File name:

Seliware.exe

Full analysis: https://app.any.run/tasks/455d19b3-e8e3-436a-a277-6dd811ab8e1b
Verdict: Malicious activity
Analysis date: October 07, 2024, 10:06:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
netreactor
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

2790AF19BEA9B6602D4D1B23C88B0463

SHA1:

77EF3E0A96F1DF2373B3B71363A596666508782F

SHA256:

7F833702251B3DC148C41FA505B7464183B5451DBFBB736405170A5DAEDA6045

SSDEEP:

49152:0MECrOQhbmLlYYyIlAmLlYYyIlveUw11lfcAA7b+3wUPcfXOKbkjy7gK3HpjexWS:0MRrqLlaUBLlaUveUu3wHnmeRyyrXpS5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Seliware.exe (PID: 6668)
    • Reads security settings of Internet Explorer

      • Seliware.exe (PID: 6668)
    • Reads the date of Windows installation

      • Seliware.exe (PID: 6668)
    • Process drops legitimate windows executable

      • Seliware.exe (PID: 6668)
      • WinRAR.exe (PID: 4712)
  • INFO

    • Reads the computer name

      • Seliware.exe (PID: 6668)
      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Checks supported languages

      • Seliware.exe (PID: 6668)
      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Create files in a temporary directory

      • Seliware.exe (PID: 6668)
    • Process checks computer location settings

      • Seliware.exe (PID: 6668)
    • The process uses the downloaded file

      • Seliware.exe (PID: 6668)
    • Disables trace logs

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Checks proxy server information

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Reads the machine GUID from the registry

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Reads the software policy settings

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Reads Environment values

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • .NET Reactor protector has been detected

      • SeliwareLoaderRewrite.exe (PID: 2488)
    • Manual execution by a user

      • WinRAR.exe (PID: 4712)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:05:12 10:17:15+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.33
CodeSize: 236032
InitializedDataSize: 482304
UninitializedDataSize: -
EntryPoint: 0x266b0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
4
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start seliware.exe seliwareloaderrewrite.exe no specs THREAT seliwareloaderrewrite.exe winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2488"C:\Users\admin\AppData\Local\Temp\RarSFX0\SeliwareLoaderRewrite.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\SeliwareLoaderRewrite.exe
Seliware.exe
User:
admin
Integrity Level:
HIGH
Description:
SeliwareLoaderRewrite
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\seliwareloaderrewrite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4712"C:\Program Files\WinRAR\WinRAR.exe" a -ep1 -scul -r0 -iext -- RarSFX0.rar "@C:\Users\admin\AppData\Local\Temp\Rar$LS4552.15376"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6668"C:\Users\admin\AppData\Local\Temp\Seliware.exe" C:\Users\admin\AppData\Local\Temp\Seliware.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\seliware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7104"C:\Users\admin\AppData\Local\Temp\RarSFX0\SeliwareLoaderRewrite.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\SeliwareLoaderRewrite.exeSeliware.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SeliwareLoaderRewrite
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\seliwareloaderrewrite.exe
c:\windows\system32\ntdll.dll
Total events
1 331
Read events
1 313
Write events
18
Delete events
0

Modification events

(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2488) SeliwareLoaderRewrite.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SeliwareLoaderRewrite_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
8
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Memory.dllexecutable
MD5:6FB95A357A3F7E88ADE5C1629E2801F8
SHA256:8E76318E8B06692ABF7DAB1169D27D15557F7F0A34D36AF6463EFF0FE21213C7
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Numerics.Vectors.dllexecutable
MD5:AAA2CBF14E06E9D3586D8A4ED455DB33
SHA256:1D3EF8698281E7CF7371D1554AFEF5872B39F96C26DA772210A33DA041BA1183
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Runtime.CompilerServices.Unsafe.dllexecutable
MD5:DA04A75DDC22118ED24E0B53E474805A
SHA256:66409F670315AFE8610F17A4D3A1EE52D72B6A46C544CEC97544E8385F90AD74
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Buffers.dllexecutable
MD5:ECDFE8EDE869D2CCC6BF99981EA96400
SHA256:ACCCCFBE45D9F08FFEED9916E37B33E98C65BE012CFFF6E7FA7B67210CE1FEFB
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\SeliwareLoaderRewrite.exeexecutable
MD5:C08AE983171F995E60FD8C89CCB3A7E1
SHA256:D2911F61A56D4F9CF97D5F4D76E7AD03032E63BD38553EEFBC2A4B026B201B04
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\ICSharpCode.SharpZipLib.dllexecutable
MD5:9E9E0A210297968AAF2E00D13958C0B4
SHA256:CB9C05B5A1E1DB26FF43490EE26F2E02ABAE3F321D2DD5DDD43A68DA48EAB83D
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Newtonsoft.Json.dllexecutable
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
6668Seliware.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\System.Threading.Tasks.Extensions.dllexecutable
MD5:0F384AFCF671483188B9019D3B7457A7
SHA256:2C9CAD6410E37E44FA73CCCB576F418184F1AE5A0A257E165A136BDAA941A0C6
4712WinRAR.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\RarSFX0.rarcompressed
MD5:BA93051F0F4752BC6190EEC0B431A2C9
SHA256:47E17B2D8529ED62C8C1C97BD1E6CED9D3020690822311C1946E623E28A68C9C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
46
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3768
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3212
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2628
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3212
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
7108
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4324
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2488
SeliwareLoaderRewrite.exe
147.45.255.20:443
seliware.com
OOO FREEnet Group
RU
unknown
7108
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3768
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 216.58.206.46
whitelisted
seliware.com
  • 147.45.255.20
unknown
login.live.com
  • 40.126.32.72
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.138
  • 20.190.160.17
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info