File name:

HopToDesk.exe

Full analysis: https://app.any.run/tasks/b2efca46-1c5c-443d-a2a9-9c44e0fb2bcc
Verdict: Malicious activity
Analysis date: September 22, 2024, 20:13:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
websocket
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

243F169D0AD5DF663A03E7E4C0F5D0A6

SHA1:

4DFE9EEC714216ED6A3EF8538F78B1A5C0185C76

SHA256:

A76BA1D5BEEEF80F32C00F56096EC1FD5BD1F769E5B0D40CF26632FAA424C825

SSDEEP:

98304:XVZQMjDFInxY1oPBbn9Lix8kQYP/T1XZzcndWOeNpr/6V47sJ/V/qi1T+o3CQZKt:ilE53covHu8B5i6pbwrF8b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • HopToDesk.exe (PID: 5512)
      • HopToDesk.exe (PID: 4772)
    • Suspicious use of NETSH.EXE

      • HopToDesk.exe (PID: 5512)
    • Application launched itself

      • HopToDesk.exe (PID: 5512)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • HopToDesk.exe (PID: 4772)
    • Executable content was dropped or overwritten

      • HopToDesk.exe (PID: 5512)
    • The process checks if it is being run in the virtual environment

      • HopToDesk.exe (PID: 5512)
    • Connects to unusual port

      • HopToDesk.exe (PID: 5512)
  • INFO

    • The process uses the downloaded file

      • HopToDesk.exe (PID: 5512)
      • HopToDesk.exe (PID: 4772)
    • Checks supported languages

      • HopToDesk.exe (PID: 5512)
      • HopToDesk.exe (PID: 4772)
    • Process checks computer location settings

      • HopToDesk.exe (PID: 5512)
      • HopToDesk.exe (PID: 4772)
    • Reads the computer name

      • HopToDesk.exe (PID: 5512)
      • HopToDesk.exe (PID: 4772)
    • Creates files or folders in the user directory

      • HopToDesk.exe (PID: 5512)
    • Create files in a temporary directory

      • HopToDesk.exe (PID: 5512)
    • Checks proxy server information

      • HopToDesk.exe (PID: 5512)
    • Reads the software policy settings

      • HopToDesk.exe (PID: 5512)
    • Reads the machine GUID from the registry

      • HopToDesk.exe (PID: 5512)
    • UPX packer has been detected

      • HopToDesk.exe (PID: 5512)
    • Attempting to connect via WebSocket

      • HopToDesk.exe (PID: 5512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (76)
.exe | Win32 Executable (generic) (12.6)
.exe | Generic Win/DOS Executable (5.6)
.exe | DOS Executable Generic (5.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:02 15:50:56+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.36
CodeSize: 7114752
InitializedDataSize: 24576
UninitializedDataSize: 10522624
EntryPoint: 0x10d24f0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.42.4.0
ProductVersionNumber: 1.42.4.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Begonia Holdings
ProductVersion: 1.42.4
LegalCopyright: Copyright © 2024 Begonia Holdings. Copyright © 2024 Purslane Ltd.
FileVersion: 1.42.4
ProductName: HopToDesk
FileDescription: HopToDesk
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT hoptodesk.exe netsh.exe no specs conhost.exe no specs hoptodesk.exe netsh.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1092\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1184\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1420"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="HopToDesk" dir=in action=allow program="C:\Users\admin\Desktop\HopToDesk.exe" enable=yesC:\Windows\SysWOW64\netsh.exeHopToDesk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4772"C:\Users\admin\Desktop\HopToDesk.exe" --fwC:\Users\admin\Desktop\HopToDesk.exe
HopToDesk.exe
User:
admin
Company:
Begonia Holdings
Integrity Level:
HIGH
Description:
HopToDesk
Exit code:
0
Version:
1.42.4
Modules
Images
c:\users\admin\desktop\hoptodesk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5512"C:\Users\admin\Desktop\HopToDesk.exe" C:\Users\admin\Desktop\HopToDesk.exe
explorer.exe
User:
admin
Company:
Begonia Holdings
Integrity Level:
MEDIUM
Description:
HopToDesk
Version:
1.42.4
Modules
Images
c:\users\admin\desktop\hoptodesk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6236"netsh" advfirewall firewall show rule name= HopToDesk verboseC:\Windows\SysWOW64\netsh.exeHopToDesk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
5 496
Read events
5 494
Write events
2
Delete events
0

