File name:

PowerRun.exe

Full analysis: https://app.any.run/tasks/d81e873b-4d17-4bbb-9a70-05f7d168ebc8
Verdict: Malicious activity
Analysis date: December 22, 2024, 07:16:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
MD5:

FC1FB033D57F72089FB4762245A8B18D

SHA1:

7EC0F7CA5F0E0D20E5372BF69865D0A809E6CC8E

SHA256:

A6FA768C4964C328C748558627C20C2BA455E589A1B87CFA3911D197DA1688D2

SSDEEP:

24576:g2DW/xbWX2YIb3Qsu3/PNL3Q7HybtTpAA+c:g2EaXSQsW/PNjQLY9ARc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • PowerRun.exe (PID: 6764)
      • PowerRun.exe (PID: 6684)
      • PowerRun.exe (PID: 6824)
    • Starts CMD.EXE for commands execution

      • PowerRun.exe (PID: 6904)
    • Reads the date of Windows installation

      • PowerRun.exe (PID: 6904)
    • Identifying current user with WHOAMI command

      • cmd.exe (PID: 6284)
    • Reads security settings of Internet Explorer

      • PowerRun.exe (PID: 6904)
  • INFO

    • Reads the computer name

      • PowerRun.exe (PID: 6684)
      • PowerRun.exe (PID: 6764)
      • PowerRun.exe (PID: 6824)
      • PowerRun.exe (PID: 6904)
    • Create files in a temporary directory

      • PowerRun.exe (PID: 6684)
      • PowerRun.exe (PID: 6764)
    • Checks supported languages

      • PowerRun.exe (PID: 6684)
      • PowerRun.exe (PID: 6764)
      • PowerRun.exe (PID: 6824)
      • PowerRun.exe (PID: 6904)
    • The sample compiled with english language support

      • PowerRun.exe (PID: 6684)
    • Reads mouse settings

      • PowerRun.exe (PID: 6684)
      • PowerRun.exe (PID: 6764)
      • PowerRun.exe (PID: 6824)
      • PowerRun.exe (PID: 6904)
    • Checks operating system version

      • PowerRun.exe (PID: 6904)
    • The process uses AutoIt

      • PowerRun.exe (PID: 6904)
      • PowerRun.exe (PID: 6684)
    • The process uses the downloaded file

      • PowerRun.exe (PID: 6904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2010:04:16 07:47:52+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware
PEType: PE32+
LinkerVersion: 9
CodeSize: 613376
InitializedDataSize: 150016
UninitializedDataSize: -
EntryPoint: 0x1d47c
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 1.6.0.0
ProductVersionNumber: 1.6.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 1.6.0.0
Comments: PowerRun v1.6
FileDescription: PowerRun
ProductVersion: 1.6.0.0
OriginalFileName: PowerRun.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
10
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powerrun.exe powerrun.exe no specs powerrun.exe powerrun.exe no specs cmd.exe no specs conhost.exe no specs whoami.exe no specs ucpdmgr.exe no specs conhost.exe no specs powerrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1476"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1804whoamiC:\Windows\System32\whoami.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
whoami - displays logged on user information
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\whoami.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3552\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6284"C:\WINDOWS\System32\cmd.exe" /k ver & echo Hi world!C:\Windows\System32\cmd.exePowerRun.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
6420"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" C:\Users\admin\AppData\Local\Temp\PowerRun.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
PowerRun
Exit code:
3221226540
Version:
1.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
6540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6684"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" C:\Users\admin\AppData\Local\Temp\PowerRun.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
PowerRun
Version:
1.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
6764"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /P:393892C:\Users\admin\AppData\Local\Temp\PowerRun.exePowerRun.exe
User:
admin
Integrity Level:
HIGH
Description:
PowerRun
Exit code:
0
Version:
1.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
6824"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /P:393892C:\Users\admin\AppData\Local\Temp\PowerRun.exe
PowerRun.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Description:
PowerRun
Exit code:
0
Version:
1.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wsock32.dll
6904"C:\Users\admin\AppData\Local\Temp\PowerRun.exe" /TI/ /P:393892C:\Users\admin\AppData\Local\Temp\PowerRun.exePowerRun.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Description:
PowerRun
Version:
1.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\powerrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
463
Read events
463
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
12
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6824PowerRun.exeC:\Windows\Temp\aut598F.tmpbinary
MD5:96C0E61F3298CB745B021F67E7DD0D48
SHA256:3E56C22A81AB1168036A289C7FFE2889DD678C422568DFF9EF91D6A0F9005333
6824PowerRun.exeC:\Windows\Temp\6k8l2m4a.tmptext
MD5:C4A0B1C4C83D910878D79C3DA7984656
SHA256:D5BCD5588193F828F4041F1B49AAE7C1D7872384EAAAA0BA0B73E14F950BC134
6684PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut5624.tmpbinary
MD5:96C0E61F3298CB745B021F67E7DD0D48
SHA256:3E56C22A81AB1168036A289C7FFE2889DD678C422568DFF9EF91D6A0F9005333
6904PowerRun.exeC:\Windows\Temp\6k9l0m4a.tmptext
MD5:C4A0B1C4C83D910878D79C3DA7984656
SHA256:D5BCD5588193F828F4041F1B49AAE7C1D7872384EAAAA0BA0B73E14F950BC134
6684PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut5603.tmpbinary
MD5:4A83DF1D945C2F5801ED59650D7460EB
SHA256:2D993BE76DFCF35F89B656B4DBC553E078D824974B482E56C6F76EAEA87731C8
6764PowerRun.exeC:\Users\admin\AppData\Local\Temp\6c7u6n4c.tmptext
MD5:C4A0B1C4C83D910878D79C3DA7984656
SHA256:D5BCD5588193F828F4041F1B49AAE7C1D7872384EAAAA0BA0B73E14F950BC134
6764PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut5827.tmpbinary
MD5:09CA17EB552722BD7004097F59B07518
SHA256:365C32C3C09228158AB5AAABFCF93CDFCD858BE0B2A00031D82AB03070F61A5B
6764PowerRun.exeC:\Users\admin\AppData\Local\Temp\aut5837.tmpbinary
MD5:96C0E61F3298CB745B021F67E7DD0D48
SHA256:3E56C22A81AB1168036A289C7FFE2889DD678C422568DFF9EF91D6A0F9005333
6824PowerRun.exeC:\Windows\Temp\aut597E.tmpbinary
MD5:09CA17EB552722BD7004097F59B07518
SHA256:365C32C3C09228158AB5AAABFCF93CDFCD858BE0B2A00031D82AB03070F61A5B
6904PowerRun.exeC:\Windows\Temp\aut5A39.tmpbinary
MD5:4A83DF1D945C2F5801ED59650D7460EB
SHA256:2D993BE76DFCF35F89B656B4DBC553E078D824974B482E56C6F76EAEA87731C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
48
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2356
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2356
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6616
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6240
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6616
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6240
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
2356
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2356
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.137:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.bing.com
  • 104.126.37.137
  • 104.126.37.139
  • 104.126.37.153
  • 104.126.37.155
  • 104.126.37.178
  • 104.126.37.171
  • 104.126.37.176
  • 104.126.37.144
  • 104.126.37.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.64
  • 40.126.31.67
  • 40.126.31.73
  • 20.190.159.23
  • 40.126.31.71
whitelisted
go.microsoft.com
  • 184.30.17.189
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

No threats detected
No debug info