File name:

Antivirus.exe

Full analysis: https://app.any.run/tasks/6d7303bf-e79b-4e06-bc36-38888995450b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: September 16, 2024, 11:03:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
ransomware
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

0FE0138FBA9AFE855952D7F7A7DB0961

SHA1:

427CA8D79D471C940A2FF7A1F812EB156DA35782

SHA256:

9850D9144E4484E58D8366E0E5D6AD933587AEC90B47E9594CF7AC749F589DD6

SSDEEP:

768:4/Z072YU3/RhR72buLTaWY0eVgZQ6uTITz:wZ0SYU3/RhRCbuLT1WdTMz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • Antivirus.exe (PID: 320)
    • Steals credentials from Web Browsers

      • Antivirus.exe (PID: 320)
    • Actions looks like stealing of personal data

      • Antivirus.exe (PID: 320)
    • Renames files like ransomware

      • Antivirus.exe (PID: 320)
  • SUSPICIOUS

    • Checks for external IP

      • svchost.exe (PID: 2256)
      • Antivirus.exe (PID: 320)
    • Creates file in the systems drive root

      • Antivirus.exe (PID: 320)
    • Executable content was dropped or overwritten

      • Antivirus.exe (PID: 320)
    • Write to the desktop.ini file (may be used to cloak folders)

      • Antivirus.exe (PID: 320)
  • INFO

    • Reads Environment values

      • Antivirus.exe (PID: 320)
    • Disables trace logs

      • Antivirus.exe (PID: 320)
    • Checks proxy server information

      • Antivirus.exe (PID: 320)
      • mshta.exe (PID: 7808)
    • Reads the computer name

      • Antivirus.exe (PID: 320)
    • Checks supported languages

      • Antivirus.exe (PID: 320)
    • Reads the machine GUID from the registry

      • Antivirus.exe (PID: 320)
    • Creates files or folders in the user directory

      • Antivirus.exe (PID: 320)
    • Creates files in the program directory

      • Antivirus.exe (PID: 320)
    • Manual execution by a user

      • notepad.exe (PID: 7740)
      • mshta.exe (PID: 7808)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7740)
    • The process uses the downloaded file

      • mshta.exe (PID: 7808)
    • Create files in a temporary directory

      • Antivirus.exe (PID: 320)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:01:08 11:40:27+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 27648
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x8aa2
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Antivirus
CompanyName: -
FileDescription: Antivirus
FileVersion: 1.0.0.0
InternalName: Antivirus.exe
LegalCopyright: Copyright © 2017
LegalTrademarks: -
OriginalFileName: Antivirus.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start antivirus.exe svchost.exe notepad.exe no specs mshta.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
320"C:\Users\admin\AppData\Local\Temp\Antivirus.exe" C:\Users\admin\AppData\Local\Temp\Antivirus.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Antivirus
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\antivirus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7740"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\ReadMe.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7808"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
Total events
40 453
Read events
40 436
Write events
17
Delete events
0

Modification events

(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(320) Antivirus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Antivirus_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
7
Suspicious files
1 983
Text files
803
Unknown types
108

Dropped files

PID
Process
Filename
Type
320Antivirus.exeC:\ProgramData\Microsoft OneDrive\setup\refcount.ini.[26B799FA[decryptprof@mailfence.com].Sup
MD5:
SHA256:
320Antivirus.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\ReadMe.txttext
MD5:99E25C5CD2FD77875487CDBF31FEC435
SHA256:67CB0A1DB2D7C9732F4C0197D5EEDDD94454031E8CEA264E10AD122112743A47
320Antivirus.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\UpdateLock-308046B0AF4A39CB.[26B799FA[decryptprof@mailfence.com].Sup
MD5:
SHA256:
320Antivirus.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcrobatDCx64Manifest3.msibinary
MD5:6C52347C2D72814E9503DBA232410F8D
SHA256:67E69E2CD86F475DD0809E5FAC41FDFD83D8B06749BCCF977DECA5D359761345
320Antivirus.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\info.htahtml
MD5:29FB171EA1AF1124C4D28043446BE2F4
SHA256:D6B263F14D4AC759CE731CBF7DBAC9A02ECFD673CDD9E41BD622CFEC68D4865C
320Antivirus.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.htahtml
MD5:29FB171EA1AF1124C4D28043446BE2F4
SHA256:D6B263F14D4AC759CE731CBF7DBAC9A02ECFD673CDD9E41BD622CFEC68D4865C
320Antivirus.exeC:\ProgramData\info.htahtml
MD5:29FB171EA1AF1124C4D28043446BE2F4
SHA256:D6B263F14D4AC759CE731CBF7DBAC9A02ECFD673CDD9E41BD622CFEC68D4865C
320Antivirus.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.[26B799FA[decryptprof@mailfence.com].Supbinary
MD5:14D409E718B34B89577DD1C1410C9A51
SHA256:E21484E1FC33A232BDB8B2D313ACED61D9822561871EEA05C5E5A268390A760F
320Antivirus.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exeexecutable
MD5:0FE0138FBA9AFE855952D7F7A7DB0961
SHA256:9850D9144E4484E58D8366E0E5D6AD933587AEC90B47E9594CF7AC749F589DD6
320Antivirus.exeC:\ProgramData\ReadMe.txttext
MD5:99E25C5CD2FD77875487CDBF31FEC435
SHA256:67CB0A1DB2D7C9732F4C0197D5EEDDD94454031E8CEA264E10AD122112743A47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
28
DNS requests
14
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
608
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
320
Antivirus.exe
GET
200
104.16.184.241:80
http://icanhazip.com/
unknown
shared
6516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
608
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6416
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
320
Antivirus.exe
104.16.184.241:80
icanhazip.com
CLOUDFLARENET
shared
608
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2028
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2028
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.46
whitelisted
icanhazip.com
  • 104.16.184.241
  • 104.16.185.241
shared
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.138
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (icanhazip .com)
320
Antivirus.exe
Attempted Information Leak
ET POLICY IP Check Domain (icanhazip. com in HTTP Host)
320
Antivirus.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info