File name:

2644003e402a0e0f2567f6429afc9e178a6d8a76

Full analysis: https://app.any.run/tasks/bd3bfb60-9261-49ae-b2d0-ff45aa7ba57e
Verdict: Malicious activity
Analysis date: November 27, 2024, 18:41:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

25E9D266F8CF5DEF59125162D721A0BC

SHA1:

2644003E402A0E0F2567F6429AFC9E178A6D8A76

SHA256:

685E2335D6DD7E5EE5BC9BD4BB2A4C52EA1FE28931AB38E34FA6B076616AE707

SSDEEP:

98304:ICRU2eK1o6jPIFP0GCIVKRbAHLfNYowezXLAD+v39W87q56o3eXLY5tLyu/GpFA/:YxNvZKk7+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • Connects to the CnC server

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • Application launched itself

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 6368)
      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • Contacting a server suspected of hosting an CnC

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
  • INFO

    • Checks supported languages

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • Creates files or folders in the user directory

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • Reads the computer name

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
    • UPX packer has been detected

      • 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe (PID: 5780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2008:03:18 13:41:56+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 4096
UninitializedDataSize: 65536
EntryPoint: 0x12910
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe no specs 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe no specs 2644003e402a0e0f2567f6429afc9e178a6d8a76.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5780"C:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe" C:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6368C:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6808C:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6868C:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\Desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
634
Read events
627
Write events
7
Delete events
0

Modification events

(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:ntuser
Value:
C:\WINDOWS\system32\drivers\spools.exe
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:autoload
Value:
C:\Users\admin\Local Settings\Application Data\cftmon.exe
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:ntuser
Value:
C:\WINDOWS\system32\drivers\spools.exe
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:autoload
Value:
C:\Users\admin\Local Settings\Application Data\cftmon.exe
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5780) 2644003e402a0e0f2567f6429afc9e178a6d8a76.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:ADB702522C1E9B208AA1AF3D34A2F721
SHA256:10A0712834EC19AD5D47D0BA195F93EC49B85BEED7FECBB4E427135B534A3540
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:67E486B2F148A3FCA863728242B6273E
SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\Local\VirtualStore\restoreexecutable
MD5:25E9D266F8CF5DEF59125162D721A0BC
SHA256:685E2335D6DD7E5EE5BC9BD4BB2A4C52EA1FE28931AB38E34FA6B076616AE707
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:0D958921C9A83E10058AF8210039F350
SHA256:C5377B4185C0EA14CCC7160E422DA718AB2F1BFA5279BAD8F8F822F05350E95C
57802644003e402a0e0f2567f6429afc9e178a6d8a76.exeC:\Users\admin\AppData\Local\cftmon.exeexecutable
MD5:25E9D266F8CF5DEF59125162D721A0BC
SHA256:685E2335D6DD7E5EE5BC9BD4BB2A4C52EA1FE28931AB38E34FA6B076616AE707
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
34
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5780
2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
GET
302
3.18.7.81:80
http://fewfwe.com/?&v=pizda9
unknown
shared
5780
2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
GET
200
142.250.186.35:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5780
2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
GET
200
142.250.186.35:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6252
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7076
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.23.209.158:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 2.23.209.158
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.176
  • 2.23.209.185
  • 2.23.209.177
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.135
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.0
whitelisted
fewfwe.com
  • 3.18.7.81
  • 3.19.116.195
malicious
www.hugedomains.com
  • 172.67.70.191
  • 104.26.7.37
  • 104.26.6.37
whitelisted
c.pki.goog
  • 142.250.186.35
whitelisted

Threats

PID
Process
Class
Message
5780
2644003e402a0e0f2567f6429afc9e178a6d8a76.exe
A Network Trojan was detected
ET HUNTING Suspicious User Agent (_)
1 ETPRO signatures available at the full report
No debug info