| File name: | 77739c19825e11f265457ee981727ec47ceff6d6e38bea5c445f2ff5b61acafb.exe |
| Full analysis: | https://app.any.run/tasks/a95f8491-43d6-454a-ab22-32c5d9ef9f93 |
| Verdict: | Malicious activity |
| Analysis date: | November 12, 2024, 10:58:29 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 13 sections |
| MD5: | A114099AFF8347ED74E2164229F90397 |
| SHA1: | 257D2962DE28C17F9676DF496E2E719B8915FF86 |
| SHA256: | 77739C19825E11F265457EE981727EC47CEFF6D6E38BEA5C445F2FF5B61ACAFB |
| SSDEEP: | 12288:WwLBnLn934uRJ5EiAaMDdCVYEe1rX689V3Vqm:jBnj934uRJ5EirMUYp |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2013:06:28 22:30:49+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 24576 |
| InitializedDataSize: | 251392 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x33240 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.1.2600.0 |
| ProductVersionNumber: | 5.1.2600.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug, Pre-release |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | ASCII |
| CompanyName: | Hilgraeve, Inc. |
| FileDescription: | HyperTerminal Applet |
| FileVersion: | 5.1.2600.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 512 | "C:\Users\admin\Desktop\77739c19825e11f265457ee981727ec47ceff6d6e38bea5c445f2ff5b61acafb.exe" | C:\Users\admin\Desktop\77739c19825e11f265457ee981727ec47ceff6d6e38bea5c445f2ff5b61acafb.exe | explorer.exe | ||||||||||||
User: admin Company: Hilgraeve, Inc. Integrity Level: MEDIUM Description: HyperTerminal Applet Exit code: 0 Version: 5.1.2600.0 Modules
| |||||||||||||||
| 4376 | "C:\Users\admin\AppData\Local\Temp\java_update_dcphbaa.exe" | C:\Users\admin\AppData\Local\Temp\java_update_dcphbaa.exe | zvzvgjn.exe | ||||||||||||
User: admin Company: Hilgraeve, Inc. Integrity Level: HIGH Description: HyperTerminal Applet Exit code: 0 Version: 5.1.2600.0 Modules
| |||||||||||||||
| 6184 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6940 -s 456 | C:\Windows\SysWOW64\WerFault.exe | zvzvgjn.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6480 | "C:\PROGRA~3\Mozilla\zvzvgjn.exe" -eglgyjm | C:\ProgramData\Mozilla\zvzvgjn.exe | svchost.exe | ||||||||||||
User: admin Company: Hilgraeve, Inc. Integrity Level: MEDIUM Description: HyperTerminal Applet Exit code: 0 Version: 5.1.2600.0 Modules
| |||||||||||||||
| 6940 | "C:\PROGRA~3\Mozilla\zvzvgjn.exe" -eglgyjm | C:\ProgramData\Mozilla\zvzvgjn.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Hilgraeve, Inc. Integrity Level: SYSTEM Description: HyperTerminal Applet Exit code: 255 Version: 5.1.2600.0 Modules
| |||||||||||||||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | ProgramId |
Value: 00066235646864b7a4b838f6e1756db7a45600000904 | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | FileId |
Value: 000009e559302f91e7400a04503a102f67da76a4ff14 | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\programdata\mozilla\zvzvgjn.exe | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | LongPathHash |
Value: zvzvgjn.exe|e0b2dabeb09912c8 | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | Name |
Value: zvzvgjn.exe | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | OriginalFileName |
Value: | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | Publisher |
Value: hilgraeve, inc. | |||
| (PID) Process: | (6184) WerFault.exe | Key: | \REGISTRY\A\{4ab627b7-6419-c308-b767-ee65f57e8309}\Root\InventoryApplicationFile\zvzvgjn.exe|e0b2dabeb09912c8 |
| Operation: | write | Name: | Version |
Value: 5.1.2600.0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6184 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zvzvgjn.exe_3241526b99d38b8be41c26552971f87b9936676_0903add8_89940f3f-2186-4b82-8148-ed4ba6fda71f\Report.wer | — | |
MD5:— | SHA256:— | |||
| 512 | 77739c19825e11f265457ee981727ec47ceff6d6e38bea5c445f2ff5b61acafb.exe | C:\ProgramData\Mozilla\zvzvgjn.exe | executable | |
MD5:76FA98D287EE8D93E8944CA2952DD907 | SHA256:80B06CBD41FBF05B32AB2F1CAC00669CAC39F581091FC52E8D39E90B508E4E9E | |||
| 6184 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER25AD.tmp.WERInternalMetadata.xml | xml | |
MD5:1FD7237BAD4014216E631D42CE2449A1 | SHA256:97BF3EC099D96EDE3E1D0FE0B31812DE1D37C53972A2B33B20CE6AABEE23F50E | |||
| 6184 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER253F.tmp.dmp | binary | |
MD5:E88E160D1E403AA2CB3C10BB604E6C57 | SHA256:9552B64ABB75395A508F619005628AE5C9E93C11484005CB51A301CE613001A1 | |||
| 6480 | zvzvgjn.exe | C:\Users\admin\AppData\Local\Temp\java_update_dcphbaa.exe | executable | |
MD5:0CE78E0A0CF1409B727329BE72FA64AF | SHA256:1B33B3862171F3483832CA1521FEA0E9E9A03557B898BE1F614355AAC25C55A2 | |||
| 6184 | WerFault.exe | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\CrashDumps\zvzvgjn.exe.6940.dmp | binary | |
MD5:ACA4487EEDD3C9C11EA21AF8D38CF2B2 | SHA256:4DC24660D0B49DE69CE479FBEBFB54B02EA2BB96BDA1339453DB306AD331632B | |||
| 6184 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER25ED.tmp.xml | xml | |
MD5:FCB95907A333A50ABB7202DD4CF48A4A | SHA256:84F660275E14FC55D075BDE7BD51007762621D86D0AF137BFAA8519F38F8177D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6944 | svchost.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7044 | RUXIMICS.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7044 | RUXIMICS.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7044 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6944 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.16.204.157:443 | — | Akamai International B.V. | DE | unknown |
6944 | svchost.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
7044 | RUXIMICS.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6944 | svchost.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |