File name: | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27 |
Full analysis: | https://app.any.run/tasks/4c1cf70c-b5da-4ef1-911a-80e0551465df |
Verdict: | Malicious activity |
Analysis date: | April 29, 2025, 02:16:30 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
MD5: | 05C7EEFD82D69B7AA3A44ECD99566BB8 |
SHA1: | F76CA4E2DDCD1FA05317A780C94F5A06DDC51008 |
SHA256: | 980C5C0D0620536601D3983B711A6D1FAAAD0BEC4B92036779F773515147EA27 |
SSDEEP: | 49152:sjxCjpFaTb44444444444444444444444444444444444444444444444444444M:sdCna |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2022:01:20 08:30:17+00:00 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 10 |
CodeSize: | 108544 |
InitializedDataSize: | 2771968 |
UninitializedDataSize: | - |
EntryPoint: | 0x862b |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows GUI |
FileVersionNumber: | 26.0.0.0 |
ProductVersionNumber: | 47.0.0.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Unknown (0498) |
CharacterSet: | Unknown (05B1) |
CompanyName: | Tomato |
LegalCopyrights: | Morning bizon inc. |
LegalTrademarks2: | odjfngisdf |
ProductName: | LazyTooth |
ProductVersion: | 88.51.3.50 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2148 | "C:\Windows\System32\wusa.exe" | C:\Windows\SysWOW64\wusa.exe | — | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Update Standalone Installer Exit code: 3221226540 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
3240 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4448 | "C:\Users\admin\jqxapdwg.exe" /d"C:\Users\admin\AppData\Local\Temp\980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe" /e5E0402100000007F | C:\Users\admin\jqxapdwg.exe | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
4696 | "C:\WINDOWS\SysWOW64\wusa.exe" | C:\Windows\SysWOW64\wusa.exe | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Update Standalone Installer Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
4988 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5552 -s 1264 | C:\Windows\SysWOW64\WerFault.exe | — | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
5164 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4448 -s 560 | C:\Windows\SysWOW64\WerFault.exe | — | jqxapdwg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
5512 | svchost.exe | C:\Windows\SysWOW64\svchost.exe | — | jqxapdwg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Exit code: 3221225501 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5552 | "C:\Users\admin\AppData\Local\Temp\980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe" | C:\Users\admin\AppData\Local\Temp\980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
|
(PID) Process: | (5512) svchost.exe | Key: | HKEY_CURRENT_USER\Control Panel\Buses |
Operation: | write | Name: | Config0 |
Value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| |||
(PID) Process: | (5512) svchost.exe | Key: | HKEY_CURRENT_USER\Control Panel\Buses |
Operation: | delete value | Name: | Config1 |
Value: | |||
(PID) Process: | (5552) 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | iqvgchuc |
Value: "C:\Users\admin\jqxapdwg.exe" |
PID | Process | Filename | Type | |
---|---|---|---|---|
5512 | svchost.exe | C:\Users\admin:.repos | binary | |
MD5:EA150FF74C2E436D556075C320BC0D95 | SHA256:8FF76D9E7F7BA462FBD41F26D947BD999CF2D24CE6A51F9877F91C5161AC2291 | |||
5552 | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | C:\Users\admin\jqxapdwg.exe | executable | |
MD5:D5A90B5DCC8524FED0E30887F71FC6F0 | SHA256:6E29BFAC002F06731ABCD9B5DDBA19B1BCE8358DA2C75A4DE57EF5F85A2F11D2 | |||
5552 | 980c5c0d0620536601d3983b711a6d1faaad0bec4b92036779f773515147ea27.exe | C:\Users\admin\AppData\Local\Temp\trbceadj.exe | executable | |
MD5:986629EFE5A4A9A57B0C24713496809E | SHA256:6A1706140C032E366F0AFD739E8593A32A157F029B107E1029964AEC5457DE74 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6032 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6032 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6032 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6032 | SIHClient.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |