File name:

SB360.exe

Full analysis: https://app.any.run/tasks/8d46b386-a59a-47d2-a6b0-4640c11ca7cc
Verdict: Malicious activity
Analysis date: January 24, 2024, 03:39:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

505DBCCD2A41B165D45593F7F9576FE6

SHA1:

7CDC45FA499B67F8400C69E8BCBAD5E2B387B9F2

SHA256:

98A5C7407817C3761FD4E76D0FA4BC71D1AE8E27E1FEE0C76B720EF59E7217F1

SSDEEP:

3072:h4jd17LMq0rzQfvdrUt/MvF+XtGBEj+nmS0U+UHDPTUZLrw0rY6VtFBPnFAJByjD:dTmn/fEfEppO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Krsusk.exe (PID: 1880)
      • runas.exe (PID: 2568)
      • SB360.exe (PID: 2692)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 2320)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 2320)
  • SUSPICIOUS

    • Reads the Internet Settings

      • SB360.exe (PID: 2692)
      • Krsusk.exe (PID: 1880)
    • Executable content was dropped or overwritten

      • SB360.exe (PID: 2692)
      • Krsusk.exe (PID: 1880)
    • Executes as Windows Service

      • Gczeady.exe (PID: 2260)
    • Creates or modifies Windows services

      • Krsusk.exe (PID: 1880)
    • Starts itself from another location

      • SB360.exe (PID: 2692)
    • The process executes VB scripts

      • Krsusk.exe (PID: 1880)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 2320)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 2320)
    • Connects to unusual port

      • Gczeady.exe (PID: 2260)
  • INFO

    • Checks supported languages

      • SB360.exe (PID: 2692)
      • Krsusk.exe (PID: 1880)
      • Gczeady.exe (PID: 2260)
    • Reads the computer name

      • SB360.exe (PID: 2692)
      • Krsusk.exe (PID: 1880)
      • Gczeady.exe (PID: 2260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:03:14 01:26:42+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 77824
InitializedDataSize: 20480
UninitializedDataSize: -
EntryPoint: 0x1379f
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start runas.exe no specs sb360.exe krsusk.exe gczeady.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1880"C:\Krsusk.exe" C:\Krsusk.exe
SB360.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\krsusk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2260C:\Windows\Gczeady.exeC:\Windows\Gczeady.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\windows\gczeady.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2320"C:\Windows\System32\WScript.exe" "C:\5188.vbs" C:\Windows\System32\wscript.exeKrsusk.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2568"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\SB360.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2692C:\Users\admin\Desktop\SB360.exeC:\Users\admin\Desktop\SB360.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\sb360.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
386
Read events
374
Write events
10
Delete events
2

Modification events

(PID) Process:(2692) SB360.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:ProxyBypass
Value:
0
(PID) Process:(2692) SB360.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:IntranetName
Value:
0
(PID) Process:(2692) SB360.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2692) SB360.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1880) Krsusk.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Wsguda kkpweiea
Operation:writeName:ReleiceName
Value:
Krsusk.exe
(PID) Process:(1880) Krsusk.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Uplmkc fmycsu
Operation:writeName:Description
Value:
Aesrok uuejueiw
(PID) Process:(1880) Krsusk.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1880) Krsusk.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1880Krsusk.exeC:\Windows\Gczeady.exeexecutable
MD5:505DBCCD2A41B165D45593F7F9576FE6
SHA256:98A5C7407817C3761FD4E76D0FA4BC71D1AE8E27E1FEE0C76B720EF59E7217F1
2692SB360.exeC:\Krsusk.exeexecutable
MD5:505DBCCD2A41B165D45593F7F9576FE6
SHA256:98A5C7407817C3761FD4E76D0FA4BC71D1AE8E27E1FEE0C76B720EF59E7217F1
1880Krsusk.exeC:\5188.vbsbinary
MD5:4E4B12090A347A9A85158E8ECF037FE6
SHA256:25C97438684E73AE8F84C821907B46857F6E69416E12102B4DD438ED0DB268A1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2260
Gczeady.exe
142.250.185.206:2012
GOOGLE
US
whitelisted
2260
Gczeady.exe
142.250.185.142:2012
google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
google.com
  • 142.250.185.142
whitelisted

Threats

No threats detected
No debug info