File name:

SUPERAntiSpyware.exe

Full analysis: https://app.any.run/tasks/80ca1c60-a256-4487-a572-9812f17cfaa6
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 12, 2024, 17:03:01
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

19D0EB19B18C11A9CBC0CBB1E7EA80ED

SHA1:

3A450D32E44562E084A851002CAB30605BBEDEF0

SHA256:

92625B20F52FFA04BE861524CB003E80F25F8F43CD31085CB0F15912229B269D

SSDEEP:

98304:AumQHKxXEV2s3MrVL9nfElFwOHlhqHeB2N+RuYR4rWGxu:0u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • SUPERAntiSpyware.exe (PID: 6520)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SUPERAntiSpyware.exe (PID: 6520)
    • Checks Windows Trust Settings

      • SUPERAntiSpyware.exe (PID: 6520)
    • Creates file in the systems drive root

      • SUPERAntiSpyware.exe (PID: 6520)
    • Reads the date of Windows installation

      • SUPERAntiSpyware.exe (PID: 6520)
    • Uses ICACLS.EXE to modify access control lists

      • SUPERAntiSpyware.exe (PID: 6520)
    • Detected use of alternative data streams (AltDS)

      • SUPERAntiSpyware.exe (PID: 6520)
    • Executable content was dropped or overwritten

      • SUPERAntiSpyware.exe (PID: 6520)
    • The process verifies whether the antivirus software is installed

      • SUPERAntiSpyware.exe (PID: 6520)
  • INFO

    • Checks supported languages

      • SUPERAntiSpyware.exe (PID: 6520)
    • Creates files or folders in the user directory

      • SUPERAntiSpyware.exe (PID: 6520)
    • Reads the software policy settings

      • SUPERAntiSpyware.exe (PID: 6520)
    • Creates files in the program directory

      • SUPERAntiSpyware.exe (PID: 6520)
    • Reads the computer name

      • SUPERAntiSpyware.exe (PID: 6520)
    • Reads the machine GUID from the registry

      • SUPERAntiSpyware.exe (PID: 6520)
    • Checks proxy server information

      • SUPERAntiSpyware.exe (PID: 6520)
    • Sends debugging messages

      • SUPERAntiSpyware.exe (PID: 6520)
    • Process checks computer location settings

      • SUPERAntiSpyware.exe (PID: 6520)
    • The process uses the downloaded file

      • SUPERAntiSpyware.exe (PID: 6520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:08:04 16:48:30+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.16
CodeSize: 2606080
InitializedDataSize: 8819712
UninitializedDataSize: -
EntryPoint: 0x2431ac
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 10.0.0.1256
ProductVersionNumber: 10.0.0.1256
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: SUPERAntiSpyware
FileDescription: SUPERAntiSpyware Application
FileVersion: 10, 0, 0, 1256
InternalName: SUPERAntiSpyware Application
LegalCopyright: Copyright (C) 2005-2023 RealDefense LLC
LegalTrademarks: SUPERAntiSpyware (tm)
OriginalFileName: SUPERAntiSpyware.exe
ProductName: SUPERAntiSpyware
ProductVersion: 10, 0, 0, 1256
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start superantispyware.exe cacls.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5644"C:\Windows\System32\cacls.exe" "C:\System Volume Information" /E /G everyone:FC:\Windows\System32\cacls.exeSUPERAntiSpyware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
5
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\ucrtbase.dll
6404\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6520"C:\Users\admin\AppData\Local\Temp\SUPERAntiSpyware.exe" C:\Users\admin\AppData\Local\Temp\SUPERAntiSpyware.exe
explorer.exe
User:
admin
Company:
SUPERAntiSpyware
Integrity Level:
MEDIUM
Description:
SUPERAntiSpyware Application
Version:
10, 0, 0, 1256
Modules
Images
c:\users\admin\appdata\local\temp\superantispyware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
14 754
Read events
14 751
Write events
3
Delete events
0

Modification events

(PID) Process:(6520) SUPERAntiSpyware.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6520) SUPERAntiSpyware.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6520) SUPERAntiSpyware.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
22
Suspicious files
38
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
6520SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\DEFINITIONS.SAS
MD5:
SHA256:
6520SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\PROCESSLIST.BIN
MD5:
SHA256:
6520SUPERAntiSpyware.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBder
MD5:CADC7F5A2B5E29CF3270DD6AD1F9EA69
SHA256:5BC99A0823C080BD2D8823A34C72D45F77C2530F198BF57B990915E0A2978A2E
6520SUPERAntiSpyware.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141der
MD5:A0BF2DC52E54D7F7CAB032AD689DCB11
SHA256:7410452E7C7712771D37FB50CEC14353B69EF8DC6BB08F9513BD5A7381911CA3
6520SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\av_engine_defs.dat
MD5:
SHA256:
6520SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\av_engine_files.dat
MD5:
SHA256:
6520SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\AV\local001.vdf
MD5:
SHA256:
6520SUPERAntiSpyware.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_2F389A13CF0D749456C5D2B748D86561der
MD5:60DE6FE9C8B2B7B03102662560BC4010
SHA256:99614A8493B6C0493919E106C2CFCBB9B1387AAD86EC9FF1A7CB1094DC480811
6520SUPERAntiSpyware.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_2F389A13CF0D749456C5D2B748D86561binary
MD5:C61FA6E61100D46C8A1409A2CA957A33
SHA256:39D8B05F60218632C42AEAA5B7F7BDF183845069FFCDF4A3D2687539AC8AEBFD
6520SUPERAntiSpyware.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:9C6B33CEE5C0DBF80216C3A13A0CDF74
SHA256:DB0F6A75EFB258068A7FD632C07E364F19DA99AB1606BF0DD0276508A1EE16A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
29
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6520
SUPERAntiSpyware.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6520
SUPERAntiSpyware.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
6520
SUPERAntiSpyware.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAiciIyuhpvP5gv7gwgNu9o%3D
unknown
whitelisted
6892
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2036
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6892
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6160
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6520
SUPERAntiSpyware.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6520
SUPERAntiSpyware.exe
35.85.119.95:443
www.superantispyware.com
AMAZON-02
US
suspicious
6520
SUPERAntiSpyware.exe
138.199.37.230:443
secure.superantispyware.com
Datacamp Limited
DE
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
www.superantispyware.com
  • 35.85.119.95
  • 54.149.186.194
unknown
secure.superantispyware.com
  • 138.199.37.230
unknown
login.live.com
  • 40.126.32.76
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.136
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
Process
Message
SUPERAntiSpyware.exe
start menu folder
SUPERAntiSpyware.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\