File name:

8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe

Full analysis: https://app.any.run/tasks/f53a2cd2-6c75-4bba-bc6f-de1c327b9be5
Verdict: Malicious activity
Analysis date: April 19, 2024, 17:36:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

C4DD780560091C8D2DA429C7C689F84B

SHA1:

A2E36C89EB4CDDCCC4D73BF0525A0DA46258D8A0

SHA256:

8B61CADAEDA4C14D7BD9E7990C6620E111809CD57EA0EA222063B0CFF1F6C316

SSDEEP:

24576:B5Ae5hSM7buEwvmMgKbHIXSoSQjZMGRUNopKjei+ro6GEkjEb/:fAe5hSM7buEwvmMgKbHIXSoSQjZMGRU+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 3028)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 3028)
    • Reads security settings of Internet Explorer

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
    • Application launched itself

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 3028)
    • Reads the date of Windows installation

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
    • Starts CMD.EXE for commands execution

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
  • INFO

    • Reads the computer name

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 3028)
      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
    • Checks supported languages

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 3028)
      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
    • Process checks computer location settings

      • 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe (PID: 5796)
    • Reads the software policy settings

      • slui.exe (PID: 700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:04:16 13:46:17+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 110080
InitializedDataSize: 353280
UninitializedDataSize: -
EntryPoint: 0x4924
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
16
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe conhost.exe no specs 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe no specs cmd.exe conhost.exe no specs cmd.exe conhost.exe no specs cmd.exe conhost.exe no specs cmd.exe conhost.exe no specs cmd.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
700"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
892\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2128"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exe
8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
2872\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3028"C:\Users\admin\AppData\Local\Temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe" C:\Users\admin\AppData\Local\Temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\dcomp.dll
c:\windows\system32\gdi32full.dll
3068"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exe
8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
4348"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exe
8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
4456C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5796C:\Users\admin\AppData\Local\Temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeC:\Users\admin\AppData\Local\Temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\dcomp.dll
6408\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
2 838
Read events
2 829
Write events
9
Delete events
0

Modification events

(PID) Process:(5796) 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(5796) 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(5796) 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(5796) 8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6452) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
30288b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316.exeC:\Users\Public\Documents\s1.dllexecutable
MD5:3B402BF2F6C71870316EF98F542DE4AB
SHA256:D0BA0BCC57BF35CD469FFAF352CF950D04358D1D64E127FB9FD05F21D264598D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
45
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3964
WerFault.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
3964
WerFault.exe
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5008
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
5348
svchost.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
2660
SIHClient.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
2660
SIHClient.exe
GET
200
173.223.117.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
2980
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
unknown
2980
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
unknown
unknown
2980
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
unknown
2980
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4008
svchost.exe
239.255.255.250:1900
unknown
5348
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
900
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5152
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5348
svchost.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
unknown
3964
WerFault.exe
104.208.16.94:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3964
WerFault.exe
2.19.198.194:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
3964
WerFault.exe
173.223.117.131:80
www.microsoft.com
AKAMAI-AS
US
unknown
3196
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 173.223.117.131
  • 2.21.17.194
whitelisted
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
  • 2.22.241.194
  • 2.22.241.177
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.138
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.136
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.bing.com
  • 2.19.193.88
  • 2.19.193.89
  • 2.19.193.75
  • 2.19.193.91
  • 2.19.193.73
  • 2.19.193.97
  • 2.19.193.74
  • 2.19.193.90
  • 2.19.193.96
whitelisted
r.bing.com
  • 2.19.193.75
  • 2.19.193.88
  • 2.19.193.74
  • 2.19.193.90
  • 2.19.193.96
  • 2.19.193.89
  • 2.19.193.97
  • 2.19.193.73
  • 2.19.193.91
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

No threats detected
No debug info