File name:

McSkill.exe

Full analysis: https://app.any.run/tasks/1a644bf9-24b3-4791-8b44-9c3ffd7731c6
Verdict: Malicious activity
Analysis date: September 24, 2024, 10:32:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

72DD72B5BB40F6B3CF3E571E6973CCD4

SHA1:

9D4FC9F998D1E8AACA493FA465C6732C25940AEF

SHA256:

AA8FAF73D4BB12AE7742D09E8FEB04BB3B016A8724CED7846B6D87E562B9C423

SSDEEP:

196608:vGo/DiQS15aEXB4rlwDe5EXVXi/IYNvCXzAtJsv6tWKFdu9CEpVt:v01farlwDe6XVX5YNaXzcJsv6tWKFduh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • Executable content was dropped or overwritten

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • The process drops C-runtime libraries

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • Connects to unusual port

      • java.exe (PID: 7016)
  • INFO

    • Checks proxy server information

      • McSkill.exe (PID: 6320)
    • Creates files or folders in the user directory

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • Sends debugging messages

      • McSkill.exe (PID: 6320)
    • Reads the computer name

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • Checks supported languages

      • McSkill.exe (PID: 6320)
      • java.exe (PID: 7016)
    • Creates files in the program directory

      • java.exe (PID: 7016)
    • Create files in a temporary directory

      • java.exe (PID: 7016)
    • Reads the machine GUID from the registry

      • java.exe (PID: 7016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (83)
.exe | Win32 Executable (generic) (9)
.exe | Generic Win/DOS Executable (3.9)
.exe | DOS Executable Generic (3.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:02:08 09:19:31+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 7052800
InitializedDataSize: 4401664
UninitializedDataSize: -
EntryPoint: 0x67b858
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: -
FileDescription: -
FileVersion: 0.0.0.0
LegalCopyright: -
OriginalFileName: Starter.exe
ProductName: Starter
ProductVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mcskill.exe java.exe conhost.exe no specs icacls.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1848\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2424C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2572\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6320"C:\Users\admin\Downloads\McSkill.exe" C:\Users\admin\Downloads\McSkill.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\downloads\mcskill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\imm32.dll
7016C:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\java.exe -jar C:/Users/admin/AppData/Roaming/MCSkill/updates/Launcher.jarC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\java.exe
McSkill.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.2610.12
Modules
Images
c:\users\admin\appdata\roaming\mcskill\updates\jdk-win64\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
3 648
Read events
3 648
Write events
0
Delete events
0

Modification events

No data
Executable files
327
Suspicious files
538
Text files
214
Unknown types
68

Dropped files

PID
Process
Filename
Type
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\java64.zip
MD5:
SHA256:
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:944A33D971704FF815A6C90733D0A72E
SHA256:44822AE123A3D6C3A8BDF9A4D65A4DC89EB31004C72FCFCEFA1DC3A53FF3EAB0
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\Launcher.jarjava
MD5:E577BF8A69D6A7A632E33EFEA2E4BBA5
SHA256:31DE08397A5EE317F032FCB12E9ED04AE635798C63A89B3012DCF596891C1A87
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-console-l1-2-0.dllexecutable
MD5:7A55E51D07E1F15221EB11479ADBC53F
SHA256:F901B0BC8C00B3AFC80E151E6F54B18F7672F932602C304FBFEEDD5AA3AD63C8
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:F0C9C56F56FFA3ADC548173569DBD793
SHA256:12D801992BBB09D43BB90330BB96E77BF12E669C325DDA4B5235942221C301C8
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-localization-l1-2-0.dllexecutable
MD5:54D2F426BC91ECF321908D133B069B20
SHA256:646B28A20208BE68439D73EFA21BE59E12ED0A5FE9E63E5D3057CA7B84BC6641
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-namedpipe-l1-1-0.dllexecutable
MD5:DA29D8D5A978E12D07F930F402E14180
SHA256:84CEC1A1AAF344A93581B0F0C293623CD07652982A9F54F2FC879092512C4D92
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:02D669AFDABFE420598041B848B71158
SHA256:64A9AC181FD91B79270BF01759749394F57BE171436ED46F43D165325BB82067
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-libraryloader-l1-1-0.dllexecutable
MD5:2ACF6DB396A86E2BEF9D6DDF6919581F
SHA256:655BADE7FF61F01A803E7532082B14AE354442B0F65EF8164F824D0CFA033E6F
6320McSkill.exeC:\Users\admin\AppData\Roaming\MCSkill\updates\jdk-win64\bin\api-ms-win-core-processenvironment-l1-1-0.dllexecutable
MD5:D67863AB55EF2A9D195870C360CEAEB4
SHA256:C6E8472FFC639CCD9C07E7F6954DA9AE94779CB9A81ACB11ED3588CDCA1182B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
57
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5960
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3784
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3784
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6716
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6920
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4732
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.50.80.213:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
104.126.37.130:443
Akamai International B.V.
DE
unknown
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6320
McSkill.exe
51.83.239.114:443
upd.mcskill.net
OVH SAS
PL
unknown
5960
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 52.167.249.196
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 88.221.169.152
whitelisted
google.com
  • 142.250.185.238
whitelisted
upd.mcskill.net
  • 51.83.239.114
unknown
login.live.com
  • 40.126.32.136
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.140
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted
launcher.mcskill.net
  • 51.83.239.114
unknown

Threats

No threats detected
Process
Message
McSkill.exe
"Set JVM path: updates/jdk-win64/bin/java.exe"
McSkill.exe
"Downloading: https://upd.mcskill.net/updates/Launcher.jar"
McSkill.exe
"Downloading: https://upd.mcskill.net/updates/java64.zip"
McSkill.exe
"Java path: C:/Users/admin/AppData/Roaming/MCSkill/updates/jdk-win64/bin/java.exe"
McSkill.exe
"Launcher path: C:/Users/admin/AppData/Roaming/MCSkill/updates/Launcher.jar"