File name:

selfbot.exe

Full analysis: https://app.any.run/tasks/7d4093fb-9731-4954-ad6c-03eeafa310aa
Verdict: Malicious activity
Analysis date: October 16, 2024, 21:29:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
discord
github
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

8F51259600ABF7AD700D70848F36216B

SHA1:

0645EA6CDD98DBC77E376DC2C58DCFB93F83B0E1

SHA256:

996853D821D6C52826B7C0C57808A8A4DF548196A7FC404A17B726439DB929FD

SSDEEP:

98304:iCT2pccIWBqm58abX4GGhzBAZHBMsqM0sIWOzUaUoSJPU74sKFcbnhwkXMsFXOQT:MukcADtVl8+CJcY9uz4FU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6516)
      • powershell.exe (PID: 6248)
      • powershell.exe (PID: 3696)
      • powershell.exe (PID: 3648)
      • powershell.exe (PID: 6488)
      • powershell.exe (PID: 2196)
    • Changes powershell execution policy (Bypass)

      • selfbot.exe (PID: 4548)
  • SUSPICIOUS

    • The process bypasses the loading of PowerShell profile settings

      • selfbot.exe (PID: 4548)
    • The process executes Powershell scripts

      • selfbot.exe (PID: 4548)
    • Starts POWERSHELL.EXE for commands execution

      • selfbot.exe (PID: 4548)
  • INFO

    • Drops encrypted JS script (Microsoft Script Encoder)

      • selfbot.exe (PID: 4548)
    • Checks supported languages

      • selfbot.exe (PID: 4548)
    • Reads the computer name

      • selfbot.exe (PID: 4548)
    • UPX packer has been detected

      • selfbot.exe (PID: 4548)
    • Creates files or folders in the user directory

      • selfbot.exe (PID: 4548)
    • Reads the software policy settings

      • selfbot.exe (PID: 4548)
    • Reads the machine GUID from the registry

      • selfbot.exe (PID: 4548)
    • Attempting to use instant messaging service

      • selfbot.exe (PID: 4548)
    • Create files in a temporary directory

      • selfbot.exe (PID: 4548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 3
CodeSize: 11407360
InitializedDataSize: 4096
UninitializedDataSize: 29446144
EntryPoint: 0x26f6280
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT selfbot.exe conhost.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2196PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\ddcc9e20-6f09-41dd-5a03-fca7e13c1e5d.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
3648PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\f15ff8ad-011e-4d41-63bb-d139ce165da1.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
3696PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\c78632be-9152-487c-4eac-2d0397cca99a.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
4548"C:\Users\admin\AppData\Local\Temp\selfbot.exe" C:\Users\admin\AppData\Local\Temp\selfbot.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\selfbot.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6248PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\7e6fa6b6-c3a9-4e40-7cd9-d0457fa960ce.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6284\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6488PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\9cc2445c-a0ed-48f2-4e6c-0eb568c9e3e6.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6516PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\c10731c2-0136-4549-4a61-b6e011d6182e.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
6704powershell -NoProfile Get-StartAppsC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeselfbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
35 698
Read events
35 698
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
6704powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4nfupk4k.5j3.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4548selfbot.exeC:\Users\admin\AppData\Roaming\LightningBot\Logo.pngimage
MD5:83BF0E353373ECC8D638DA44DE4F5602
SHA256:B5664B33E6B81468DB063C8FC0632C6AA7CCC0562F870B3F07CFE72E2CF6DE79
4548selfbot.exeC:\Users\admin\AppData\Roaming\LightningBot\Config\config.jsonbinary
MD5:70C0083019F3EDCFAA1B1FC3847C5B0C
SHA256:BCC70CD955D0B687294C084A7EC4CC7166701E5C30A08257C10AAD4CCF09B559
6704powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vzbd53oc.03g.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4548selfbot.exeC:\Users\admin\AppData\Local\Temp\c78632be-9152-487c-4eac-2d0397cca99a.ps1text
MD5:51A3663CC08628B40AFA965F76DDBA55
SHA256:3AAF8E8816C50902ADBAFBA126E75684016BE7233C701FBF889650B9657F19A4
6248powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nsov4cb3.vhs.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4548selfbot.exeC:\Users\admin\AppData\Local\Temp\c10731c2-0136-4549-4a61-b6e011d6182e.ps1text
MD5:4F76B7389E1E062F65730766F7B10ECA
SHA256:EF9A3A688F5431F2E93DEB0DEF6B99DBCBC2F5EA037AF3DD59117F8C16CBB8F2
6704powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:65179433C0FBDAA2A5C6ADEEAE95584D
SHA256:1F08E803F8DF8882FCA020D862C8684AA26787A8D03E9B1E51720CCC73324A3E
6516powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_roksoygf.qzc.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6488powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ksps0qwh.uou.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
67
DNS requests
30
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2776
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6136
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3608
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6136
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1584
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4548
selfbot.exe
172.67.180.228:443
api.lightning-bot.com
CLOUDFLARENET
US
unknown
4360
SearchApp.exe
104.126.37.147:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 23.48.23.166
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
api.lightning-bot.com
  • 172.67.180.228
  • 104.21.75.194
unknown
www.bing.com
  • 104.126.37.147
  • 104.126.37.154
  • 104.126.37.170
  • 104.126.37.171
  • 104.126.37.152
  • 104.126.37.137
  • 104.126.37.128
  • 104.126.37.139
  • 104.126.37.153
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.140
  • 40.126.32.136
  • 20.190.160.17
  • 40.126.32.138
  • 40.126.32.74
  • 40.126.32.68
  • 20.190.159.64
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.71
  • 20.190.159.23
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.4
whitelisted
th.bing.com
  • 104.126.37.176
  • 104.126.37.136
  • 104.126.37.171
  • 104.126.37.139
  • 104.126.37.163
  • 104.126.37.154
  • 104.126.37.147
  • 104.126.37.137
  • 104.126.37.178
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
4548
selfbot.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2172
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
4548
selfbot.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info