File name: | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535 |
Full analysis: | https://app.any.run/tasks/2c6ba23f-9fcd-4f55-9480-76324254f7ca |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 07:14:13 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32+ executable (GUI) x86-64, for MS Windows, 11 sections |
MD5: | FC3EA123F4C00E61BDBFF6DA8578C280 |
SHA1: | A1A8913077DB23F22FF583045DD68E803FBEC6D7 |
SHA256: | 6884BDC623D477394BCBF05BB4A2ED841FE8B1B50AD06F44DF143832CA6CD535 |
SSDEEP: | 98304:66hinuTTOuMS4tnNHxJjXRREENh9lF6OfFU4XzQAm9ohZIuVP+U/c0RSKzt0atHd:7GFKiDn2I |
.exe | | | Win64 Executable (generic) (87.3) |
---|---|---|
.exe | | | Generic Win/DOS Executable (6.3) |
.exe | | | DOS Executable Generic (6.3) |
ProductVersion: | 1.0.0.0 |
---|---|
LegalCopyright: | Copyright (C) 2024 |
InternalName: | hookload.exe |
FileVersion: | 1.0.0.0 |
FileDescription: | RiotGameSkin |
CompanyName: | TODO: <公司名> |
CharacterSet: | Unicode |
LanguageCode: | Chinese (Simplified) |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Windows NT 32-bit |
FileFlags: | (none) |
FileFlagsMask: | 0x003f |
ProductVersionNumber: | 1.0.0.0 |
FileVersionNumber: | 1.0.0.0 |
Subsystem: | Windows GUI |
SubsystemVersion: | 6 |
ImageVersion: | - |
OSVersion: | 6 |
EntryPoint: | 0x958058 |
UninitializedDataSize: | - |
InitializedDataSize: | 1564160 |
CodeSize: | 155136 |
LinkerVersion: | 14.38 |
PEType: | PE32+ |
ImageFileCharacteristics: | Executable, Large address aware |
TimeStamp: | 2024:12:14 05:25:52+00:00 |
MachineType: | AMD AMD64 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
5092 | "C:\Users\admin\Desktop\6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe" | C:\Users\admin\Desktop\6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | — | explorer.exe | |||||||||||
User: admin Company: TODO: <公司名> Integrity Level: MEDIUM Description: RiotGameSkin Version: 1.0.0.0 Modules
|
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CLASSES_ROOT\CertificateAuthority.Request\CLSID |
Operation: | write | Name: | Certificate Number (860055337) |
Value: 48F36158ACD549BB | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\DrWatson |
Operation: | write | Name: | bbqcbykfu |
Value: A08C5AD16C504F85 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CLASSES_ROOT\CompressedFolder\CLSID |
Operation: | write | Name: | vfimptqo05 |
Value: 72C2982E99E06FFD6DBE1ADC | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\DrWatson |
Operation: | write | Name: | InitOrder(684177973) |
Value: 01D9A02F490EA09328D473A8 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CLASSES_ROOT\CLSID\{12b3ecec-3c8e-a50e-336d-01767967} |
Operation: | write | Name: | SortOrderIndex |
Value: D1DFFA57F528E189D17F60D8 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\DrWatson |
Operation: | write | Name: | InitOrder(56046649) |
Value: 6E92E01F87931CBE9842B550 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CLASSES_ROOT\CLSID\{12b3ecec-3c8e-a50e-336d-01767967} |
Operation: | write | Name: | SortOrderIndex |
Value: C165FC57F528E189D17F60D8 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\DrWatson |
Operation: | write | Name: | InitOrder(56046649) |
Value: 7E28E61F87931CBE9842B550 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CLASSES_ROOT\CLSID\{12b3ecec-3c8e-a50e-336d-01767967} |
Operation: | write | Name: | SortOrderIndex |
Value: C1DE02B3F528E189D17F60D8 | |||
(PID) Process: | (5092) 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\DrWatson |
Operation: | write | Name: | InitOrder(56046649) |
Value: 7E9318FB87931CBE9842B550 |
PID | Process | Filename | Type | |
---|---|---|---|---|
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\kfpondqx.plw | binary | |
MD5:34EBDEE2E7ED7F98518A586FFC476260 | SHA256:B4EF899521D50AE1C6642C5E0A53E03A17F339FCE2130269459E2A72EED0592F | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\mntemp | binary | |
MD5:0BA1EF720A85681A0F0567793CE256D1 | SHA256:1E5ADF5C42153174305C80E329715209051C16259ADD7C196E599D0D085CB3A1 | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\ffvfimpt.qor | text | |
MD5:24D20A181D6B9A0B9EA264A6AA3E11A4 | SHA256:A9792648DC27A87BD9CED9A65A0741EFE08B3FBCF14246B59F5AF1CD97BE51D7 | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\svakaain.wtb | binary | |
MD5:8C5CBF28C0897C00BD4BEC3197C3EEB2 | SHA256:628ABA7C582776F2C9D98ED9BBE45235EF1A174F786CF8F7DC0E1758C60B1E97 | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\iylmhori.fie | binary | |
MD5:6EF783E49BF2C2531B84AA74745808E0 | SHA256:EC2EF02EAA6661E79968DBCC0E53DE9636629976848666947160BC804094E6FD | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\qcbykfut.pdu | binary | |
MD5:0E8FB06757E68A45ACF163349224F964 | SHA256:F299323FD4728E709B7FD5F4EA2E9E4459A960E954171155592801C51E0502DA | |||
5092 | 6884bdc623d477394bcbf05bb4a2ed841fe8b1b50ad06f44df143832ca6cd535.exe | C:\ProgramData\gmqitmeh.xcn | text | |
MD5:9483EE495DBC8431385A997C69700905 | SHA256:C084F5A9218265E0C41C6509091E6F963ED419149924A4B16F008BCE424F9AD4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5004 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5004 | svchost.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
5004 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5004 | svchost.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5004 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3976 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |