File name:

vanguard.exe

Full analysis: https://app.any.run/tasks/a0648d38-c14b-4bd7-b60b-2bc0df812041
Verdict: Malicious activity
Analysis date: February 23, 2024, 19:25:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

93CF31AE7470C489B1F093392A8586ED

SHA1:

FF403304B271DD2031EA483570A0F324AF8B5AE9

SHA256:

8EF6CA45B40B33EB22CE42EEA73B6B82268F8FA66D33BCAD1D6024E962FD18F1

SSDEEP:

49152:O1d/qmXGnNvRg+2FccZDz4+UdRSXuRjSr58ADX+ROIcW73dux+6Ey+DEm4Dkm96h:9FBRgkS34+Udy4jIHKKL+6OEmukmi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • vanguard.exe (PID: 3668)
      • tewrw.exe (PID: 2332)
    • Actions looks like stealing of personal data

      • Vanguard.exe (PID: 2364)
      • Vanguard.exe (PID: 2440)
    • Changes the autorun value in the registry

      • msedge.exe (PID: 864)
  • SUSPICIOUS

    • Reads the Internet Settings

      • vanguard.exe (PID: 3668)
    • Executable content was dropped or overwritten

      • vanguard.exe (PID: 3668)
      • tewrw.exe (PID: 2332)
    • Starts CMD.EXE for commands execution

      • msedge.exe (PID: 864)
    • Loads DLL from Mozilla Firefox

      • Vanguard.exe (PID: 2440)
      • Vanguard.exe (PID: 2072)
    • Reads Mozilla Firefox installation path

      • Vanguard.exe (PID: 2072)
    • Starts itself from another location

      • tewrw.exe (PID: 2332)
  • INFO

    • Reads the computer name

      • vanguard.exe (PID: 3668)
      • Vanguard.exe (PID: 1972)
      • Vanguard.exe (PID: 2440)
      • Vanguard.exe (PID: 3516)
      • Vanguard.exe (PID: 2832)
      • Vanguard.exe (PID: 2564)
      • Vanguard.exe (PID: 2644)
      • Vanguard.exe (PID: 1040)
      • msedge.exe (PID: 864)
    • Create files in a temporary directory

      • msedge.exe (PID: 864)
      • Vanguard.exe (PID: 2364)
      • Vanguard.exe (PID: 1972)
      • Vanguard.exe (PID: 2440)
      • Vanguard.exe (PID: 3516)
      • Vanguard.exe (PID: 2072)
      • Vanguard.exe (PID: 2832)
      • Vanguard.exe (PID: 2644)
      • Vanguard.exe (PID: 2564)
      • Vanguard.exe (PID: 1040)
    • Checks supported languages

      • Vanguard.exe (PID: 1040)
      • vanguard.exe (PID: 3668)
      • tewrw.exe (PID: 2332)
      • Vanguard.exe (PID: 1972)
      • Vanguard.exe (PID: 2364)
      • Vanguard.exe (PID: 3516)
      • Vanguard.exe (PID: 2440)
      • Vanguard.exe (PID: 2072)
      • Vanguard.exe (PID: 2644)
      • Vanguard.exe (PID: 2832)
      • Vanguard.exe (PID: 2564)
      • msedge.exe (PID: 864)
    • Reads the machine GUID from the registry

      • vanguard.exe (PID: 3668)
      • Vanguard.exe (PID: 2440)
      • Vanguard.exe (PID: 3516)
    • Manual execution by a user

