File name:

Run First.exe

Full analysis: https://app.any.run/tasks/c39d40e3-1fa9-4703-adf6-dde8bf137cdc
Verdict: Malicious activity
Analysis date: September 06, 2024, 08:21:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
autoit
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

AC2E682082E19B5FD7EFBA98FCBF710C

SHA1:

1BCBACD3EE4725825BA032840754D6D981B96A8D

SHA256:

A1AF27BCEE8833A12B16596200F39743AE016925CCFB348511468509F9B8DD80

SSDEEP:

49152:gPPkzemqoSut3Jh4+QQ/btosJwIA4hHmZlKH2Tw/Pq83zw0bCjvk9G661QGtFUhJ:CP/mp7t3T4+B/btosJwIA4hHmZlKH2TC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • Run First.exe (PID: 6296)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5712)
    • Connects to the CnC server

      • Run First.exe (PID: 6296)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Run First.exe (PID: 6296)
    • Checks Windows Trust Settings

      • Run First.exe (PID: 6296)
    • Creates files in the driver directory

      • Run First.exe (PID: 6296)
    • Starts POWERSHELL.EXE for commands execution

      • Run First.exe (PID: 6296)
    • Potential Corporate Privacy Violation

      • Run First.exe (PID: 6296)
    • Adds/modifies Windows certificates

      • powershell.exe (PID: 5712)
    • Contacting a server suspected of hosting an CnC

      • Run First.exe (PID: 6296)
  • INFO

    • Reads mouse settings

      • Run First.exe (PID: 6296)
    • Checks supported languages

      • Run First.exe (PID: 6296)
    • Checks proxy server information

      • Run First.exe (PID: 6296)
    • Reads the computer name

      • Run First.exe (PID: 6296)
    • Reads the machine GUID from the registry

      • Run First.exe (PID: 6296)
    • Reads the software policy settings

      • Run First.exe (PID: 6296)
    • Creates files or folders in the user directory

      • Run First.exe (PID: 6296)
    • The process uses the downloaded file

      • Run First.exe (PID: 6296)
      • powershell.exe (PID: 5712)
    • Process checks computer location settings

      • Run First.exe (PID: 6296)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:13 05:12:32+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 633856
InitializedDataSize: 346112
UninitializedDataSize: -
EntryPoint: 0x20577
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start run first.exe powershell.exe no specs conhost.exe no specs run first.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5088"C:\Users\admin\AppData\Local\Temp\Run First.exe" C:\Users\admin\AppData\Local\Temp\Run First.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\run first.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5712"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Import-Certificate -FilePath 'C:\WINDOWS\server.crt' -CertStoreLocation 'Cert:\LocalMachine\Root' -ErrorAction SilentlyContinue"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRun First.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5720\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6296"C:\Users\admin\AppData\Local\Temp\Run First.exe" C:\Users\admin\AppData\Local\Temp\Run First.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\run first.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
Total events
9 725
Read events
9 720
Write events
4
Delete events
1

Modification events

(PID) Process:(6296) Run First.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6296) Run First.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6296) Run First.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5712) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates
Operation:delete valueName:A51DCDDB5E97B942DBBCDA7919C1087E1AD223B7
Value:
(PID) Process:(5712) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A51DCDDB5E97B942DBBCDA7919C1087E1AD223B7
Operation:writeName:Blob
Value:
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
Executable files
0
Suspicious files
2
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
6296Run First.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419der
MD5:9BE050E5B2B04D6C31EBF6BF367FE03F
SHA256:456C6C5FDFF0BDE62E5D9CB4660EE71C6FD717CDB8FFA39FD1F792AD2C7F8C2D
6296Run First.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\server[1].certext
MD5:45E50BE2CFDBF4AC8A2D6EC155DC3437
SHA256:BA4B3E9F8889D56221E84D2CE4C7B7020D98273046040374D5DBC29FE4E8D5D3
5712powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_yf54thci.pch.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5712powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:8C2DA93369E72AA393BCF9D95629A223
SHA256:A358A3C25CEBE93B41B6B7449CADA00CCE83ACF56693F2047767905CF1B18DB8
5712powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dvwlnc4y.ynw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6296Run First.exeC:\Windows\server.crttext
MD5:45E50BE2CFDBF4AC8A2D6EC155DC3437
SHA256:BA4B3E9F8889D56221E84D2CE4C7B7020D98273046040374D5DBC29FE4E8D5D3
5712powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fmr0i1h3.4ak.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5712powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vkhwgbhb.tru.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6296Run First.exeC:\Windows\System32\drivers\etc\hoststext
MD5:6BE20196783D7738BC8E8E210F623B78
SHA256:9BC21797521470D23F3D8575AE8F4D5CCD8E6E621820117C4284E4868B5F7D2F
6296Run First.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\hahhahahahahahahahahahahahahahhahahahahahahahahahahahahahahahahahhahahha[1].txttext
MD5:E3AF3C947A7DCE7E645877B28B15F5D7
SHA256:B8CEB073F5B892427B261C82C703803223AA86860A503508E479C5576C1BA8B5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
36
DNS requests
16
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6296
Run First.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D
unknown
whitelisted
368
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6908
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6192
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6296
Run First.exe
GET
200
3.110.147.233:80
http://3.110.147.233/server.crt
unknown
unknown
368
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6192
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1356
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6296
Run First.exe
185.199.110.133:443
raw.githubusercontent.com
FASTLY
US
shared
6296
Run First.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6296
Run First.exe
3.110.147.233:80
AMAZON-02
IN
unknown
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6908
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6908
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.206
whitelisted
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
shared
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.23
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.4
  • 20.190.159.75
whitelisted
www.microsoft.com
  • 23.32.185.131
  • 184.30.21.171
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
6296
Run First.exe
Potential Corporate Privacy Violation
ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
1 ETPRO signatures available at the full report
No debug info