File name:

PracticalMalwareAnalysis-Labs.exe

Full analysis: https://app.any.run/tasks/c019dc9a-0040-4618-bcd5-5e87a9566e19
Verdict: Malicious activity
Analysis date: September 02, 2024, 03:15:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
MD5:

9D9C90870BC46AD65BAF0F3977E7590F

SHA1:

DEC5842D07BBD00EDF564FE27C14118EC9ECC77F

SHA256:

704138BEC89CF9E7F00FBCE100DBC09CF133D16DC0203806392F0E153C43C68C

SSDEEP:

24576:uxaVxr53s2QByK9VHFsZ+Ykyxm7g8LVYD/rh6m6er9wgwGe66hXS:u6QXHFsrxKY70neru/66dS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Reads Microsoft Outlook installation path

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Reads Internet Explorer settings

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Drops a system driver (possible attempt to evade defenses)

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Process drops legitimate windows executable

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Drops the executable file immediately after the start

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Executable content was dropped or overwritten

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
  • INFO

    • Checks supported languages

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Checks proxy server information

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Reads the computer name

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Create files in a temporary directory

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
    • Process checks Internet Explorer phishing filters

      • PracticalMalwareAnalysis-Labs.exe (PID: 2816)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:01:09 13:44:06+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 72704
InitializedDataSize: 25600
UninitializedDataSize: -
EntryPoint: 0xb3c1
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start practicalmalwareanalysis-labs.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2816"C:\Users\admin\AppData\Local\Temp\PracticalMalwareAnalysis-Labs.exe" C:\Users\admin\AppData\Local\Temp\PracticalMalwareAnalysis-Labs.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\practicalmalwareanalysis-labs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6356"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6920C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
1 369
Read events
1 358
Write events
11
Delete events
0

Modification events

(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2816) PracticalMalwareAnalysis-Labs.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
65
Suspicious files
5
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_10L\Lab10-01.sysexecutable
MD5:3D3D1A8145E3237183984FAED04E052E
SHA256:D12A2C116A12993CFCF2F432A4FE53F8F6B3686E33ED8F7E8FF4628A37BD616E
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_12L\Lab12-03.exeexecutable
MD5:A7F21E412022554D187D6A876A3C08AC
SHA256:9B683D2FDA7CA7ADCC043E4412271009A0E115CA55F9A718C385A3F46B57AE6B
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_11L\Lab11-03.dllexecutable
MD5:BBD65FCAD68E5A3CD1457E2EE05D1F2E
SHA256:F11FA868AC3DEE1E5FBD985FE15BA6D34C7EC0ABB47BABE0D34A35514C49C86A
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_12L\Lab12-01.dllexecutable
MD5:A6FB0D8FDEA1C15AFBA7A5DDB3D2867B
SHA256:0EA89A83B84B8D20E259BACB6B0D1B176C8327F097C54749AE832981F2A0095A
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_11L\Lab11-01.exeexecutable
MD5:A9C55BB87A7C5C3C923C4FA12940E719
SHA256:57D8D248A8741176348B5D12DCF29F34C8F48EDE0CA13C30D12E5BA0384056D7
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_12L\Lab12-04.exeexecutable
MD5:56BED8249E7C2982A90E54E1E55391A2
SHA256:E2AED4398E0178670D9678961CA89A0F15A3EAC20F396BDF29DE8AC66CB853FA
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_11L\Lab11-02.dllexecutable
MD5:BE4F4B9E88F2E1B1C38E0A0858EB3DD9
SHA256:DF899256C4A9FC0E550C62B84AB9CB8ACD8D18683F0A41C98BA83F0487D4766E
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_10L\Lab10-03.sysexecutable
MD5:CF91A08F3D7A2875D6120C16B7C55398
SHA256:59D09B747441ED35E0FC0B5B352B4C66532F1FDD4646457A5EA972F067A55B30
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_12L\Lab12-02.exeexecutable
MD5:E2BF42217A67E46433DA8B6F4507219E
SHA256:AE8A1C7EB64C42EA2A04F97523EBF0844C27029EB040D910048B680F884B9DCE
2816PracticalMalwareAnalysis-Labs.exeC:\Users\admin\AppData\Local\Temp\Practical Malware Analysis Labs\BinaryCollection\Chapter_12L\Lab12-01.exeexecutable
MD5:DAFBEA2A91F86BF5E52EFA3BAC3F1B16
SHA256:1FB3C4A9109EF171FA67BDF90E67F09EF25B5A1D401DC20DC45CFCCF1E4FBD99
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
25
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3424
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6580
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3424
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6612
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
6552
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6580
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6580
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3424
SIHClient.exe
40.127.169.103:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3424
SIHClient.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 52.140.118.28
whitelisted
google.com
  • 216.58.212.142
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.23
  • 40.126.31.67
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info