File name:

9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d

Full analysis: https://app.any.run/tasks/9d402a41-17a7-4c29-b0ae-523b46e43928
Verdict: Malicious activity
Analysis date: February 04, 2024, 02:44:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

57C833BFD5042E34BEC23DFD711CD151

SHA1:

6BCD1915173D57D369E209943BE31EEBEBDD535A

SHA256:

9D3C881C29156B8FD82CED7C7726C4C65D4E741533C9F886112F440698B1469D

SSDEEP:

98304:Cmqay4lq6jqJGKBBvPnwk6b/fHZpCkEPGDd42heDrOFSa7OR0D52lCH4YJ9Ei746:1hKqe0Y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1652)
      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
  • SUSPICIOUS

    • Application launched itself

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1652)
    • The process creates files with name similar to system file names

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Executable content was dropped or overwritten

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Connects to FTP

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Connects to SSH

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Connects to SMTP port

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Connects to unusual port

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
  • INFO

    • Checks supported languages

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1652)
      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Reads the computer name

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Creates files in the program directory

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Reads the machine GUID from the registry

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
    • Create files in a temporary directory

      • 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe (PID: 1632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Clipper DOS Executable (2.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:06:04 21:08:19+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 1922560
InitializedDataSize: 3833856
UninitializedDataSize: -
EntryPoint: 0x8c4a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 25.0.0.0
ProductVersionNumber: 61.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0373)
CharacterSet: Unknown (63B6)
FileDescriptions: Buttiskarf
InternalName: Bastard.exe
LegalTrademark1: Fascal
OriginalFileName: Lameros.exe
ProductName: Jadocka
ProductVersion: 57.38.26
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe no specs 9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe

Process information

PID
CMD
Path
Indicators
Parent process
1632"C:\Users\admin\AppData\Local\Temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe" C:\Users\admin\AppData\Local\Temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
1652"C:\Users\admin\AppData\Local\Temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe" C:\Users\admin\AppData\Local\Temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
Total events
1 532
Read events
1 532
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\ProgramData\Drivers\csrss.exeexecutable
MD5:57C833BFD5042E34BEC23DFD711CD151
SHA256:9D3C881C29156B8FD82CED7C7726C4C65D4E741533C9F886112F440698B1469D
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4KPV6A~1\unverified-microdesc-consensus.tmptext
MD5:F7DA8CEF57BE72A16AC4EF1C4A676A68
SHA256:50513148FCA281B937A13B35B218CF7CA3A5AA526E501C9FC1DE7A8EE112A291
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmptext
MD5:F7DA8CEF57BE72A16AC4EF1C4A676A68
SHA256:50513148FCA281B937A13B35B218CF7CA3A5AA526E501C9FC1DE7A8EE112A291
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4kPv6aJG8e\statetext
MD5:7ECC7347D65A7697CD2A627702A416AC
SHA256:7B99CAEE34C64720F83B21EF9C6F77BF49FF3569DAF0C3855F56E70A7A1C63C0
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.newtext
MD5:4ABCA1EF98BC9BBF77ACC3F89ADE8D55
SHA256:17EB9EAD5B6AA1CA14A2C5E8EA3DD3B35D8C1C9FB8892973D712A8B06D1CF3BA
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4KPV6A~1\cached-certs.tmptext
MD5:C9596C5BEF239CE240F945CE2B79BF1B
SHA256:5C3E5404EE46F198E28E879ECE4E298FC0BB8606145D8BF726781C0628748CB4
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4kPv6aJG8e\cached-certstext
MD5:C9596C5BEF239CE240F945CE2B79BF1B
SHA256:5C3E5404EE46F198E28E879ECE4E298FC0BB8606145D8BF726781C0628748CB4
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4kPv6aJG8e\unverified-microdesc-consensustext
MD5:F7DA8CEF57BE72A16AC4EF1C4A676A68
SHA256:50513148FCA281B937A13B35B218CF7CA3A5AA526E501C9FC1DE7A8EE112A291
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4KPV6A~1\state.tmptext
MD5:7ECC7347D65A7697CD2A627702A416AC
SHA256:7B99CAEE34C64720F83B21EF9C6F77BF49FF3569DAF0C3855F56E70A7A1C63C0
16329d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exeC:\Users\admin\AppData\Local\Temp\4kPv6aJG8e\cached-microdesc-consensustext
MD5:F7DA8CEF57BE72A16AC4EF1C4A676A68
SHA256:50513148FCA281B937A13B35B218CF7CA3A5AA526E501C9FC1DE7A8EE112A291
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
673
TCP/UDP connections
11 464
DNS requests
1 724
Threats
252

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
108.138.36.68:80
http://app.myloft.xyz/phpmyadmin/
unknown
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
301
104.21.34.65:80
http://perfectaim.io/wp-login.php
unknown
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
403
104.16.120.50:80
http://auth.riotgames.com/pma/
unknown
html
1.70 Kb
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
301
34.149.46.130:80
http://accounts.snapchat.com/wp-login.php
unknown
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
184.86.251.95:80
http://pje1g.trf3.jus.br/administrator/
unknown
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
403
104.26.11.247:80
http://onlinepublishing.studentreasures.com/admin
unknown
html
1.70 Kb
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
200
199.59.243.225:80
http://t3s.live/admin
unknown
html
1.01 Kb
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
302
103.194.45.1:80
http://unifiedportal-mem.epfindia.gov.in/phpmyadmin/
unknown
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
403
23.212.211.57:80
http://auth.api.sonyentertainmentnetwork.com/admin.php
unknown
html
304 b
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
GET
301
95.138.193.239:80
http://mc-szerverek.hu/phpmyadmin/
unknown
html
162 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
185.233.252.14:9001
Kviknet.dk ApS
DK
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
37.139.22.180:9001
DIGITALOCEAN-ASN
NL
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
51.195.124.251:9001
OVH SAS
FR
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
54.37.138.104:443
OVH SAS
FR
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
212.47.227.71:9001
Online S.a.s.
FR
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
185.220.101.198:10198
Zwiebelfreunde e.V.
DE
unknown
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
171.25.193.9:80
Foreningen for digitala fri- och rattigheter
SE
unknown

DNS requests

Domain
IP
Reputation
mobile.realitykings.com
  • 66.254.114.234
unknown
inqueritosremunerados.pt
  • 35.214.148.111
unknown
enlisted.net
  • 172.67.14.1
  • 104.22.42.210
  • 104.22.43.210
whitelisted
app.myloft.xyz
  • 108.138.36.68
  • 108.138.36.43
  • 108.138.36.23
  • 108.138.36.39
unknown
account.xiaomi.com
  • 20.47.97.75
unknown
oficinavirtual.cvsa.com.ar
  • 181.209.30.141
unknown
business.sandiego.gov
unknown
sso.acesso.gov.br
  • 189.9.113.9
unknown
candidato.computrabajo.com.mx
  • 54.163.233.108
  • 52.7.27.34
unknown
ebs.ca-egypt.com
  • 196.13.253.13
unknown

Threats

PID
Process
Class
Message
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 274
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 234
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 192
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 676
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1632
9d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1080
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query For XXX Adult Site Top Level Domain
13 ETPRO signatures available at the full report
No debug info