File name:

blackhatrussia-mlw.exe

Full analysis: https://app.any.run/tasks/977b0ff6-d4b0-4187-9a1e-beda61e6db47
Verdict: Malicious activity
Analysis date: October 27, 2024, 17:49:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

B5086EEBE0A0A878807A677AEB4FC4F6

SHA1:

313913645D57696233293197C9E5CFF932535E6E

SHA256:

69029912F948D6BD6C3084CA34885CDEEF97190865F6838C9A928FAD56B3F958

SSDEEP:

768:qZikt/BbOQPtFdd1ll8IykeDBpIZPTQmTo:qJ/Bbp5lQkGIZHTo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • blackhatrussia-mlw.exe (PID: 6424)
    • Create files in the Startup directory

      • blackhatrussia-mlw.exe (PID: 6424)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • blackhatrussia-mlw.exe (PID: 6424)
    • Found regular expressions for crypto-addresses (YARA)

      • blackhatrussia-mlw.exe (PID: 6424)
  • INFO

    • Reads the computer name

      • blackhatrussia-mlw.exe (PID: 6424)
    • Reads the machine GUID from the registry

      • blackhatrussia-mlw.exe (PID: 6424)
    • Checks supported languages

      • blackhatrussia-mlw.exe (PID: 6424)
    • The process uses the downloaded file

      • blackhatrussia-mlw.exe (PID: 6424)
    • Creates files or folders in the user directory

      • blackhatrussia-mlw.exe (PID: 6424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:03:28 08:20:48+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 36352
InitializedDataSize: 38400
UninitializedDataSize: -
EntryPoint: 0xad06
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Get Cliboard Address
FileVersion: 1.0.0.0
InternalName: Get Cliboard Address.exe
LegalCopyright: Copyright © 2018
LegalTrademarks: -
OriginalFileName: Get Cliboard Address.exe
ProductName: Get Cliboard Address
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT blackhatrussia-mlw.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4224"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5580C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6424"C:\Users\admin\AppData\Local\Temp\blackhatrussia-mlw.exe" C:\Users\admin\AppData\Local\Temp\blackhatrussia-mlw.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Get Cliboard Address
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\blackhatrussia-mlw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
463
Read events
462
Write events
1
Delete events
0

Modification events

(PID) Process:(6424) blackhatrussia-mlw.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:WindowsUpdater
Value:
"C:\Users\admin\AppData\Local\Temp\blackhatrussia-mlw.exe" ..
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6424blackhatrussia-mlw.exeC:\Users\admin\AppData\Local\GetCliboardAddress\blackhatrussia-mlw.exe_Url_hs15h0j0dzedfw5lwve3zo4btlqn4yq2\1.0.0.0\zilmq0np.newcfgxml
MD5:C75706198B06D5F64263CA97C2285600
SHA256:86DD6072F837C18C91583B84128F2FC9734748A076F51B04575432BEDB1D1859
6424blackhatrussia-mlw.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdater.lnkbinary
MD5:6331DEF5C400732E4BA9F529D2BA8017
SHA256:063EF240979A659C8D0DA075D6D67FBD344C5008BCDE9E667242A36942573FCE
6424blackhatrussia-mlw.exeC:\Users\admin\AppData\Local\GetCliboardAddress\blackhatrussia-mlw.exe_Url_hs15h0j0dzedfw5lwve3zo4btlqn4yq2\1.0.0.0\user.configxml
MD5:C75706198B06D5F64263CA97C2285600
SHA256:86DD6072F837C18C91583B84128F2FC9734748A076F51B04575432BEDB1D1859
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
39
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.164.81:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2776
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2588
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7112
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2588
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2444
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4360
SearchApp.exe
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
2.16.164.81:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.187
  • 2.23.209.185
  • 2.23.209.133
  • 2.23.209.176
  • 2.23.209.189
  • 2.23.209.130
  • 2.23.209.140
  • 2.23.209.177
  • 104.126.37.123
  • 104.126.37.179
  • 104.126.37.171
  • 104.126.37.136
  • 104.126.37.131
  • 104.126.37.177
  • 104.126.37.186
  • 104.126.37.170
  • 104.126.37.185
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.16.164.81
  • 2.16.164.18
  • 2.16.164.114
  • 2.16.164.49
  • 2.16.164.9
  • 2.16.164.51
  • 2.16.164.106
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.218.209.163
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.0
  • 20.190.159.71
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.123
  • 104.126.37.179
  • 104.126.37.171
  • 104.126.37.136
  • 104.126.37.131
  • 104.126.37.177
  • 104.126.37.186
  • 104.126.37.170
  • 104.126.37.185
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

No threats detected
No debug info