File name:

E.txt

Full analysis: https://app.any.run/tasks/ccbf0373-8b2f-497c-b3ac-6786f189cf0f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 04, 2023, 22:58:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

67CB58A1BBC7409E568262A59FCE0CB1

SHA1:

537E815D6EF34A1E027AB75F334825BBB28D0C9D

SHA256:

6ABE6224EC2FB7840389BA4BDF9A3655BD336B8549F413EF03687D27AD865882

SSDEEP:

6:hu1IidNT1GCrvL1xmTrsvSEV0IIGCAMzwtFeTxVEC4GA:k1LrpGoxmfaq1nTf14n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • sipnotify.exe (PID: 1924)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1936)
      • sipnotify.exe (PID: 1924)
    • Process drops legitimate windows executable

      • dllhost.exe (PID: 2144)
    • The process drops C-runtime libraries

      • dllhost.exe (PID: 2144)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1924)
  • INFO

    • Manual execution by a user

      • IMEKLMG.EXE (PID: 2072)
      • wmpnscfg.exe (PID: 3216)
      • explorer.exe (PID: 2820)
      • IMEKLMG.EXE (PID: 2084)
      • wmpnscfg.exe (PID: 2340)
      • wmpnscfg.exe (PID: 2408)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3216)
      • IMEKLMG.EXE (PID: 2072)
      • IMEKLMG.EXE (PID: 2084)
      • wmpnscfg.exe (PID: 2340)
      • wmpnscfg.exe (PID: 2408)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3216)
      • IMEKLMG.EXE (PID: 2072)
      • wmpnscfg.exe (PID: 2408)
      • wmpnscfg.exe (PID: 2340)
      • IMEKLMG.EXE (PID: 2084)
    • Drops the executable file immediately after the start

      • dllhost.exe (PID: 2144)
    • Process checks are UAC notifies on

      • IMEKLMG.EXE (PID: 2072)
      • IMEKLMG.EXE (PID: 2084)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2340)
      • wmpnscfg.exe (PID: 2408)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
16
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start notepad.exe no specs explorer.exe no specs wmpnscfg.exe no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs Copy/Move/Rename/Delete/Link Object no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
556C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1452C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1556"C:\Windows\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\E.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1736C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1860C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1924C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1936C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
1073807364
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2072"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2084"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2144C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
6 314
Read events
6 175
Write events
110
Delete events
29

Modification events

(PID) Process:(4016) dllhost.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
5D90318700E971AC74C33D18FBFB1B55E574AFF37E3D94BF9F34640CD7EFE991
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Windows\System32\config
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
7407FA2761ED76D4532529F09C923B0F269067F0412F34241DAEE9ABCB927FBC
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
C8060000CAB5ABB30527DA01
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
D350412AC2D7235BC38A88A21184CD36E2520308B52D8FD4C67771EF96F9278F
(PID) Process:(1736) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
2D160C22D779AC6F7A6AEC4915208246AA4CD1B54BF4626BC71F650806F1C95C
(PID) Process:(2144) dllhost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{e1a82db4-a9f0-11e7-b142-806e6f6e6963}
Operation:writeName:NeedToPurge
Value:
1
Executable files
78
Suspicious files
99
Text files
9
Unknown types
1

Dropped files

PID
Process
Filename
Type
2144dllhost.exeC:\$RECYCLE.BIN\S-1-5-21-1302019708-1500728564-335382590-1000\$I89J553.datbinary
MD5:8478B34A44CF918321386040E456105E
SHA256:ECE4F4480E177813FEB537578126AEA556B770179BA2C73D8003A7B8862C794A
1452dllhost.exeC:\$RECYCLE.BIN\S-1-5-21-1302019708-1500728564-335382590-1000\$IUVPEIX.inibinary
MD5:A5AD31C4C44B8A7AA3D45604D9531685
SHA256:791161FB9F1F783F688DF225D59201AC7D4A80FD828CDBA06CA371EF095CA5C9
2144dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$RMB37Q5.DLLexecutable
MD5:809F27F4C0E30691D0FE7109BF78293F
SHA256:F6672307798C2EE73CA928A9F9CC41AC86F8953D85D41EF8BE552D042122A217
2144dllhost.exeC:\$RECYCLE.BIN\S-1-5-21-1302019708-1500728564-335382590-1000\$IBKLD1L.cplbinary
MD5:AA12776F7789A8A106C725A968887059
SHA256:160B5F2A5CAB358762BA562525B4D8AD293033071FFA709251DE605ABCBFF408
2144dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$R9PAEVQ.DLLexecutable
MD5:0AD51E62BC75780D8E7E5C24058516EE
SHA256:850E5B1A5D6B78479527DBEFB30686E8755872C74A4F2981FA12249AE09A447F
2144dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$R4H5P1N.DLLexecutable
MD5:21B794F6F97C9C85370D65FCA68E0E9E
SHA256:B51A9B280FFBF5D4730F33B2CE71DF9BF8B9D7DB108BF72F6DF2B10EBEC9CC7D
2144dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$RI56MCS.DLLexecutable
MD5:361D4D77411D2FBA1DE48C9A6B913CAC
SHA256:A9116D4F12C9A8D8BF7BB66221C3BA44FF5D0413E10922E8255BF5E687C1D7FA
1452dllhost.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$RUVPEIX.inibinary
MD5:286A9EDB379DC3423A528B0864A0F111
SHA256:6F533CCC79227E38F18BFC63BFC961EF4D3EE0E2BF33DD097CCF3548A12B743B
2144dllhost.exeC:\$RECYCLE.BIN\S-1-5-21-1302019708-1500728564-335382590-1000\$II56MCS.DLLbinary
MD5:FC6DFDB9BB690088E7A4323F837D8751
SHA256:BE22F4AC55DE755CB79B1A6B99BF97624EA67E90618B881527E6B83BC25DE99F
2144dllhost.exeC:\$RECYCLE.BIN\S-1-5-21-1302019708-1500728564-335382590-1000\$I9PAEVQ.DLLbinary
MD5:B55176551547C653B10390321496E173
SHA256:72AFD876D89691856679C79F01F7E8BBCDC26C319F0B9B0D91577D773D69B296
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
14
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1924
sipnotify.exe
HEAD
200
23.212.215.38:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133462045943120000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
868
svchost.exe
95.101.148.135:80
armmf.adobe.com
Akamai International B.V.
NL
unknown
224.0.0.252:5355
unknown
1472
svchost.exe
239.255.255.250:3702
whitelisted
1124
svchost.exe
224.0.0.252:5355
unknown
1924
sipnotify.exe
23.212.215.38:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
AU
unknown
1472
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
armmf.adobe.com
  • 95.101.148.135
whitelisted
query.prod.cms.rt.microsoft.com
  • 23.212.215.38
whitelisted

Threats

No threats detected
No debug info