| File name: | malicious.exe |
| Full analysis: | https://app.any.run/tasks/eb0e8abc-14b7-4982-aa2d-cabecce6eace |
| Verdict: | Malicious activity |
| Analysis date: | January 21, 2025, 02:06:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | FCCABF4AD72E9DD65D4205FC26773BE5 |
| SHA1: | C21932368C43FAFFCCF8A24B3C910E05D3953D66 |
| SHA256: | 89ABFC5D2F6CA26B606674D936F03697670DF8F1B8D69C86D063C4D39C20C4EF |
| SSDEEP: | 6144:sziL6Tj1u6C7SdQNrJda/aulZLyVuYL9Y6K71p1gzojZDViEtnwwm:svqSyJda/aulZAuYL901/gWxiEGwm |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2013:07:22 10:43:26+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 174592 |
| InitializedDataSize: | 165376 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x19158 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | Debug |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileVersion: | 1, 0, 0, 0 |
| ProductVersion: | 1, 0, 0, 0 |
| LegalCopyright: | Copyright (C) 2014 |
| FileDescription: | Windows Defender Service |
| ProductName: | Defend Center |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1804 | "C:\Users\admin\AppData\Local\Temp\xelag.exe" | C:\Users\admin\AppData\Local\Temp\xelag.exe | malicious.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1836 | "C:\Users\admin\AppData\Local\Temp\malicious.exe" | C:\Users\admin\AppData\Local\Temp\malicious.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Msiexec |
Value: C:\Users\admin\AppData\Local\Temp\{09a405f0-0a5f-4cfe-a424-a56e9a3186f}\WinDefender.exe | |||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | MSKERNEL |
Value: C:\Users\admin\AppData\Local\Temp\xelag.exe | |||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1836) malicious.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1804) xelag.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Msiexec |
Value: C:\Users\admin\AppData\Local\Temp\{09a405f0-0a5f-4cfe-a424-a56e9a3186f}\WinDefender.exe | |||
| (PID) Process: | (1804) xelag.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | MSKERNEL |
Value: C:\Users\admin\AppData\Local\Temp\xelag.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1836 | malicious.exe | C:\Users\admin\AppData\Local\Temp\xelag.exe | executable | |
MD5:FCCABF4AD72E9DD65D4205FC26773BE5 | SHA256:89ABFC5D2F6CA26B606674D936F03697670DF8F1B8D69C86D063C4D39C20C4EF | |||
| 1836 | malicious.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Download_Manager.exe | executable | |
MD5:FCCABF4AD72E9DD65D4205FC26773BE5 | SHA256:89ABFC5D2F6CA26B606674D936F03697670DF8F1B8D69C86D063C4D39C20C4EF | |||
| 1836 | malicious.exe | C:\Users\admin\AppData\Local\Temp\{09a405f0-0a5f-4cfe-a424-a56e9a3186f}\WinDefender.exe | executable | |
MD5:FCCABF4AD72E9DD65D4205FC26773BE5 | SHA256:89ABFC5D2F6CA26B606674D936F03697670DF8F1B8D69C86D063C4D39C20C4EF | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1108 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |