| File name: | UnderDDosV2.exe |
| Full analysis: | https://app.any.run/tasks/9e924a6f-ac64-4b4d-ace7-6aa19b1839be |
| Verdict: | Malicious activity |
| Analysis date: | August 28, 2024, 18:41:54 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64, for MS Windows |
| MD5: | 8AD5BA1986C42FBCEF52A7B408924E6B |
| SHA1: | FB40BC7B38FDBE82E9CE34143C09815BB7EF136E |
| SHA256: | 92A664AF27C47DE5DC5831BF2C4C44A621255E7795BCF1B115F3774E023F0C79 |
| SSDEEP: | 98304:kRKBAOX8JGHna2M0GGRRPSolBySmsEDC0o883EJ8xCTwCMvYK+0HI6jdoRpl89a4:PcTeRi/BqnnnywBBX3 |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:04:30 22:22:14+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.37 |
| CodeSize: | 172032 |
| InitializedDataSize: | 103424 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb7d0 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 964 | "C:\Users\admin\Desktop\UnderDDosV2.exe" | C:\Users\admin\Desktop\UnderDDosV2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2612 | C:\WINDOWS\system32\cmd.exe /c cls | C:\Windows\System32\cmd.exe | — | UnderDDosV2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5088 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | UnderDDosV2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6536 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6684 | "C:\Users\admin\Desktop\UnderDDosV2.exe" | C:\Users\admin\Desktop\UnderDDosV2.exe | UnderDDosV2.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 6876 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 42232 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\_ctypes.pyd | executable | |
MD5:6A9CA97C039D9BBB7ABF40B53C851198 | SHA256:E662D2B35BB48C5F3432BDE79C0D20313238AF800968BA0FAA6EA7E7E5EF4535 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\VCRUNTIME140.dll | executable | |
MD5:F12681A472B9DD04A812E16096514974 | SHA256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\_decimal.pyd | executable | |
MD5:D47E6ACF09EAD5774D5B471AB3AB96FF | SHA256:D0DF57988A74ACD50B2D261E8B5F2C25DA7B940EC2AAFBEE444C277552421E6E | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\certifi\cacert.pem | text | |
MD5:302B49C5F476C0AE35571430BB2E4AA0 | SHA256:CF9D37FA81407AFE11DCC0D70FE602561422AA2344708C324E4504DB8C6C5748 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\_bz2.pyd | executable | |
MD5:4101128E19134A4733028CFAAFC2F3BB | SHA256:5843872D5E2B08F138A71FE9BA94813AFEE59C8B48166D4A8EB0F606107A7E80 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\_hashlib.pyd | executable | |
MD5:DE4D104EA13B70C093B07219D2EFF6CB | SHA256:39BC615842A176DB72D4E0558F3CDCAE23AB0623AD132F815D21DCFBFD4B110E | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\libcrypto-1_1.dll | executable | |
MD5:6F4B8EB45A965372156086201207C81F | SHA256:976CE72EFD0A8AEEB6E21AD441AA9138434314EA07F777432205947CDB149541 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\base_library.zip | compressed | |
MD5:49047A64A6D6D1CABE78619319BD5BD4 | SHA256:9EE1D74113182725F079EC78E3DAA2D27F486DE22FA1ED7E7B13BBADB6E32557 | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\_lzma.pyd | executable | |
MD5:337B0E65A856568778E25660F77BC80A | SHA256:613DE58E4A9A80EFF8F8BC45C350A6EAEBF89F85FFD2D7E3B0B266BF0888A60A | |||
| 964 | UnderDDosV2.exe | C:\Users\admin\AppData\Local\Temp\_MEI9642\libffi-8.dll | executable | |
MD5:32D36D2B0719DB2B739AF803C5E1C2F5 | SHA256:128A583E821E52B595EB4B3DDA17697D3CA456EE72945F7ECCE48EDEDAD0E93C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7088 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6684 | UnderDDosV2.exe | CONNECT | — | 188.40.59.208:3128 | http://188.40.59.208:3128myexternalip.com:443 | unknown | — | — | unknown |
1764 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7088 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6684 | UnderDDosV2.exe | CONNECT | — | 51.254.78.223:80 | http://51.254.78.223:80ipv4.icanhazip.com:443 | unknown | — | — | unknown |
6684 | UnderDDosV2.exe | CONNECT | 400 | 194.147.33.5:8080 | http://194.147.33.5:8080myexternalip.com:443 | unknown | — | — | unknown |
6684 | UnderDDosV2.exe | CONNECT | 400 | 185.105.88.63:4444 | http://185.105.88.63:4444myexternalip.com:443 | unknown | — | — | unknown |
6684 | UnderDDosV2.exe | CONNECT | 400 | 185.217.199.176:4444 | http://185.217.199.176:4444wtfismyip.com:443 | unknown | — | — | unknown |
6684 | UnderDDosV2.exe | CONNECT | — | 194.182.187.78:3128 | http://194.182.187.78:3128ipv4.icanhazip.com:443 | unknown | — | — | unknown |
6684 | UnderDDosV2.exe | CONNECT | — | 185.217.143.96:80 | http://185.217.143.96:80ipv4.icanhazip.com:443 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
6856 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1764 | svchost.exe | 20.190.160.20:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1764 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4324 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
7088 | SIHClient.exe | 13.85.23.86:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
ipv4.icanhazip.com |
| whitelisted |
api.proxyscrape.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Potentially Bad Traffic | ET INFO Public Proxy Service Domain in DNS Lookup (api .proxyscrape .com) |
6684 | UnderDDosV2.exe | Potentially Bad Traffic | ET INFO Observed Public Proxy Service Domain (api .proxyscrape .com in TLS SNI) |
2256 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ifconfig .io) |
6684 | UnderDDosV2.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain (ifconfig .io) in TLS SNI |
6684 | UnderDDosV2.exe | Attempted Information Leak | ET POLICY IP Check Domain (icanhazip. com in HTTP Host) |
6684 | UnderDDosV2.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - ipecho.net |
6684 | UnderDDosV2.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - ipecho.net |
6684 | UnderDDosV2.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - ipecho.net |
6684 | UnderDDosV2.exe | Attempted Information Leak | ET POLICY IP Check Domain (icanhazip. com in HTTP Host) |