File name:

generic.exe

Full analysis: https://app.any.run/tasks/80ce9ac7-d22b-4735-893e-c90571c3816d
Verdict: Malicious activity
Analysis date: December 30, 2024, 08:55:03
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 14 sections
MD5:

D1497FCEE5FB8DE79D7D6A32E8E9AB5E

SHA1:

DB70CF2A8CDE3996ABC4814667DAE147BF0BB672

SHA256:

78EE86415FFACAA9BDFC9EBE24A868321C96546EF7E3577005E3BF96ECAABFCE

SSDEEP:

98304:3kHfL0q3w11NVpDGF7C/qgPqM6GjvvPKVsi7tH5itTz+DiWJjbJYbDFxYWgFBAfF:03D0tzC14dr65NU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • generic.exe (PID: 3540)
    • Reads the date of Windows installation

      • generic.exe (PID: 3540)
    • Connects to unusual port

      • generic.exe (PID: 3540)
  • INFO

    • Process checks whether UAC notifications are on

      • generic.exe (PID: 3540)
    • Reads Environment values

      • generic.exe (PID: 3540)
    • Reads the computer name

      • generic.exe (PID: 3540)
    • Reads Windows Product ID

      • generic.exe (PID: 3540)
    • Checks supported languages

      • generic.exe (PID: 3540)
    • Reads product name

      • generic.exe (PID: 3540)
    • Themida protector has been detected

      • generic.exe (PID: 3540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:11:28 18:39:18+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 969728
InitializedDataSize: 292352
UninitializedDataSize: -
EntryPoint: 0x8dc058
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start generic.exe conhost.exe no specs generic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3540"C:\Users\admin\Desktop\generic.exe" C:\Users\admin\Desktop\generic.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\generic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3608"C:\Users\admin\Desktop\generic.exe" C:\Users\admin\Desktop\generic.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\generic.exe
c:\windows\system32\ntdll.dll
3848\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exegeneric.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
221
Read events
221
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
18
DNS requests
5
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3540
generic.exe
POST
200
141.95.84.21:3522
http://141.95.84.21:3522/v9dhLA0go5
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
732
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3540
generic.exe
141.95.84.21:3522
OVH SAS
FR
unknown
732
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3976
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
self.events.data.microsoft.com
  • 52.182.143.211
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
No debug info