File name:

DHL Delayed Delivery.exe

Full analysis: https://app.any.run/tasks/c78272de-02db-44a5-8752-47b5d5e6bc06
Verdict: Suspicious activity
Analysis date: July 30, 2019, 04:58:33
OS: Windows 10 Professional (build: 16299, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

54A7BB1AA43E5085CA622CEED233DA8C

SHA1:

FBA46AFF11653B08A6C7502DA23C53CB09FCF45B

SHA256:

A80C3D7574EF8FF681C40F8C0129CC192F339E887D536D1D915019B664E5F687

SSDEEP:

12288:2VObOcVp2clQjstK6inY/pfB7MKlPuglBmnooRftpJ:wcr2clQlg/T7MKJdmnoo/pJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • DHL Delayed Delivery.exe (PID: 916)
  • SUSPICIOUS

    • Creates files in the user directory

      • DHL Delayed Delivery.exe (PID: 916)
    • Reads Environment values

      • WerFault.exe (PID: 2960)
    • Creates files in the program directory

      • WerFault.exe (PID: 2960)
    • Executable content was dropped or overwritten

      • DHL Delayed Delivery.exe (PID: 916)
  • INFO

    • Application was crashed

      • DHL Delayed Delivery.exe (PID: 916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:06:13 12:29:35+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 210944
InitializedDataSize: 289792
UninitializedDataSize: -
EntryPoint: 0x356e6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 13-Jun-2019 10:29:35
Detected languages:
  • English - United States
  • German - Germany

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 13-Jun-2019 10:29:35
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x000336FC
0x00033800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.1409
.rsrc
0x00036000
0x00046930
0x00046A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.4807
.reloc
0x0007E000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
0
1.51664
20
Latin 1 / Western European
English - United States
RT_GROUP_ICON
1
7.97419
23091
Latin 1 / Western European
English - United States
RT_ICON
115
7.41361
265728
Latin 1 / Western European
German - Germany
RT_HTML

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
2
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start dhl delayed delivery.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
916"C:\Users\admin\Desktop\DHL Delayed Delivery.exe" C:\Users\admin\Desktop\DHL Delayed Delivery.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3762504530
Modules
Images
c:\users\admin\desktop\dhl delayed delivery.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2960C:\WINDOWS\system32\WerFault.exe -u -p 916 -s 9696C:\WINDOWS\system32\WerFault.exeDHL Delayed Delivery.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.16299.15 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\wer.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\combase.dll
Total events
150
Read events
113
Write events
37
Delete events
0

Modification events

(PID) Process:(916) DHL Delayed Delivery.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:startupname
Value:
C:\Users\admin\AppData\Roaming\filename.exe
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile
Operation:writeName:ProviderSyncId
Value:
{22b1115c-733a-4c56-978f-7579a80bf34b}
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:ProgramId
Value:
0006c1c5247488840eff3219ef302af9cc530000ffff
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:FileId
Value:
0000fba46aff11653b08a6c7502da23c53cb09fcf45b
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:LowerCaseLongPath
Value:
c:\users\admin\desktop\dhl delayed delivery.exe
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:LongPathHash
Value:
dhl delayed deli|42b4fa58
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:Name
Value:
dhl delayed delivery.exe
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:Publisher
Value:
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:Version
Value:
(PID) Process:(2960) WerFault.exeKey:\REGISTRY\A\{e134eb41-29ff-3894-5404-473f93150a09}\Root\InventoryApplicationFile\dhl delayed deli|42b4fa58
Operation:writeName:BinFileVersion
Value:
Executable files
1
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
2960WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\DHL Delayed Delivery.exe.916.dmp
MD5:
SHA256:
916DHL Delayed Delivery.exeC:\Users\admin\AppData\Roaming\filename.exeexecutable
MD5:
SHA256:
2960WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6DE6.tmp.WERInternalMetadata.xmlxml
MD5:
SHA256:
2960WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6B93.tmp.dmpdmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
5
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1628
svchost.exe
GET
200
2.21.41.70:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
FR
der
813 b
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
der
824 b
whitelisted
POST
200
40.90.23.227:443
https://login.live.com/RST2.srf
US
xml
11.2 Kb
whitelisted
POST
200
40.90.23.227:443
https://login.live.com/RST2.srf
US
xml
9.85 Kb
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
der
555 b
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
der
555 b
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
unknown
der
550 b
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
der
1.11 Kb
whitelisted
1628
svchost.exe
GET
200
2.21.41.70:80
http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl
FR
der
564 b
whitelisted
1628
svchost.exe
GET
200
2.16.186.74:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
der
781 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.90.23.227:443
login.live.com
Microsoft Corporation
US
unknown
1628
svchost.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1628
svchost.exe
2.16.186.74:80
crl.microsoft.com
Akamai International B.V.
whitelisted
1628
svchost.exe
2.21.41.70:80
www.microsoft.com
GTT Communications Inc.
FR
malicious

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.90.23.227
  • 40.90.137.120
  • 40.90.23.220
whitelisted
self.events.data.microsoft.com
  • 52.114.88.28
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl.microsoft.com
  • 2.16.186.74
  • 2.16.186.120
whitelisted
www.microsoft.com
  • 2.21.41.70
whitelisted
nexusrules.officeapps.live.com
  • 52.109.12.20
whitelisted

Threats

No threats detected
Process
Message
DHL Delayed Delivery.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
DHL Delayed Delivery.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
DHL Delayed Delivery.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
DHL Delayed Delivery.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
DHL Delayed Delivery.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
DHL Delayed Delivery.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
DHL Delayed Delivery.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
DHL Delayed Delivery.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278