File name:

aware.exe

Full analysis: https://app.any.run/tasks/fe78c835-eb2b-4375-8ffa-1656c55d734a
Verdict: Malicious activity
Analysis date: July 29, 2024, 19:27:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

AA6AEBC3EF0359F1A24D9A619828AC59

SHA1:

D36E07B993C4B668C0DBFE2DA5A998E3787E20DD

SHA256:

7A829D30AF8752B8CB46328AB7DE4FC462287062280B5F9A3824F39D35C22B4C

SSDEEP:

98304:Jl70XCl+KLTAHNMl/v0TqKJtT9IFLdZJULG8/Gkmu/ndyHGBMi0Ya/pNkLdANBHw:uPuM1U/VOmpGujpX9F7zZ5KD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • aware.exe (PID: 2300)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • aware.exe (PID: 2300)
    • Process drops python dynamic module

      • aware.exe (PID: 2300)
    • Application launched itself

      • aware.exe (PID: 2300)
    • The process drops C-runtime libraries

      • aware.exe (PID: 2300)
    • Process uses IPCONFIG to discover network configuration

      • aware.exe (PID: 3400)
    • Executable content was dropped or overwritten

      • aware.exe (PID: 2300)
    • Uses DRIVERQUERY.EXE to obtain a list of installed device drivers

      • aware.exe (PID: 3400)
  • INFO

    • Create files in a temporary directory

      • aware.exe (PID: 2300)
    • Reads the computer name

      • aware.exe (PID: 2300)
    • Checks supported languages

      • aware.exe (PID: 2300)
    • Reads Environment values

      • aware.exe (PID: 3400)
    • Checks proxy server information

      • aware.exe (PID: 3400)
    • Attempting to use instant messaging service

      • aware.exe (PID: 3400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:07:29 19:26:37+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 172032
InitializedDataSize: 151040
UninitializedDataSize: -
EntryPoint: 0xb220
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start aware.exe conhost.exe no specs aware.exe ipconfig.exe no specs driverquery.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
752ipconfig /allC:\Windows\System32\ipconfig.exeaware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc.dll
1476driverquery /vC:\Windows\System32\driverquery.exeaware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Queries the drivers on a system
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\driverquery.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2300"C:\Users\admin\Desktop\aware.exe" C:\Users\admin\Desktop\aware.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\aware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2496C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2692\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeaware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3400"C:\Users\admin\Desktop\aware.exe" C:\Users\admin\Desktop\aware.exe
aware.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\windows\system32\dnsapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\msasn1.dll
Total events
3 208
Read events
3 208
Write events
0
Delete events
0

Modification events

No data
Executable files
68
Suspicious files
1
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\VCRUNTIME140_1.dllexecutable
MD5:F8DFA78045620CF8A732E67D1B1EB53D
SHA256:A113F192195F245F17389E6ECBED8005990BCB2476DDAD33F7C4C6C86327AFE5
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\Pythonwin\mfc140u.dllexecutable
MD5:03A161718F1D5E41897236D48C91AE3C
SHA256:E06C4BD078F4690AA8874A3DEB38E802B2A16CCB602A7EDC2E077E98C05B5807
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\Pythonwin\win32ui.pydexecutable
MD5:39C17A3F9C8064AB1D17213172424CE1
SHA256:E376B270E4CA00C9B3D8F47A03994161949A82304D57C7848FAC4F60E533A7CD
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:0CAB310590E60E6ECC1C276EC918D072
SHA256:FB0709BC1107A0171A2C4A52B28BFE211025144A69A47641D651AEE9E81AEF23
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:A7EC2CA3BC14DBB6931F1A69EF0A4E57
SHA256:DBECB3528DA74D472D07246975D803EA1ADE7C414CA5E1076EE6F0B0033DA578
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\_hashlib.pydexecutable
MD5:A6B1C589B11891F3E0EF655FA552A916
SHA256:2BC94748820B9367190EA95B3ED9E13B01C4BB2B2E018913993F626F5D02A938
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A5395C19A4E1C2021EC14F52E876E6EF
SHA256:F4F8DCC10E09D13E757D2175739614417B91ED04C1B91B3705D48E5C75525869
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:6B280015CF873517051CCBDA728DEA4B
SHA256:F2A0D0FC3D24E72F3CC46111D7166AB8A4511674B73617D2019F235C61B30654
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:019B17D7194AFF100128375F49599BCF
SHA256:DD5DC32631199E72246A0028764F7DA2CF28B48E5C54B0B2C04DE2073CDFE4A2
2300aware.exeC:\Users\admin\AppData\Local\Temp\_MEI23002\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:37FCC989B5AE55D0D18EE69EDF57F6C6
SHA256:4047EC069444B0B466C4B375BD55AA1E1B6C177BDA61ECA391969B3D0D07F534
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
32
DNS requests
17
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2.23.209.143:443
www.bing.com
Akamai International B.V.
GB
unknown
5812
slui.exe
20.83.72.98:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5368
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6012
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6220
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3948
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
488
slui.exe
20.83.72.98:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
www.bing.com
  • 2.23.209.143
  • 2.23.209.154
  • 2.23.209.140
  • 2.23.209.176
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.160
  • 2.23.209.158
  • 2.23.209.135
  • 2.19.96.64
  • 2.19.96.66
  • 2.19.96.112
  • 2.19.96.107
  • 2.19.96.91
  • 2.19.96.120
  • 2.19.96.35
  • 2.19.96.74
  • 2.19.96.115
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
discord.com
  • 162.159.135.232
  • 162.159.138.232
  • 162.159.136.232
  • 162.159.128.233
  • 162.159.137.232
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.60
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.23
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
3400
aware.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2284
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
No debug info