      • tewrw.exe (PID: 2332)
    • Creates files or folders in the user directory

      • tewrw.exe (PID: 2332)
    • Reads CPU info

      • msedge.exe (PID: 864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (29.5)
.exe | Win32 EXE Yoda's Crypter (29)
.exe | Win32 Executable Delphi generic (15.4)
.scr | Windows screen saver (14.3)
.exe | Win32 Executable (generic) (4.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 765440
InitializedDataSize: 1453056
UninitializedDataSize: -
EntryPoint: 0xbbc08
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.0.0.0
Comments: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
13
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start vanguard.exe tewrw.exe vanguard.exe no specs msedge.exe cmd.exe no specs vanguard.exe no specs vanguard.exe vanguard.exe vanguard.exe no specs vanguard.exe no specs vanguard.exe no specs vanguard.exe no specs vanguard.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
864-rC:\Program Files\Microsoft\Edge\Application\msedge.exe
Vanguard.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1040-rC:\Users\admin\AppData\Local\Vanguard.exetewrw.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1972 /stext C:\Users\admin\AppData\Local\Temp\1626062C:\Users\admin\AppData\Local\Vanguard.exemsedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
2072 /stext C:\Users\admin\AppData\Local\Temp\1632656C:\Users\admin\AppData\Local\Vanguard.exemsedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2332"C:\Users\admin\Desktop\tewrw.exe" C:\Users\admin\Desktop\tewrw.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\tewrw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2364 /stext C:\Users\admin\AppData\Local\Temp\1626640C:\Users\admin\AppData\Local\Vanguard.exe
msedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
2440 /stext C:\Users\admin\AppData\Local\Temp\1627406C:\Users\admin\AppData\Local\Vanguard.exe
msedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
2564 /stext C:\Users\admin\AppData\Local\Temp\1671343C:\Users\admin\AppData\Local\Vanguard.exemsedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
2644 /stext C:\Users\admin\AppData\Local\Temp\1666906C:\Users\admin\AppData\Local\Vanguard.exemsedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
2832 /stext C:\Users\admin\AppData\Local\Temp\1669125C:\Users\admin\AppData\Local\Vanguard.exemsedge.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\vanguard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
6 617
Read events
6 555
Write events
54
Delete events
8

Modification events

(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
02000000070000000100000006000000000000000B0000000C0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_FolderType
Value:
{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_TopViewID
Value:
{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_TopViewVersion
Value:
0
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:Mode
Value:
4
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:LogicalViewMode
Value:
1
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:FFlags
Value:
(PID) Process:(3668) vanguard.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:IconSize
Value:
16
Executable files
2
Suspicious files
1
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2072Vanguard.exeC:\Users\admin\AppData\Local\Temp\1632656
MD5:
SHA256:
3668vanguard.exeC:\Users\admin\Desktop\tewrw.exeexecutable
MD5:36E462CE4666C7BAD2CB0A69F1EB7AC1
SHA256:882C5D39A5DDD987C29FF7A880D9ECAFDBB4D6A5914AB556EB47F2324DFB8690
3668vanguard.exeC:\Users\admin\Desktop\Settings.initext
MD5:0050538D9361241FDC50D59661946056
SHA256:EE94F97F6430E6E558E794510CE1C7E0A85D74432B4C0FADD019B62989B9598C
2364Vanguard.exeC:\Users\admin\AppData\Local\Temp\1626640text
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
2644Vanguard.exeC:\Users\admin\AppData\Local\Temp\1666906text
MD5:8BBA7413AE879358BD4924F8F33B70FA
SHA256:68B68AE4D42E3595A8E5E2B481035C0D7D8362B282AD862AB90C1C273DAA5052
2832Vanguard.exeC:\Users\admin\AppData\Local\Temp\1669125text
MD5:6353069ECE7BD12AC36B639B3323EC6B
SHA256:4E5D7122869D55CEC7FBE41BD2775E39EF67607C45A2C3D8DEDB41661DDAE094
2564Vanguard.exeC:\Users\admin\AppData\Local\Temp\1671343text
MD5:F1669F63C0F6B6777AEB877C879BC532
SHA256:1ACFE9FEE7305B77E7DD27D1C1E1F254377CF5E03B1399B74C5D25A1CE895D4A
864msedge.exeC:\Users\admin\AppData\Local\Temp\cports.cfgtext
MD5:E6A152C8963F65A5AD186EE7CDCF8235
SHA256:57DA1A6C62B6E42589F5784EC73C982BFF376EE4455A56B0D4A29DFC086A125A
2332tewrw.exeC:\Users\admin\AppData\Local\Vanguard.exeexecutable
MD5:36E462CE4666C7BAD2CB0A69F1EB7AC1
SHA256:882C5D39A5DDD987C29FF7A880D9ECAFDBB4D6A5914AB556EB47F2324DFB8690
3668vanguard.exeC:\Users\admin\Desktop\Contacts\ContactListbinary
MD5:41A158C3FC3B72C6D97DFCF4AB1C46E2
SHA256:E98492DFBE8E2384A89EF278BA4DE0F9C182EAFE1A3EF004A3C3E80BD07FF141
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info