| File name: | fat.exe |
| Full analysis: | https://app.any.run/tasks/de797838-671a-4d5e-81c9-abe379ad0822 |
| Verdict: | Malicious activity |
| Analysis date: | June 02, 2025, 20:44:57 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | D3C2519A4B1A0FCAA544ACC0811F5C1B |
| SHA1: | 338E88EC41BD6AF415397343A193E27E336DDD90 |
| SHA256: | 944A080711C209D86728FF347A9A6B017B89EFA59CA2F6B7FE9CCF511EC5FD6A |
| SSDEEP: | 196608:Z8owhBiCWMG+A7q/TIqd6ERJO9WxPHEB3hphGLSiJ:ZevWJzq/jUaPI4Sk |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:06:01 23:37:27+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.32 |
| CodeSize: | 165888 |
| InitializedDataSize: | 154112 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xafa0 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 680 | "C:\Users\admin\Desktop\fat.exe" | C:\Users\admin\Desktop\fat.exe | fat.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 780 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3268 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4400 | "C:\Users\admin\Desktop\fat.exe" | C:\Users\admin\Desktop\fat.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 7812 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | fat.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_ARC4.pyd | executable | |
MD5:BB24C0130C3DDC0EDD8ED9445CD139DD | SHA256:EC06CBEAD433D7E91947E2C66E9DDD3BC319C3A8D7F6A75CCA782ED3BB3BAE76 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_cbc.pyd | executable | |
MD5:B1A7FF8D600A4AFA51E63A294AAD3644 | SHA256:3176B78C6DC07BC119D0E59E23F3DEA732E606E876D36F9224C6D15D7A7B39A4 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_des.pyd | executable | |
MD5:D396715DE12BAD1416F4E3CCFB7FA6BD | SHA256:E0ABA48F05288315674C3667E3C883A1D2AF7813A58838B007C6CA6463D39471 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_chacha20.pyd | executable | |
MD5:CF8FFD1342F25DC21DA26EFE0F9BFD5C | SHA256:06B6F6005B96FA3DDBFFA052CD11B9870101064225AE21258030A8B0C5A9495B | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_cast.pyd | executable | |
MD5:83E114861F490D23DE2B3CA29A536C28 | SHA256:23C0B7775AAE008895DCA6F0E0E261386053237926AD4C9A88835525ECB53498 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_ctr.pyd | executable | |
MD5:B883A25430F149C19633E54500251F8E | SHA256:61C08CAC2CEEF0A61E5EC0D34C4AA20F3BF24F19D95F60D95A36F31BC4ABE77F | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_des3.pyd | executable | |
MD5:46119999FDE46D664919CD9806A90160 | SHA256:37CB14308EDDA8B2F070EBC47B470B44E415721337AEA8D2CF68A39A8A5CF543 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Hash\_BLAKE2b.pyd | executable | |
MD5:CDE2EB550754737B0761D0F7B9A1A722 | SHA256:5190424067BA6ABF66FCD5263274C920B5B55383DBA71A8E13CEC9E2ABD8ECD9 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_ecb.pyd | executable | |
MD5:8FBD630F47859399EE7E5CE10265B5F4 | SHA256:E7B302DA7D6CDF5249EDA13D43E999253C7F0F2E5FCB0E5513E8ECC5811C6D26 | |||
| 4400 | fat.exe | C:\Users\admin\AppData\Local\Temp\_MEI44002\Crypto\Cipher\_raw_blowfish.pyd | executable | |
MD5:A198952267D13A7B0360560F8FBF155B | SHA256:9CB5C5CF5D1677552B3A4CDBA1069F4D51C4D3F2F4D36E6EEFB72FC6B20AC178 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
8172 | RUXIMICS.exe | GET | 200 | 2.18.121.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
8172 | RUXIMICS.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | — | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
8172 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
8172 | RUXIMICS.exe | 2.18.121.139:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
8172 | RUXIMICS.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
680 | fat.exe | 172.67.74.152:443 | api.ipify.org | CLOUDFLARENET | US | shared |
7676 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3268 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
api.ipify.org |
| shared |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
680 | fat.exe | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
2196 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |