File name:

Player.exe

Full analysis: https://app.any.run/tasks/c6ed3232-9741-4513-89f0-e8267c6378ab
Verdict: Malicious activity
Analysis date: October 30, 2023, 16:39:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3C128D2D200508B075A4C468C984F9C4

SHA1:

B2FAA4FEB487546254152D61C657A20917C44FCE

SHA256:

8207AB2EE7875805985F809489F40BF9304570CC868C94A61ED39E2A8D7F9684

SSDEEP:

98304:gFbX4QVU0LVMamD6GXicz2iWde1gwiJvzNoetcwDbeLwfNwS4TbPiP9kFjb5S+aj:YBPfq4v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Player.exe (PID: 3412)
    • Drops the executable file immediately after the start

      • Player.exe (PID: 3412)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Player.exe (PID: 3412)
  • INFO

    • Checks proxy server information

      • Player.exe (PID: 3412)
    • Create files in a temporary directory

      • Player.exe (PID: 3412)
    • Reads the computer name

      • Player.exe (PID: 3412)
    • Checks supported languages

      • Player.exe (PID: 3412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (63.7)
.scr | Windows screen saver (20)
.exe | Win32 Executable (generic) (6.9)
.exe | Win16/32 Executable Delphi generic (3.1)
.exe | Generic Win/DOS Executable (3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:01:18 17:33:17+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 2596864
InitializedDataSize: 669696
UninitializedDataSize: -
EntryPoint: 0x27ae44
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.0.0.0
Comments: -
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start player.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3412"C:\Users\admin\AppData\Local\Temp\Player.exe" C:\Users\admin\AppData\Local\Temp\Player.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
Total events
280
Read events
280
Write events
0
Delete events
0

Modification events

No data
Executable files
7
Suspicious files
0
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\vent.d3dtext
MD5:124B7B888115F3CF892DC405D5C93E06
SHA256:2E4D8BD1490C203DC01143E8D6B51AAEF822E8F91DD4A5E07F45B9DD92450918
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\fence_bottom.d3dtext
MD5:993778E84FFA78C353A040D64349D92E
SHA256:FD84D5ADA23E8DE072196A80E53C424E8F7C9FA2339A80078EDF3E047C1BF0DA
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\fence_middle.d3dtext
MD5:6AC5233AF7109F93A470010D4CB06180
SHA256:DDA14BB01229EF16BBAB0CC04DA3050B99070CADD18527B706DA9F1CEEEC2BCF
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\dome.d3dtext
MD5:AC2FFFAD5B694D3C0BDD355C35D7684B
SHA256:F0578B8F3816D0919FF89972C47B8ACBAD0B922F41FC0256331DA388B8A3936B
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\corner.d3dtext
MD5:0D12C092440930E98F43D435AC81EF72
SHA256:DF255247F4A3807B3B7AF991E6DE6A5DE4A44A64627CF94221DBEF0448384BDF
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\hrt_tmp2\HighResTimer2.dllexecutable
MD5:E6911CF05C37096E8C55FF88CF625F7A
SHA256:CF19B6FB091C1CFDF7E78081D13476ED860A4BAE8AD11C623B4FB91836F2C8CF
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\corner_inv.d3dtext
MD5:5E656502C7034B6EE015D6681AA40E29
SHA256:CBF6C59CECC51BD7418E9A0CEB93BA32CE2417B3F107CC71788813BF28C44847
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\D3DX8.dllexecutable
MD5:8C7C11DBF9CBA3BCB065201C560945E3
SHA256:120C8E8FEF7EA02713D2966DBAD325D631323CB207B11CFA768AEEC48F5150CC
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\slope.d3dtext
MD5:F3E9AAC3B5D3C09D0CE7EE3435D6B499
SHA256:9E6284945674C5803B7E10DD899A0BCEFC4D80DDBABA1699376A1C6C0A14601D
3412Player.exeC:\Users\admin\AppData\Local\Temp\gm_ttt_51624\d3dmlf81141\d3dmlf.dllexecutable
MD5:E5E1F22BD872AA3D93CE2037FD907209
SHA256:AFE2F30C1B1EE726A917004E92AD1DCA45ACAEBEADA53214A737E5154FD4E734
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2656
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info