File name:

ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe

Full analysis: https://app.any.run/tasks/fac4797a-d61f-4ad9-aca6-a04bc115e330
Verdict: Malicious activity
Analysis date: October 25, 2024, 03:44:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

28FB067607E607B40E043ECE00E42B56

SHA1:

3993AD9DBEC8DE6AE6E281EE2148A028E843E448

SHA256:

AA6F678474EDBCBCA8FCBCEF028E51DB003443636E693F6D2909FC46D2B2A34C

SSDEEP:

98304:bfH2RQU/DlhDqMeFBxUC4v8VpVb7j61ClCXeerr3GZ5ATaI+sstnX1Ljz3Aa8x51:4WPzc3gWMRhOb5b5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads security settings of Internet Explorer

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Checks Windows Trust Settings

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
  • INFO

    • Creates files in the program directory

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Checks supported languages

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads product name

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads Environment values

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Checks proxy server information

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads the computer name

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Creates files or folders in the user directory

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • UPX packer has been detected

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads the machine GUID from the registry

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
    • Reads the software policy settings

      • ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe (PID: 6780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (43.5)
.exe | Win32 EXE Yoda's Crypter (42.7)
.exe | Win32 Executable (generic) (7.2)
.exe | Generic Win/DOS Executable (3.2)
.exe | DOS Executable Generic (3.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:01 06:16:54+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.38
CodeSize: 6918144
InitializedDataSize: 167936
UninitializedDataSize: 4005888
EntryPoint: 0xa6bb10
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.9.0.4
ProductVersionNumber: 11.9.0.4
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Richmedia
FileDescription: iSpring Suite
FileVersion: 11.9.0.4
LegalCopyright: © 2001-2024 ООО «Ричмедиа». Все права защищены.
ProductName: iSpring Mini Installer
ProductVersion: 11.9.0.4
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe

Process information

PID
CMD
Path
Indicators
Parent process
6780"C:\Users\admin\AppData\Local\Temp\ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe" C:\Users\admin\AppData\Local\Temp\ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe
explorer.exe
User:
admin
Company:
Richmedia
Integrity Level:
MEDIUM
Description:
iSpring Suite
Version:
11.9.0.4
Modules
Images
c:\users\admin\appdata\local\temp\ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
560
Read events
550
Write events
10
Delete events
0

Modification events

(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\iSpring Solutions\iSpring Solutions
Operation:writeName:Registration Data
Value:
7M1bXVoNFzjUdC6nVvXzDFpj3xxzLUDpIP1S6x4vDV8qUNCd957F8OAr24OZYuOpKrdlAOUO22VzQMVT/YkEyfngT1ZfXxeeNXR+F0/OaXgXR674QmaRrntrCmQjncbZ
(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\iSpring Solutions\iSpring Suite 8
Operation:writeName:Registration Data Ru
Value:
Td8u7iWftbFu+i3pK9g33MUtHBffDiRdpeGl9ojGx8apM1BGHqtNN9eSZEbFHkfV6ITe41Z89EKjjiOl+oSTF2YEaZzsV/dm2EAY4CYstR3EcXhpwlocXTCMaA43yRCt
(PID) Process:(6780) ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeKey:HKEY_CURRENT_USER\SOFTWARE\iSpring Solutions\iSpring Suite 11
Operation:writeName:WasActivated
Value:
0
Executable files
0
Suspicious files
3
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\ProgramData:iSpring Suite 8 Rutext
MD5:42C56ADCC7122C56643C1C949CD655D3
SHA256:9DC862A7AE21EB9418CCF9AAB2E7A2B0243FA0B8F21AC48ECF7EA643425E0F28
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\ProgramData\d1145183d40fcedf39962d86effe70dfb0a9ccb0text
MD5:42C56ADCC7122C56643C1C949CD655D3
SHA256:9DC862A7AE21EB9418CCF9AAB2E7A2B0243FA0B8F21AC48ECF7EA643425E0F28
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\ProgramData\ecf00c38dc807e105d881c433a6b455dd2c606b6text
MD5:88D0C8353E02AF84ECD2409DD9A79E6B
SHA256:01104B31CDBC8C1BBBEBA68FA2A9F2C6067FEC31481EF4ED32F275C603BFBD62
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\Roaming\ecf00c38dc807e105d881c433a6b455dd2c606b6text
MD5:88D0C8353E02AF84ECD2409DD9A79E6B
SHA256:01104B31CDBC8C1BBBEBA68FA2A9F2C6067FEC31481EF4ED32F275C603BFBD62
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\Roaming:iSpring Solutionstext
MD5:88D0C8353E02AF84ECD2409DD9A79E6B
SHA256:01104B31CDBC8C1BBBEBA68FA2A9F2C6067FEC31481EF4ED32F275C603BFBD62
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\ProgramData:iSpring Solutionstext
MD5:88D0C8353E02AF84ECD2409DD9A79E6B
SHA256:01104B31CDBC8C1BBBEBA68FA2A9F2C6067FEC31481EF4ED32F275C603BFBD62
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\841EA1E1183CE127CFF9E271E9C42599der
MD5:52EFC1034A7877D86407D31F54CA4648
SHA256:014FACCE6B7A3F72043FCB10783E81C99A7EC4F4B2A2AAD243A699137010C8B0
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\Roaming\d1145183d40fcedf39962d86effe70dfb0a9ccb0text
MD5:42C56ADCC7122C56643C1C949CD655D3
SHA256:9DC862A7AE21EB9418CCF9AAB2E7A2B0243FA0B8F21AC48ECF7EA643425E0F28
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\Roaming:iSpring Suite 8 Rutext
MD5:42C56ADCC7122C56643C1C949CD655D3
SHA256:9DC862A7AE21EB9418CCF9AAB2E7A2B0243FA0B8F21AC48ECF7EA643425E0F28
6780ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\841EA1E1183CE127CFF9E271E9C42599binary
MD5:C1D77712F3A6EB61F2ED36D4C083D8F6
SHA256:268F0CF2F10C99C9BFE92B369FA70F83B2CB97359BEBEB2B2E5D428C79E7C684
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
56
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6780
ispring_suite_ru_11_9_0_1203244_1067588440.1583919555.exe
GET
200
184.24.77.54:80
http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgQaJnBs69Nsryl9FlN5iPK3bg%3D%3D
unknown
whitelisted
6408
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2076
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5564
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6408
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4360
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.136
  • 104.126.37.144
  • 104.126.37.153
  • 104.126.37.161
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.ispring.ru
  • 109.238.90.182
whitelisted
r11.o.lencr.org
  • 184.24.77.54
  • 184.24.77.48
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.64
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.73
whitelisted
th.bing.com
  • 104.126.37.153
  • 104.126.37.144
  • 104.126.37.161
  • 104.126.37.136
  • 104.126.37.155
whitelisted

Threats

No threats detected
No debug info