File name:

a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe

Full analysis: https://app.any.run/tasks/b2d12568-5daf-4df9-8f78-c2070daee900
Verdict: Malicious activity
Analysis date: December 19, 2024, 01:23:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
sinkhole
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 14 sections
MD5:

6CCDFC62326C34CC2593ED95867C418F

SHA1:

88A8E133601F9A0B3F5EE56E18E8718D57C151D2

SHA256:

A4B36EC5A5DEF2A86FF298B3C367D7C3FDB4EA5E292F0C2935897ED9B6D63477

SSDEEP:

24576:lcuvqS6SyhsDfvBgM7Esy4K79Esy4KwKmuszLHwigEE7Esy4K7T57FkTHdCfF2/r:lcSX6SyhsDfvBgM7Esy4K79Esy4KwKmK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Changes the login/logoff helper path in the registry

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Request for a sinkholed resource

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
  • SUSPICIOUS

    • The process verifies whether the antivirus software is installed

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Reads the date of Windows installation

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Reads security settings of Internet Explorer

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • There is functionality for taking screenshot (YARA)

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Checks Windows Trust Settings

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Connects to unusual port

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Potential Corporate Privacy Violation

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • The process checks if it is being run in the virtual environment

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
  • INFO

    • Reads the computer name

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Checks supported languages

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Creates files or folders in the user directory

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Reads the machine GUID from the registry

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Checks proxy server information

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Create files in a temporary directory

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
    • Reads the software policy settings

      • a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe (PID: 6448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (39.5)
.exe | UPX compressed Win32 Executable (38.7)
.dll | Win32 Dynamic Link Library (generic) (9.4)
.exe | Win32 Executable (generic) (6.4)
.exe | Generic Win/DOS Executable (2.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:08:02 09:26:00+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 11264
InitializedDataSize: 366592
UninitializedDataSize: -
EntryPoint: 0x2b70
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6448"C:\Users\admin\Desktop\a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe" C:\Users\admin\Desktop\a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 523
Read events
3 517
Write events
5
Delete events
1

Modification events

(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:userinit
Value:
C:\Users\admin\Desktop\a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:userinit
Value:
C:\Windows\system32\userinit.exe,C:\Users\admin\Desktop\A4B36E~1.EXE,
(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft
Operation:delete valueName:D9486297a
Value:
(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6448) a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
112
Unknown types
0

Dropped files

PID
Process
Filename
Type
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Temp\66D6.tmphtml
MD5:EEEDC91C98E5942D312E0B20C2A52171
SHA256:0CA5FFD53143FFD0C1728D60FDD374C1F362404D55C6E90B971F6522AD5DEB2D
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Temp\6670.tmphtml
MD5:A66467B6616B44850B6BCABD39303FE9
SHA256:C35F4948794003DC27C37A9C284F9C604D9DB9FE73EAD25F0CCE240EF5CB27F6
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\login[1].htmhtml
MD5:2CB23BB6A3EECCC6C92F951CDF7E3ADD
SHA256:AA32FF6B9A7A856D46E803E2AEE9B6A8D22714264868C67E63A82B1050580D71
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Temp\83CB.tmphtml
MD5:3B03D93D3487806337B5C6443CE7A62D
SHA256:7392749832C70FCFC2D440D7AFC2F880000DD564930D95D634EB1199FA15DE30
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\login[3].htmhtml
MD5:3B03D93D3487806337B5C6443CE7A62D
SHA256:7392749832C70FCFC2D440D7AFC2F880000DD564930D95D634EB1199FA15DE30
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\login[3].htmhtml
MD5:7A5DF79FBAAFF2C161C6E29461785403
SHA256:B1C52A7C21C4B21BF69866D7859284068D6ECC90306FE22076F81DAA0176A7ED
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\login[4].htmhtml
MD5:E1F035B24CE0E8137682B703D19315B5
SHA256:117EA4F0F411E1AAEAB307C087A57678ABCBA7E6AA96A5BD1F2D5D7026D453A0
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Temp\845A.tmphtml
MD5:5C6FC9E3A93C92A32725FDAEC5F9F690
SHA256:D12A0F965B596A0F12CC0E26786D10588F45EE31950865E471621082B8C1ACDA
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Temp\898D.tmphtml
MD5:3B03D93D3487806337B5C6443CE7A62D
SHA256:7392749832C70FCFC2D440D7AFC2F880000DD564930D95D634EB1199FA15DE30
6448a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\login[1].htmhtml
MD5:4F8E702CC244EC5D4DE32740C0ECBD97
SHA256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
318
TCP/UDP connections
249
DNS requests
6 245
Threats
22

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
308
75.2.71.199:80
http://puzylyp.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
301
188.114.96.3:80
http://qegyhig.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
200
34.227.7.138:80
http://vonypom.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
200
3.94.10.34:80
http://lymyxid.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
404
208.100.26.245:80
http://lyvyxor.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
404
23.253.46.64:80
http://gahyqah.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
200
199.191.50.83:80
http://galyqaz.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
85.17.31.82:80
http://gatyfus.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
200
199.59.243.227:80
http://vojyqem.com/login.php
unknown
malicious
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
GET
200
44.221.84.105:80
http://vocyzit.com/login.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
4652
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1228
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
104.126.37.163:80
www.bing.com
Akamai International B.V.
DE
whitelisted
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
188.114.96.3:80
qegyhig.com
CLOUDFLARENET
NL
unknown
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
75.2.71.199:80
puzylyp.com
AMAZON-02
US
unknown
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
199.191.50.83:80
galyqaz.com
CONFLUENCE-NETWORK-INC
VG
unknown
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
34.227.7.138:80
vonypom.com
AMAZON-AES
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.bing.com
  • 104.126.37.163
  • 104.126.37.144
  • 104.126.37.145
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.176
whitelisted
lysynur.com
unknown
lyxylux.com
unknown
purydyv.com
unknown
lymysan.com
unknown
vonypom.com
  • 34.227.7.138
malicious
pujyjav.com
unknown
volyqat.com
unknown

Threats

PID
Process
Class
Message
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 2.
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 2.
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
6448
a4b36ec5a5def2a86ff298b3c367d7c3fdb4ea5e292f0c2935897ed9b6d63477.exe
A Network Trojan was detected
ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst
No debug info