Modification events

(PID) Process:(5512) HopToDesk.exeKey:HKEY_CLASSES_ROOT\HopToDesk
Operation:writeName:URL Protocol
Value:
(PID) Process:(4772) HopToDesk.exeKey:HKEY_CLASSES_ROOT\HopToDesk
Operation:writeName:URL Protocol
Value:
Executable files
1
Suspicious files
0
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk2.5512_ThreadId(15)_1727036021256559000text
MD5:39F8274E85048852165A0EBAEA3C42D5
SHA256:52532E0088DF73D9E0A8E772D13140B7E8EA952AC0762A59A8A88EDBBE64600E
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk.5512_ThreadId(15)_1727036021259934800text
MD5:4DEAD07539BF8180BBCE10F020753509
SHA256:07534FDA1791B99D024475AD395B7A8B0EF91EEF5C8E12613A65240B011EE4B4
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk.tomltext
MD5:A92E72ED1892EE948682244C6FC9E691
SHA256:1511423187001C29F74860F2D43951FB46970494F30BF64A30387CEF516EA064
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk2.tomltext
MD5:72A1676591A9B4C89CD3EAB7DC32C87F
SHA256:765574D3E8B6C0215BFC8AD81F1929C3A9D3AF1B5D0E030B92E7B15BF9D0C662
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk.5512_ThreadId(18)_1727036021617247000text
MD5:41E5A8B747FC06ED084F2C5AA6779A8C
SHA256:BD18678D719939E5B8ECA9DD221570826C8A6E147ACBD653ACA2E0CC6B130F94
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk2.5512_ThreadId(1)_1727036012344140000text
MD5:72A1676591A9B4C89CD3EAB7DC32C87F
SHA256:765574D3E8B6C0215BFC8AD81F1929C3A9D3AF1B5D0E030B92E7B15BF9D0C662
5512HopToDesk.exeC:\Users\admin\AppData\Local\Temp\sciter.dllexecutable
MD5:FC2311CA280C197F5ED16DEF6D464B6B
SHA256:285F3E6A051A7C61845CD7E4D2120781B6BDF411239F70A85C65B38A52D38F28
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk.5512_ThreadId(17)_1727036012607726600text
MD5:A92E72ED1892EE948682244C6FC9E691
SHA256:1511423187001C29F74860F2D43951FB46970494F30BF64A30387CEF516EA064
5512HopToDesk.exeC:\Users\admin\AppData\Roaming\HopToDesk\config\HopToDesk.5512_ThreadId(15)_1727036021262140400text
MD5:9CCDD5252EC4E17EB4295A3EE6CAE744
SHA256:FC088B2214E2A7095477C94968AAD0452ED7E58E85EFE7181E222EDA18D1F6F7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
32
DNS requests
6
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1084
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5512
HopToDesk.exe
GET
101
45.77.249.125:80
http://signal.hoptodesk.com:80/?user=302627370
unknown
unknown
5512
HopToDesk.exe
GET
101
45.77.249.125:80
http://signal.hoptodesk.com:80/?user=302627370
unknown
unknown
5512
HopToDesk.exe
GET
101
45.77.249.125:80
http://signal.hoptodesk.com:80/?user=302627370
unknown
unknown
5512
HopToDesk.exe
GET
101
45.77.249.125:80
http://signal.hoptodesk.com:80/?user=302627370
unknown
unknown
5512
HopToDesk.exe
GET
101
45.77.249.125:80
http://signal.hoptodesk.com:80/?user=302627370
unknown
unknown
GET
200
188.114.97.3:443
https://api.hoptodesk.com/
unknown
binary
845 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6900
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1084
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5512
HopToDesk.exe
188.114.96.3:443
api.hoptodesk.com
CLOUDFLARENET
NL
unknown
4324
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.74.206
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
api.hoptodesk.com
  • 188.114.96.3
  • 188.114.97.3
unknown
turn.hoptodesk.com
  • 45.76.236.44
unknown
signal.hoptodesk.com
  • 45.77.249.125
unknown

Threats

PID
Process
Class
Message
5512
HopToDesk.exe
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
5512
HopToDesk.exe
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
5512
HopToDesk.exe
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
5512
HopToDesk.exe
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
5512
HopToDesk.exe
Not Suspicious Traffic
INFO [ANY.RUN] Websocket Upgrade Request
No debug info