File name:

7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe

Full analysis: https://app.any.run/tasks/3325f16c-ca43-4d00-bb32-cebb096dde81
Verdict: Malicious activity
Analysis date: September 28, 2024, 09:08:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5:

5EE1BEFC69D120976A60A97D3254E9EB

SHA1:

E6C4D3E360A705E272AE0B505E58E3D928FB1387

SHA256:

7C00152CC68F0104E7436F9CE8B4C99E685D05F4361F50AF307D4BFDBC90BCA0

SSDEEP:

12288:/Pn9COm/y0J8QD1KGrYyOCuZ8z6sJLllDsnJKxEkM4evknvo6eL4k0+z3KLbX8fO:Q8KEkXvo6f+z3K0yAoMT6/B9SHv35k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
    • Contacting a server suspected of hosting an CnC

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
  • INFO

    • Checks proxy server information

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
    • Checks supported languages

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
    • Reads the computer name

      • 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe (PID: 2648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:08:17 04:23:22+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.42
CodeSize: 1053184
InitializedDataSize: 3333120
UninitializedDataSize: 512
EntryPoint: 0x13d0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe

Process information

PID
CMD
Path
Indicators
Parent process
2648"C:\Users\admin\Desktop\7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe" C:\Users\admin\Desktop\7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
Total events
346
Read events
343
Write events
3
Delete events
0

Modification events

(PID) Process:(2648) 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2648) 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2648) 7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
38
DNS requests
5
Threats
42

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20general.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20json.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20json.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20json.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20general.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20json.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20json.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20general.php
unknown
unknown
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
POST
502
74.50.84.181:443
http://74.50.84.181:443/%20general.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3924
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3924
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3924
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
74.50.84.181:443
IS-AS-1
US
malicious
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted

Threats

PID
Process
Class
Message
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
2648
7c00152cc68f0104e7436f9ce8b4c99e685d05f4361f50af307d4bfdbc90bca0.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
Malware Command and Control Activity Detected
ET MALWARE Suspected Brute Ratel CnC Activity (POST)
No debug info