File name:

SDI_R2102.exe

Full analysis: https://app.any.run/tasks/2b0490cd-6c44-4573-998b-c8f2a8c79783
Verdict: Malicious activity
Analysis date: May 23, 2024, 17:32:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5:

F71ED270A20AD7965E61A919B585905F

SHA1:

5AF7BB83DE9471CEE03C18E056E4D12A17753D2B

SHA256:

7FA36B4CDE896CBB9B1A58E746C23BE788E887EDB24E68C388C6A29A8C6393E2

SSDEEP:

98304:nOPtQ1pAdSDKYeFAfiK+fnVs9RYY/VoBoafw4dX2uxs:M

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SDI_R2102.exe (PID: 4080)
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • SDI_R2102.exe (PID: 4080)
    • Connects to unusual port

      • SDI_R2102.exe (PID: 4080)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 664)
      • sipnotify.exe (PID: 1944)
    • Reads the Internet Settings

      • sipnotify.exe (PID: 1944)
      • runonce.exe (PID: 2104)
    • Application launched itself

      • WerFault.exe (PID: 2128)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1944)
  • INFO

    • Reads the computer name

      • SDI_R2102.exe (PID: 4080)
      • wmpnscfg.exe (PID: 552)
      • IMEKLMG.EXE (PID: 2228)
      • IMEKLMG.EXE (PID: 2220)
      • wmpnscfg.exe (PID: 2536)
      • wmpnscfg.exe (PID: 2512)
    • Create files in a temporary directory

      • SDI_R2102.exe (PID: 4080)
      • WerFault.exe (PID: 2136)
    • Reads the machine GUID from the registry

      • SDI_R2102.exe (PID: 4080)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 552)
      • runonce.exe (PID: 2104)
      • IMEKLMG.EXE (PID: 2220)
      • IMEKLMG.EXE (PID: 2228)
      • wmpnscfg.exe (PID: 2512)
      • wmpnscfg.exe (PID: 2536)
    • Checks supported languages

      • wmpnscfg.exe (PID: 552)
      • SDI_R2102.exe (PID: 4080)
      • IMEKLMG.EXE (PID: 2220)
      • IMEKLMG.EXE (PID: 2228)
      • wmpnscfg.exe (PID: 2536)
      • wmpnscfg.exe (PID: 2512)
    • Reads the time zone

      • runonce.exe (PID: 2104)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 2104)
      • sipnotify.exe (PID: 1944)
    • Process checks whether UAC notifications are on

      • IMEKLMG.EXE (PID: 2220)
      • IMEKLMG.EXE (PID: 2228)
    • Reads the software policy settings

      • sipnotify.exe (PID: 1944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.3)
.dll | Win32 Dynamic Link Library (generic) (14.1)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:02:04 16:02:20+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.25
CodeSize: 3179008
InitializedDataSize: 4809216
UninitializedDataSize: 181760
EntryPoint: 0x14e0
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows command line
FileVersionNumber: 1.21.2.2102
ProductVersionNumber: 1.21.2.2102
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: www.SamLab.ws
FileDescription: Snappy Driver Installer
FileVersion: 1.21 1.21.2
LegalCopyright: GNU GPL v3
OriginalFileName: SDI_1.21.2.exe
ProductName: Snappy Driver Installer
ProductVersion: 1.21.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sdi_r2102.exe wmpnscfg.exe no specs ctfmon.exe no specs sipnotify.exe runonce.exe werfault.exe no specs werfault.exe no specs imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs sdi_r2102.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
552"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
664C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1944C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2104runonce.exe /ExplorerC:\Windows\System32\runonce.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runonce.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2128"C:\Windows\System32\WerFault.exe" -k -rqC:\Windows\System32\WerFault.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2136C:\Windows\System32\WerFault.exe -k -qC:\Windows\System32\WerFault.exeWerFault.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2220"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2228"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2512"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2536"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
7 233
Read events
7 182
Write events
32
Delete events
19

