File name:

rr(.)exe

Full analysis: https://app.any.run/tasks/b6eab6d4-0017-43df-a414-66fed85b1c32
Verdict: Malicious activity
Analysis date: October 30, 2023, 21:46:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

64D333DC747D7001925E1CB1BEBE5E80

SHA1:

19AC273B294879AC913CF48A1EBB0E170655401A

SHA256:

67C053B22CDC61D65F806B8A29C4D44F48D05E7800F52B7D6529BE67310FEA1D

SSDEEP:

24576:0gEeFTIov2XmrLyLlIXZFZ/SNKqzptMqKAU:0gEeFTI8drLyLlIXZFNSNKqzptMqKAU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • rr(.)exe.exe (PID: 3112)
      • rr(.)exe.exe (PID: 3852)
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • rr(.)exe.exe (PID: 3852)
    • Starts CMD.EXE for commands execution

      • rr(.)exe.exe (PID: 3980)
      • rr(.)exe.exe (PID: 2064)
      • rr(.)exe.exe (PID: 1488)
  • INFO

    • Creates files or folders in the user directory

      • rr(.)exe.exe (PID: 3852)
    • Checks supported languages

      • rr(.)exe.exe (PID: 3852)
    • Reads the machine GUID from the registry

      • rr(.)exe.exe (PID: 3852)
    • Manual execution by a user

      • rr(.)exe.exe (PID: 3980)
      • rr(.)exe.exe (PID: 2064)
      • rr(.)exe.exe (PID: 3112)
      • notepad++.exe (PID: 3432)
      • rr(.)exe.exe (PID: 1488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:26 12:08:27+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 700416
InitializedDataSize: 255488
UninitializedDataSize: -
EntryPoint: 0x62b83
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rr(.)exe.exe no specs rr(.)exe.exe no specs cmd.exe no specs rr(.)exe.exe no specs cmd.exe no specs rr(.)exe.exe no specs notepad++.exe no specs rr(.)exe.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1484C:\Windows\system32\cmd.exe /c pauseC:\Windows\System32\cmd.exerr(.)exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1488"C:\Users\admin\Desktop\rr(.)exe.exe" C:\Users\admin\Desktop\rr(.)exe.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2064"C:\Users\admin\Desktop\rr(.)exe.exe" C:\Users\admin\Desktop\rr(.)exe.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3112"C:\Users\admin\Desktop\rr(.)exe.exe" C:\Users\admin\Desktop\rr(.)exe.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3200C:\Windows\system32\cmd.exe /c pauseC:\Windows\System32\cmd.exerr(.)exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3432"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\rr(.)exe.exe"C:\Program Files\Notepad++\notepad++.exeexplorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
3852"C:\Users\admin\Desktop\rr(.)exe.exe" C:\Users\admin\Desktop\rr(.)exe.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\rr(.)exe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\cryptsp.dll
3980"C:\Users\admin\Desktop\rr(.)exe.exe" C:\Users\admin\Desktop\rr(.)exe.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4036C:\Windows\system32\cmd.exe /c pauseC:\Windows\System32\cmd.exerr(.)exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
14 462
Read events
14 462
Write events
0
Delete events
0

Modification events

No data
Executable files
27
Suspicious files
4 032
Text files
12
Unknown types
1

Dropped files

PID
Process
Filename
Type
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccLR.cab
MD5:
SHA256:
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.xmlbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\eRnLXWjwrmbJkaT-Mail[tylerdecsec@gmail.com]ID-[82643855711973].VJDX0
MD5:
SHA256:
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\AccessMUI.xmlbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\yOftuxhPKWwcdgN-Mail[tylerdecsec@gmail.com]ID-[82643855711973].TYCDJbinary
MD5:A17BE53D2BE0206EC9AE401566DEF62F
SHA256:EF1511E6A1ACD325476F8CA77BE230CCD0C54744462F51512A9B695B6AE31487
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\BiUAHNPRvQGIKap-Mail[tylerdecsec@gmail.com]ID-[82643855711973].SEAWGbinary
MD5:B62DAC52812A2D23C57596EFC45327D3
SHA256:6B179FC57193B85409182FF9D9F08D17AD363A4CB59B8F5CE5E0BB23A5B2138C
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\iYUckRHsXLpnMDq-Mail[tylerdecsec@gmail.com]ID-[82643855711973].S0KDUbinary
MD5:DDFBF07DA296226BE40C5F623EF47463
SHA256:6CE0297BB1C266BD268CCC915326708E8817290353AB34F6052118C86C0F686F
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\UyeIqAKPjYlHBuR-Mail[tylerdecsec@gmail.com]ID-[82643855711973].GND0Obinary
MD5:570D3E1781B2981CFF6F04F865CCC72F
SHA256:5CBC0B61664D453A20FC2063012C8EA535A7FCBB1E3AEE976B580C4244C09BD6
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccessMUI.msibinary
MD5:4EEC2BD0B3540D5B7A2D14EF05919C3C
SHA256:35F53E127FEA507AAF7B453A70AC674A49DD51C6D99CED9751DFEF36194FD60E
3852rr(.)exe.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccessMUI.xmlbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info