EB8BB60260D5F4D7D3C

SHA1:

762E6B830DF5BBA9A783709F11706766A32677B8

SHA256:

5F327A79C49E3F0B53BB97F3994F7E863C780F62436BB9B33043ADDAC9206B4E

SSDEEP:

98304:D5pC4Q7FeAvJopOUBltbgEB8kpPLAVuSFnTNaPERuueJBKpT+N3B8hU/XVbcYdk/:b8ecFVegBZ7QKkduoH4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • wtp_admin.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • wtp_admin.exe (PID: 7688)
      • WindowsTerminal.exe (PID: 7828)
    • Executable content was dropped or overwritten

      • wtp_admin.exe (PID: 7688)
    • Reads the date of Windows installation

      • WindowsTerminal.exe (PID: 7828)
  • INFO

    • Create files in a temporary directory

      • wtp_admin.exe (PID: 7688)
      • WindowsTerminal.exe (PID: 7828)
    • The sample compiled with english language support

      • wtp_admin.exe (PID: 7688)
    • Checks proxy server information

      • slui.exe (PID: 5864)
    • Reads the computer name

      • wtp_admin.exe (PID: 7688)
      • WindowsTerminal.exe (PID: 7828)
      • pwsh.exe (PID: 7956)
    • Process checks computer location settings

      • wtp_admin.exe (PID: 7688)
      • WindowsTerminal.exe (PID: 7828)
      • pwsh.exe (PID: 7956)
    • Checks supported languages

      • wtp_admin.exe (PID: 7688)
      • wt.exe (PID: 7812)
      • WindowsTerminal.exe (PID: 7828)
      • OpenConsole.exe (PID: 7936)
      • pwsh.exe (PID: 7956)
    • Reads the software policy settings

      • slui.exe (PID: 5864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:04:07 14:39:21+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 201728
InitializedDataSize: 128512
UninitializedDataSize: -
EntryPoint: 0x1ed60
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wtp_admin.exe wt.exe no specs windowsterminal.exe no specs openconsole.exe no specs pwsh.exe slui.exe wtp_admin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5864C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7564"C:\Users\admin\Desktop\wtp_admin.exe" C:\Users\admin\Desktop\wtp_admin.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\wtp_admin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7688"C:\Users\admin\Desktop\wtp_admin.exe" C:\Users\admin\Desktop\wtp_admin.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\wtp_admin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_d954cb49e10154a6\gdiplus.dll
7812"C:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\wt.exe" C:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\wt.exewtp_admin.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\terminal-portable\terminal\wt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\kernel.appcore.dll
7828wt.exe C:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\WindowsTerminal.exewt.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\terminal-portable\terminal\windowsterminal.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7936"C:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\OpenConsole.exe" --headless --textMeasurement graphemes --width 120 --height 30 --signal 0x904 --server 0x8f8C:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\OpenConsole.exeWindowsTerminal.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\terminal-portable\terminal\openconsole.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
7956"C:\Program Files\PowerShell\7\pwsh.exe"C:\Program Files\PowerShell\7\pwsh.exe
WindowsTerminal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
pwsh
Version:
7.3.5.500
Modules
Images
c:\program files\powershell\7\pwsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
10 757
Read events
10 756
Write events
1
Delete events
0

Modification events

(PID) Process:(7688) wtp_admin.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:C%%Users%admin%AppData%Local%Temp%Terminal-Portable
Value:
C:\Users\admin\AppData\Local\Temp\Terminal-Portable
Executable files
17
Suspicious files
16
Text files
40
Unknown types
0

Dropped files

PID
Process
Filename
Type
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\defaults.jsontext
MD5:318057499359E9DBB3DD62724BE0EAF1
SHA256:5187EBAA02BBDDE6E27C347BBEF02BAF6045EC9F8ACE3885972E099AA45B300D
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\Microsoft.Terminal.Control.dllexecutable
MD5:3A4DD3D593BE0E85FF6B84D062BE35BD
SHA256:29CF209DA36D63F35863AB63B54DA0B10DEBF143AEFDC1AD6D99C2A1DCDDFF8F
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\CascadiaCodeItalic.ttfbinary
MD5:3FFC56F2BAE8F9370699A2A020AAA25B
SHA256:48E64F8D82ACD86956DF5F33076966EACF4D9C3EA620C9D88231FA94DA117F2C
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\CascadiaMono.ttfbinary
MD5:B7DE50B2E335EE645AB3B249D8A0FA65
SHA256:08026F617EEA315CACA59898784E999F6CDB2D0C34D2040DEEB042BCDC359FA2
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\Images2\terminal_contrast-black.icoimage
MD5:6FF2FFDCFAE7D1F7E30348ACF28A71DC
SHA256:29864669D81E7D4E50A8ECC16E992B339658454F5234E1949C512A07EDBBABF4
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\Images2\terminal_contrast-white.icoimage
MD5:2B360D49BE8EF4A95D7C4B11AEAE780B
SHA256:0B452BA3CC2EF2E330422AAA55A78FE59B5454279BB35778F2633D770F592F3B
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\elevate-shim.exeexecutable
MD5:E35A40F6DC45793E05F34C20C4F4647D
SHA256:0926532F8812BB71CCB5364C232F59BB24D0034643EC41CEE825DC14C55732D2
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\Microsoft.Terminal.Settings.Model.dllexecutable
MD5:138AEF55CD15A570D5DC8119A6342756
SHA256:8138839C88163E53DA95AD5A73A92E02861EE115061F04670BAA1EED7AE0B3F8
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\Microsoft.Terminal.Remoting.dllexecutable
MD5:E99D3C4F55E6F2F0F007B80B8433DE91
SHA256:B31BB390F8189074D5F403569C6A5D15CB78E44687E01700E31ACDD8E04D7D80
7688wtp_admin.exeC:\Users\admin\AppData\Local\Temp\Terminal-Portable\Terminal\OpenConsole.exeexecutable
MD5:8316238825CA219562BA16A7A8F15FF7
SHA256:4D8FEE0BD15DC292C8138F36A3E93782C37962AF8860B76A0838D13D11F9BDD8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
53
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
40.126.31.71:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
2104
svchost.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
400
20.190.159.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
20.190.159.2:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
20.190.159.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.32.134:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
7956
pwsh.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
400
20.190.160.131:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
7956
pwsh.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
2104
svchost.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7956
pwsh.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
7956
pwsh.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.136
  • 20.190.160.5
  • 20.190.160.66
  • 20.190.160.65
  • 20.190.160.3
  • 40.126.32.74
  • 20.190.160.130
  • 40.126.32.133
whitelisted
aka.ms
  • 2.20.153.252
whitelisted
powershellinfraartifacts-gkhedzdeaghdezhr.z01.azurefd.net
  • 13.107.246.45
unknown
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
7956
pwsh.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
No debug info