Modification events

(PID) Process:(664) ctfmon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:internat.exe
Value:
(PID) Process:(2104) runonce.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:*WerKernelReporting
Value:
%SYSTEMROOT%\SYSTEM32\WerFault.exe -k -rq
(PID) Process:(2104) runonce.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2104) runonce.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2104) runonce.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2104) runonce.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2136) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\KernelFaults\Queue
Operation:delete valueName:C:\Windows\Minidump\052324-8500-01.dmp
Value:
踒巵괷ǚ
(PID) Process:(2136) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\KernelFaults\Queue
Operation:delete keyName:(default)
Value:
(PID) Process:(2220) IMEKLMG.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\IMEJP\14.0
Operation:writeName:SetPreload
Value:
1
(PID) Process:(2228) IMEKLMG.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\IMEKR\14.0
Operation:writeName:SetPreload
Value:
1
Executable files
0
Suspicious files
9
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2136WerFault.exeC:\Users\admin\AppData\Local\Temp\WER7F73.tmp.cab.tmp
MD5:
SHA256:
2136WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_08587fee\Report.wer
MD5:
SHA256:
4080SDI_R2102.exeC:\Users\admin\AppData\Local\Temp\logs\2024_05_23__18_33_00__USER-PC_state.snpbinary
MD5:5DA9E50DF23F462D2DD6C1A2C82E9351
SHA256:44B315DB8441F3C8E4FB398638F80444B00FC9CDEECDA78A80D4D9D6D07B351D
1944sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\main.jpgimage
MD5:B342ACE63F77961249A084C61EABC884
SHA256:E5067BBA2095B5DA7C3171EC116E9A92337E24E471339B0860A160076EFE49B9
1944sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\metadata.jsonbinary
MD5:E8A970BA6CE386EED9A5E724F26212A6
SHA256:7E06107D585D8FC7870998F3856DCC3E35800AA97E4406AAB83BC8444B6CBDE3
1944sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\microsoft-logo.pngimage
MD5:B7C73A0CFBA68CC70C35EF9C63703CE4
SHA256:1D8B27A0266FF526CF95447F3701592A908848467D37C09A00A2516C1F29A013
2136WerFault.exeC:\Users\admin\AppData\Local\Temp\WER7F75.tmp.cab.tmpbinary
MD5:90252A8086CC23226091E0CBB766562F
SHA256:0B138ABB3D0432C65C53D4462AA46BD8CB3E579DD0489B74DE020DB92121B416
2136WerFault.exeC:\Users\admin\AppData\Local\Temp\WER7F76.tmp.cab.tmpbinary
MD5:8BA028678E2B812B0A124ADC1BAB3ECE
SHA256:9C43C0DF390C39D64F1E5E8E9E032029A634F0B5CE12B24DE2D20A38BF8A0CEC
2136WerFault.exeC:\Users\admin\AppData\Local\Temp\WER7F71.tmp.cabcompressed
MD5:45F81F8B1513072AFA8BFA1F7FE2BD42
SHA256:EC6C6311A9C96E30E2C5C62C861D9DE18E052A5C9662E813AD2E08F4093C8275
4080SDI_R2102.exeC:\Users\admin\AppData\Local\Temp\logs\2024_05_23__18_33_06__USER-PC_state.snpbinary
MD5:971189BF137BF65034AFCB1D001096FF
SHA256:70040E6814E01439491B379A9C768BF4147C6AE4A6ECD0A1DD523AC471340F41
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
266
DNS requests
6
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4080
SDI_R2102.exe
GET
200
185.26.122.80:80
http://driveroff.net/SDI_Update.torrent
unknown
unknown
4080
SDI_R2102.exe
GET
200
192.9.228.30:8080
http://share.camoe.cn:8080/announce?info_hash=9%c3%b95%91%3e%7bu%b6y%da%ca%a3%b9%f9%cb%b4oH%9c&peer_id=-LT1000-15HPQTgnoafM&port=50171&uploaded=0&downloaded=0&left=44532717023&corrupt=0&key=942CA51&event=started&numwant=200&compact=1&no_peer_id=1&supportcrypto=1&redundant=0
unknown
unknown
1944
sipnotify.exe
HEAD
200
23.61.141.106:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133609628331400000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
4080
SDI_R2102.exe
185.26.122.80:80
driveroff.net
Hostland LTD
RU
unknown
4080
SDI_R2102.exe
239.192.152.143:6771
unknown
4080
SDI_R2102.exe
67.215.246.10:6881
router.bittorrent.com
unknown
4080
SDI_R2102.exe
49.13.77.253:6881
router.bitcomet.com
unknown
4080
SDI_R2102.exe
82.221.103.244:6881
router.utorrent.com
unknown
4080
SDI_R2102.exe
192.9.228.30:8080
share.camoe.cn
ORACLE-BMC-31898
US
unknown

DNS requests

Domain
IP
Reputation
router.bittorrent.com
  • 67.215.246.10
shared
router.utorrent.com
  • 82.221.103.244
whitelisted
router.bitcomet.com
  • 49.13.77.253
unknown
driveroff.net
  • 185.26.122.80
unknown
share.camoe.cn
  • 192.9.228.30
  • 129.146.193.240
unknown
query.prod.cms.rt.microsoft.com
  • 23.61.141.106
whitelisted

Threats

PID
Process
Class
Message
4080
SDI_R2102.exe
Potential Corporate Privacy Violation
ET P2P Possible Torrent Download via HTTP Request
Potential Corporate Privacy Violation
ET P2P BitTorrent - Torrent File Downloaded
4080
SDI_R2102.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
No debug info