File name:

PowerRun.exe

Full analysis: https://app.any.run/tasks/4c2083fa-556c-4785-883d-2061e52f6c36
Verdict: Malicious activity
Analysis date: November 21, 2024, 23:52:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

FE260DA05D0512B65EEC3E4CEC4EA17C

SHA1:

8915D023E9A5DFBBA722B6D9678CBAFE6A3B3630

SHA256:

9DD559318F745949F4B68015033866A5FF02AFEA3FCE22FCA28E5BC33DE40FC8

SSDEEP:

12288:xaWzgMg7v3qnCi9ErQohh0F4fCJ8lnyHQuxx/Mu6WptWkXa:gaHMv6CRrj3nyHQgx/gCAMa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • PowerRun.exe (PID: 3988)
      • PowerRun.exe (PID: 1512)
      • PowerRun.exe (PID: 3940)
  • INFO

    • Reads the computer name

      • PowerRun.exe (PID: 3988)
      • PowerRun.exe (PID: 1512)
      • PowerRun.exe (PID: 3940)
      • PowerRun.exe (PID: 5920)
    • Reads mouse settings

      • PowerRun.exe (PID: 3988)
      • PowerRun.exe (PID: 1512)
      • PowerRun.exe (PID: 3940)
      • PowerRun.exe (PID: 5920)
    • Checks supported languages

      • PowerRun.exe (PID: 3988)
      • PowerRun.exe (PID: 1512)
      • PowerRun.exe (PID: 3940)
      • PowerRun.exe (PID: 5920)
    • Create files in a temporary directory

      • PowerRun.exe (PID: 3988)
      • PowerRun.exe (PID: 1512)
    • The process uses AutoIt

      • PowerRun.exe (PID: 3988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:16 07:47:33+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 524800
InitializedDataSize: 143872
UninitializedDataSize: -
EntryPoint: 0x16310
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.4.0.0
ProductVersionNumber: 1.4.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 1.4.0.0
Comments: PowerRun v1.4
FileDescription: PowerRun v1.4
LegalCopyright: Copyright © 2016-2020 www.sordum.org All Rights Reserved.
CompanyName: www.sordum.org
Coder: By BlueLife
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powerrun.exe powerrun.exe no specs powerrun.exe powerrun.exe no specs powerrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /P:589896C:\Users\admin\AppData\Local\Temp\PowerRun.exePowerRun.exe
User:
admin
Company:
www.sordum.org
Integrity Level:
HIGH
Description:
PowerRun v1.4
Exit code:
0
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
3940"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /P:589896C:\Users\admin\AppData\Local\Temp\PowerRun.exe
PowerRun.exe
User:
SYSTEM
Company:
www.sordum.org
Integrity Level:
SYSTEM
Description:
PowerRun v1.4
Exit code:
0
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
3988"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" C:\Users\admin\AppData\Local\Temp\PowerRun.exe
explorer.exe
User:
admin
Company:
www.sordum.org
Integrity Level:
HIGH
Description:
PowerRun v1.4
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
5292"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" C:\Users\admin\AppData\Local\Temp\PowerRun.exeexplorer.exe
User:
admin
Company:
www.sordum.org
Integrity Level:
MEDIUM
Description:
PowerRun v1.4
Exit code:
3221226540
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5920"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /TI/ /P:589896C:\Users\admin\AppData\Local\Temp\PowerRun.exePowerRun.exe
User:
SYSTEM
Company:
www.sordum.org
Integrity Level:
SYSTEM
Description:
PowerRun v1.4
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
Total events
199
Read events
199
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3988PowerRun.exeC:\Users\admin\AppData\Local\Temp\xvahsustext
MD5:2CC29BE38BD5A1E14386C7186A7F6959
SHA256:1F8A85D2720B2CBEEADFB92AC471A3902C128F13CF04E0D59BBFF54F786943A0
1512PowerRun.exeC:\Users\admin\AppData\Local\Temp\ljimpzstext
MD5:2CC29BE38BD5A1E14386C7186A7F6959
SHA256:1F8A85D2720B2CBEEADFB92AC471A3902C128F13CF04E0D59BBFF54F786943A0
1512PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut9BAF.tmpbinary
MD5:D5C0165D31FB3813F8646555A5758881
SHA256:6916A5D078C6DAF3DB977AE55853CC4EEF93E24328C8E8EF955220D10C7052B9
3940PowerRun.exeC:\Windows\Temp\vvheejhtext
MD5:2CC29BE38BD5A1E14386C7186A7F6959
SHA256:1F8A85D2720B2CBEEADFB92AC471A3902C128F13CF04E0D59BBFF54F786943A0
3940PowerRun.exeC:\Windows\Temp\aut9D07.tmpbinary
MD5:D5C0165D31FB3813F8646555A5758881
SHA256:6916A5D078C6DAF3DB977AE55853CC4EEF93E24328C8E8EF955220D10C7052B9
3988PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut98FF.tmpbinary
MD5:D5C0165D31FB3813F8646555A5758881
SHA256:6916A5D078C6DAF3DB977AE55853CC4EEF93E24328C8E8EF955220D10C7052B9
3988PowerRun.exeC:\Users\admin\AppData\Local\Temp\PowerRun.initext
MD5:9EB92F742A3C0407872519A00FFC3DCB
SHA256:517D1F85EF84F30FD6FFDBDA45B543C54A2E716697E0F0DD425ABAB01E9D9F91
5920PowerRun.exeC:\Windows\Temp\svjktittext
MD5:2CC29BE38BD5A1E14386C7186A7F6959
SHA256:1F8A85D2720B2CBEEADFB92AC471A3902C128F13CF04E0D59BBFF54F786943A0
5920PowerRun.exeC:\Windows\Temp\aut9DD2.tmpbinary
MD5:D5C0165D31FB3813F8646555A5758881
SHA256:6916A5D078C6DAF3DB977AE55853CC4EEF93E24328C8E8EF955220D10C7052B9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
22
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4932
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1176
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
EDGECAST
US
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
40.69.42.241:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.20
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.68
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted

Threats

No threats detected
No debug info