File name:

刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe

Full analysis: https://app.any.run/tasks/6dfd1711-e8ec-4761-8968-cb8c5c64c5a2
Verdict: Malicious activity
Analysis date: July 29, 2024, 06:26:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
installer
python
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

AA03FF46A77747F907CB43B921EFB7D4

SHA1:

748DD0DC8BCEBC209C9DEA4331AF8DB445833C83

SHA256:

84A717B1B9DED0BF6700756164AE375E12EBD26FC2B204A0F31905686AB2939E

SSDEEP:

98304:Ave8CxNOy8ERN+rGfbX22kxc8KUHCc60OlP5xWUuvin65HHWD5I0l81IvowR4dPp:bI2N2ZyYKu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • The process drops C-runtime libraries

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • Process drops python dynamic module

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • Executable content was dropped or overwritten

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • Application launched itself

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • Loads Python modules

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Starts POWERSHELL.EXE for commands execution

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 5624)
      • powershell.exe (PID: 236)
    • There is functionality for taking screenshot (YARA)

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Connects to unusual port

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
  • INFO

    • Checks supported languages

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Create files in a temporary directory

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
    • Reads the computer name

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 884)
      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Reads the machine GUID from the registry

      • 刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe (PID: 6860)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5624)
      • powershell.exe (PID: 236)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 5624)
      • powershell.exe (PID: 236)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 5624)
      • powershell.exe (PID: 236)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 5624)
      • powershell.exe (PID: 236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (50.1)
.exe | Win64 Executable (generic) (32.2)
.dll | Win32 Dynamic Link Library (generic) (7.6)
.exe | Win32 Executable (generic) (5.2)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:24 07:26:40+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.4
CodeSize: 153600
InitializedDataSize: 82944
UninitializedDataSize: -
EntryPoint: 0xb210
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 刘晨辉作品-windows恶意应用自动化检测系统v1.3.exe THREAT 刘晨辉作品-windows恶意应用自动化检测系统v1.3.exe powershell.exe no specs conhost.exe no specs slui.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236powershell -Command "cd 'C:\Users\*\Documents\WeChat Files\wx*\FileStorage\File\2024-06\';Compress-Archive -Path * -DestinationPath C:\Windows\Temp\hellohelen2.zip"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
884"C:\Users\admin\AppData\Local\Temp\刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe" C:\Users\admin\AppData\Local\Temp\刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\刘晨辉作品-windows恶意应用自动化检测系统v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1780C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3168\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5624powershell -Command "cd 'C:\Users\*\Documents\WeChat Files\wx*\FileStorage\File\2024-07\';Compress-Archive -Path * -DestinationPath C:\Windows\Temp\hellohelen1.zip"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6860"C:\Users\admin\AppData\Local\Temp\刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe" C:\Users\admin\AppData\Local\Temp\刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe
刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\刘晨辉作品-windows恶意应用自动化检测系统v1.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7116\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
13 269
Read events
13 253
Write events
16
Delete events
0

Modification events

(PID) Process:(5624) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(5624) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(5624) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(5624) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
18
Suspicious files
4
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_bz2.pydexecutable
MD5:624CEACD3A77109802A64465BCCE5BE7
SHA256:B683EFCFA97AB8F61C0D6819183F7B9929E1DA2F4E1B73B20966F090B022EC6E
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_hashlib.pydexecutable
MD5:70C3FA1F69F9EE060D81E6079179852A
SHA256:CE2649DB951C4BE31627E666BA6280969418B8FDBA5F8D1296ADE4449F628CCB
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_decimal.pydexecutable
MD5:1041B8813FB5C5E9C358CDECFD7CFDA2
SHA256:FC42B6DC4083E1C48B27F07414E2273240DD6E89B0B737B7739A9C4D0AA3DE1A
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_ssl.pydexecutable
MD5:9BFCDD632DABF81722DD3B8AE6ED76E0
SHA256:BCE962BEA034AAF9A3A60984667BCEE15E138E0CCC63EADD1FFE2865F40539B2
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_lzma.pydexecutable
MD5:5C31A1D957CB96AA34F8C7792929BC59
SHA256:2B526D4444CE7EADFEC564D0A19AD293585DFCE9E646A199D27017F01EDF4316
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_uuid.pydexecutable
MD5:6269A34234F7D6C2321D3D5324D48087
SHA256:528C1AD06FBDB61DC31DC00B6A9AA51B2E4E94F34DC8F729898B81F0C08170C2
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\_socket.pydexecutable
MD5:909030B95CB9CC3BA1A323889211098E
SHA256:702C1494CC2AD22DF6CA8FB9A2F0839C8EFB7A3468A712C96B273938140A3FB8
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\libcrypto-1_1.dllexecutable
MD5:AAD424A6A0AE6D6E7D4C50A1D96A17FC
SHA256:3A2DBA6098E77E36A9D20C647349A478CB0149020F909665D209F548DFA71377
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\base_library.zipcompressed
MD5:1D365AC5BCDA32BB9F5477843217B5C8
SHA256:7A7640D27B3A4E469E29BDB880D46579F633458A2584434939413139A5925F89
884刘晨辉作品-Windows恶意应用自动化检测系统V1.3.exeC:\Users\admin\AppData\Local\Temp\_MEI8842\libssl-1_1.dllexecutable
MD5:697766ABA55F44BBD896CBD091A72B55
SHA256:44A228B3646EB3575ABD5CBCB079E018DE11CA6B838A29E4391893DE69E0CF4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
42
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
whitelisted
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
US
binary
312 b
whitelisted
2456
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
whitelisted
4132
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5368
SearchApp.exe
92.123.104.50:443
www.bing.com
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
whitelisted
6012
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4648
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2472
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5368
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4788
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
2668
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
t-ring-fdv2.msedge.net
  • 13.107.237.254
unknown
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
www.bing.com
  • 92.123.104.50
  • 92.123.104.47
  • 92.123.104.44
  • 92.123.104.38
  • 92.123.104.43
  • 92.123.104.42
  • 92.123.104.51
  • 92.123.104.46
  • 92.123.104.41
whitelisted
google.com
  • 142.250.185.142
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.253.72
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
th.bing.com
  • 92.123.104.18
  • 92.123.104.17
  • 92.123.104.22
  • 92.123.104.15
  • 92.123.104.14
  • 92.123.104.23
  • 92.123.104.16
  • 92.123.104.19
  • 92.123.104.20
whitelisted

Threats

No threats detected
No debug info