File name:

Player.exe

Full analysis: https://app.any.run/tasks/c6ed3232-9741-4513-89f0-e8267c6378ab
Verdict: Malicious activity
Analysis date: October 30, 2023, 16:39:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3C128D2D200508B075A4C468C984F9C4

SHA1:

B2FAA4FEB487546254152D61C657A20917C44FCE

SHA256:

8207AB2EE7875805985F809489F40BF9304570CC868C94A61ED39E2A8D7F9684

SSDEEP:

98304:gFbX4QVU0LVMamD6GXicz2iWde1gwiJvzNoetcwDbeLwfNwS4TbPiP9kFjb5S+aj:YBPfq4v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Player.exe (PID: 3412)
    • Drops the executable file immediately after the start

      • Player.exe (PID: 3412)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Player.exe (PID: 3412)
  • INFO

    • Checks supported languages

      • Player.exe (PID: 3412)
    • Reads the computer name

      • Player.exe (PID: 3412)
    • Checks proxy server information

      • Player.exe (PID: 3412)
    • Create files in a temporary directory

      • Player.exe (PID: 3412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (63.7)
.scr | Windows screen saver (20)
.exe | Win32 Executable (generic) (6.9)
.exe | Win16/32 Executable Delphi generic (3.1)
.exe | Generic Win/DOS Executable (3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:01:18 17:33:17+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 2596864
InitializedDataSize: 669696
UninitializedDataSize: -
EntryPoint: 0x27ae44
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.0.0.0
Comments: -
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start player.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3412"C:\Users\admin\AppData\Local\Temp\Player.exe" C:\Users\admin\AppData\Local\Temp\Player.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
Total events
280
Read events
280
Write events
0
Delete events
0

Modification events

No data
Executable files
7
Suspicious files
0
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\D3DX8.dllexecutable
MD5:8C7C11DBF9CBA3BCB065201C560945E3
SHA256:120C8E8FEF7EA02713D2966DBAD325D631323CB207B11CFA768AEEC48F5150CC
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\corner_inv.d3dtext
MD5:5E656502C7034B6EE015D6681AA40E29
SHA256:CBF6C59CECC51BD7418E9A0CEB93BA32CE2417B3F107CC71788813BF28C44847
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\d3dmlf81141\d3dmlf.dllexecutable
MD5:E5E1F22BD872AA3D93CE2037FD907209
SHA256:AFE2F30C1B1EE726A917004E92AD1DCA45ACAEBEADA53214A737E5154FD4E734
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\hrt_tmp2\HighResTimer2.dllexecutable
MD5:E6911CF05C37096E8C55FF88CF625F7A
SHA256:CF19B6FB091C1CFDF7E78081D13476ED860A4BAE8AD11C623B4FB91836F2C8CF
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\gm82\gm82net.dllexecutable
MD5:1BC86F3A814D1149C5030DE05F4E4E4D
SHA256:EB72731FC648631C3F031BBE1F889CE8602C7B394AAB7AA4CC14A89428A46D8F
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\corner.d3dtext
MD5:0D12C092440930E98F43D435AC81EF72
SHA256:DF255247F4A3807B3B7AF991E6DE6A5DE4A44A64627CF94221DBEF0448384BDF
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\fence_bottom.d3dtext
MD5:993778E84FFA78C353A040D64349D92E
SHA256:FD84D5ADA23E8DE072196A80E53C424E8F7C9FA2339A80078EDF3E047C1BF0DA
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\dome.d3dtext
MD5:AC2FFFAD5B694D3C0BDD355C35D7684B
SHA256:F0578B8F3816D0919FF89972C47B8ACBAD0B922F41FC0256331DA388B8A3936B
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\round_small1x1.d3dtext
MD5:28F5CCBADF9BF812E3ED50B0BDFFA066
SHA256:ACC7BC02CDCFFE673214F0FFA4432BBF381AD863F9E7E2B43F06199FB338ABB6
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\round_large1x1.d3dtext
MD5:27D460250E64C7800344DB46B579DFC3
SHA256:38AEBA2E4D3E408C64B7786316FD3FC6BE650C4A2DD323A113B4395E0518F0EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info