File name: | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe |
Full analysis: | https://app.any.run/tasks/58020d00-68a0-4951-936f-c289ee22818f |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 11:51:47 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
MD5: | 239C5F964B458A0A935A4B42D74BCBDA |
SHA1: | 7A037D3BD8817ADF6E58734B08E807A84083F0CE |
SHA256: | 7809AB9C004FBD18F185C7B54554440D7B31F201980AEE6E0C62A97C0E4A984C |
SSDEEP: | 98304:0yajfotkOzKlcDgKGjKF+f14/ndvOva0b:99gd |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
---|---|---|
.exe | | | Win64 Executable (generic) (21.3) |
.scr | | | Windows screen saver (10.1) |
.dll | | | Win32 Dynamic Link Library (generic) (5) |
.exe | | | Win32 Executable (generic) (3.4) |
AssemblyVersion: | 0.0.0.1 |
---|---|
ProductVersion: | 0.0.0.1 |
ProductName: | Windows Security Service |
OriginalFileName: | Windows Security Service |
LegalTrademarks: | Windows Security Service |
LegalCopyright: | Windows Security Service |
InternalName: | Windows Security Service |
FileVersion: | 0.0.0.1 |
FileDescription: | Windows Security Service |
CompanyName: | Windows Security Service |
Comments: | - |
CharacterSet: | Unicode |
LanguageCode: | Neutral |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Win32 |
FileFlags: | (none) |
FileFlagsMask: | 0x003f |
ProductVersionNumber: | 0.0.0.1 |
FileVersionNumber: | 0.0.0.1 |
Subsystem: | Windows GUI |
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x31e56e |
UninitializedDataSize: | - |
InitializedDataSize: | 3584 |
CodeSize: | 3261952 |
LinkerVersion: | 8 |
PEType: | PE32 |
ImageFileCharacteristics: | Executable, 32-bit |
TimeStamp: | 2023:06:28 12:02:39+00:00 |
MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
5560 | "C:\Users\admin\Desktop\7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe" | C:\Users\admin\Desktop\7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | explorer.exe | ||||||||||||
User: admin Company: Windows Security Service Integrity Level: MEDIUM Description: Windows Security Service Exit code: 0 Version: 0.0.0.1 Modules
| |||||||||||||||
3692 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\eNLPD8QMxnjf.bat" " | C:\Windows\System32\cmd.exe | — | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3288 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3208 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2600 | ping -n 10 localhost | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5200 | "C:\Users\admin\Desktop\7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe" | C:\Users\admin\Desktop\7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | cmd.exe | ||||||||||||
User: admin Company: Windows Security Service Integrity Level: MEDIUM Description: Windows Security Service Exit code: 0 Version: 0.0.0.1 Modules
| |||||||||||||||
1468 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\7d6XKyr7frWN.bat" " | C:\Windows\System32\cmd.exe | — | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2160 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
372 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
|
(PID) Process: | (5560) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (5200) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (3816) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (1296) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (3808) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (4932) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (5564) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (5540) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (3688) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" | |||
(PID) Process: | (3612) 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Windows Security Service |
Value: "C:\Users\admin\AppData\Roaming\SubDir\Client.exe" |
PID | Process | Filename | Type | |
---|---|---|---|---|
4932 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\R14c3OwZ26jN.bat | text | |
MD5:9FFD2AD1E385646D2C8F54BD12015D9B | SHA256:0A68FFF6A1D8ACCF5BB8AD1B930C053489A464DF2528A996B56CD4802BA1524B | |||
1296 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\rKdGF8IntLy5.bat | text | |
MD5:4EF8F54428090E45BFDD22B5A8DC8D40 | SHA256:DF127776039B1715F781D15F6F98FBFCA1B5D499BB352DEAB9DE4D31D8B0819F | |||
5560 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\eNLPD8QMxnjf.bat | text | |
MD5:A98A9E75D33F1C59EB10D8755A6C1213 | SHA256:11486E0CAA1A74B48F4AACB2306B07A71B14475DED0626A57A8DB02F7E3A31B3 | |||
5200 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\7d6XKyr7frWN.bat | text | |
MD5:8ABA75EE3B79E8F832D4331C85F31998 | SHA256:F1D160C02E37506608AE4367C00EE17BA8590FB51DE33E8A6E5FE14315866AEA | |||
3436 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\aTqdnVBSOnzE.bat | text | |
MD5:38859C9EF714F475A4B3D67D8B66C769 | SHA256:67F1628449412C07A59760C6D402077B75C2694D85F0692AA6AA876D9DB86FA3 | |||
5540 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\DVTFD9zFnTM8.bat | text | |
MD5:FDCA25FE11756B8D79AB086AC3ADFDAD | SHA256:494706062CA26FD8C296727FD32ACF77D5EDDC01245D5C93CD6F15083BFF14C3 | |||
3816 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\FraRRo4VWMYT.bat | text | |
MD5:8E62C2EF6F817C99EF06067FF22E5047 | SHA256:0E72E8B40E2000405BB1ADB133CD5C221662BC6E22C0396016FAB09839FF151C | |||
3688 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\tIsZQmXp6o95.bat | text | |
MD5:CA7BFE9496CD3088D4DA883CEA0B5E2E | SHA256:8ADD264E32EB2D5CA60338F2BC513D0CC6822F26954FA98D061B2F71200B8443 | |||
1140 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\hdbIVv1BB7to.bat | text | |
MD5:47F3D644A05B507D378564DC0A0989B1 | SHA256:562FBDB4E0C8F31D1DF184F723644C7AC061F83EFFB7E466ACF94E53631FB636 | |||
4052 | 7809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c.exe | C:\Users\admin\AppData\Local\Temp\XQX8hE50WToN.bat | text | |
MD5:554E0418082A7134DA09C1634EC1666A | SHA256:02707AE358F86CE6510CE3E16FCBE32D9D7101A532CC45FEF349E2345DC6AF7E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4300 | svchost.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4300 | svchost.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
4300 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.19.80.89:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4300 | svchost.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4300 | svchost.exe | 23.38.73.129:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.38.73.129:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
VIPEEK1990-25013.portmap.host |
| malicious |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |
— | — | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
— | — | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
— | — | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |
— | — | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
— | — | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |
— | — | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
— | — | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |
— | — | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
— | — | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |