File name:

corelrepack.exe

Full analysis: https://app.any.run/tasks/54369db9-1d86-4e21-9777-8f25a335a88e
Verdict: Malicious activity
Analysis date: May 03, 2023, 18:47:12
OS: Windows 10 Professional (build: 19044, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

DE99A3DEC2C4AF589EE10BCD020A87B0

SHA1:

C7BCF36EB18341357B9D941492ED2B75B0F68ECC

SHA256:

638DA2AD9F9332C95EC5CD5514F06CCD14C031F73358BA67735677A0FFB1F23A

SSDEEP:

3072:K/4u3Yq6fuqctQ3kay4O1Mzl/z+ate3mVdIC9/qe9dZI:Ru3Og4OSjIwxdW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Modifies hosts file to block updates

      • corelrepack.exe (PID: 5520)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • corelrepack.exe (PID: 5520)
    • Starts application with an unusual extension

      • corelrepack.exe (PID: 5520)
    • Process uses IPCONFIG to clear DNS cache

      • nsF040.tmp (PID: 5932)
      • nsF0BE.tmp (PID: 1812)
      • nsF13C.tmp (PID: 4228)
      • nsF1AB.tmp (PID: 480)
    • Uses REG/REGEDIT.EXE to modify register

      • nsF219.tmp (PID: 5888)
  • INFO

    • Create files in a temporary directory

      • corelrepack.exe (PID: 5520)
    • Checks supported languages

      • corelrepack.exe (PID: 5520)
      • nsF040.tmp (PID: 5932)
      • nsF0BE.tmp (PID: 1812)
      • nsF13C.tmp (PID: 4228)
      • nsF1AB.tmp (PID: 480)
      • nsF219.tmp (PID: 5888)
      • nsF287.tmp (PID: 1296)
    • The process checks LSA protection

      • corelrepack.exe (PID: 5520)
    • Reads the computer name

      • corelrepack.exe (PID: 5520)
    • Creates files in the program directory

      • corelrepack.exe (PID: 5520)
    • Checks proxy server information

      • corelrepack.exe (PID: 5520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

ProductName: CorelDRAW
LegalCopyright: © KpoJIuK
FileVersion: 1.0.0.0
FileDescription: CorelDRAW
CompanyName: KpoJIuK
Comments: -
CharacterSet: Unicode
LanguageCode: Hindi
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x350d
UninitializedDataSize: 16384
InitializedDataSize: 428544
CodeSize: 26112
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2019:12:16 00:54:10+00:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Dec-2019 00:54:10
Detected languages:
  • English - United States
  • Hindi - India
Comments: -
CompanyName: KpoJIuK
FileDescription: CorelDRAW
FileVersion: 1.0.0.0
LegalCopyright: © KpoJIuK
ProductName: CorelDRAW

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 16-Dec-2019 00:54:10
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000647B
0x00006600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.42101
.rdata
0x00008000
0x00001384
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.13635
.data
0x0000A000
0x00066358
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.00201
.ndata
0x00071000
0x00094000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00105000
0x000250C8
0x00025200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.05613

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.28847
1070
UNKNOWN
English - United States
RT_MANIFEST
2
7.89434
17222
UNKNOWN
English - United States
RT_ICON
3
5.43329
16936
UNKNOWN
English - United States
RT_ICON
4
5.46649
9640
UNKNOWN
English - United States
RT_ICON
5
5.48407
6760
UNKNOWN
English - United States
RT_ICON
6
4.28669
5672
UNKNOWN
English - United States
RT_ICON
7
5.57719
4264
UNKNOWN
English - United States
RT_ICON
8
4.12551
3752
UNKNOWN
English - United States
RT_ICON
9
3.81155
2984
UNKNOWN
English - United States
RT_ICON
10
5.56409
2440
UNKNOWN
English - United States
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
19
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start corelrepack.exe nsf040.tmp no specs conhost.exe no specs ipconfig.exe no specs nsf0be.tmp no specs conhost.exe no specs ipconfig.exe no specs nsf13c.tmp no specs conhost.exe no specs ipconfig.exe no specs nsf1ab.tmp no specs conhost.exe no specs ipconfig.exe no specs nsf219.tmp no specs conhost.exe no specs regedit.exe no specs nsf287.tmp no specs conhost.exe no specs corelrepack.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
248ipconfig /flushdnsC:\Windows\System32\ipconfig.exensF1AB.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc.dll
480"C:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF1AB.tmp" ipconfig /flushdnsC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF1AB.tmpcorelrepack.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nskefd2.tmp\nsf1ab.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
628ipconfig /flushdnsC:\Windows\System32\ipconfig.exensF040.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
1108\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exensF287.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exensF1AB.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1296"C:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF287.tmp" C:\Users\admin\AppData\Local\Temp\x64\Setup.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF287.tmpcorelrepack.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
Modules
Images
c:\users\admin\appdata\local\temp\nskefd2.tmp\nsf287.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1528\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exensF0BE.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
1812"C:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF0BE.tmp" ipconfig /flushdnsC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF0BE.tmpcorelrepack.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\nskefd2.tmp\nsf0be.tmp
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4228"C:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF13C.tmp" ipconfig /flushdnsC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF13C.tmpcorelrepack.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nskefd2.tmp\nsf13c.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4740\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exensF13C.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
2 760
Read events
2 760
Write events
0
Delete events
0

Modification events

No data
Executable files
14
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\Settings.regtext
MD5:09E7763C3A84923E567D0025A6026874
SHA256:21E89C7B1C7781E49E21A240054A96E4E15F678C753C9A6918EF424F21E12B57
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF0BE.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsExec.dllexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\WINDOWS\system32\drivers\etc\hoststext
MD5:714E886CC753632D4A4662492A398344
SHA256:D8709E1978BACF94183B7AF2222486B723F180E10C61AF6057EE018FE946219B
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF040.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF13C.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF1AB.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF219.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
5520corelrepack.exeC:\ProgramData\Corel\bin\540227504\540111163\X-FORCE.binbinary
MD5:A22E6D2B4ECED99F0CBD69962C32E44F
SHA256:41891698A2D7FAA823D4C7A1FA74D193A5FC6E14E9E56559AED0C1D7E9CD30D5
5520corelrepack.exeC:\Users\admin\AppData\Local\Temp\nskEFD2.tmp\nsF287.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
officeclient.microsoft.com
  • 52.109.4.32
whitelisted

Threats

No threats detected
No debug info