File name:

9038b8ddd27a701655fedebecd7bb62b.exe

Full analysis: https://app.any.run/tasks/ebda48da-0d04-4fda-8261-c38e9a0be0aa
Verdict: Malicious activity
Analysis date: December 02, 2023, 16:47:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9038B8DDD27A701655FEDEBECD7BB62B

SHA1:

FDDEE43166CA1ECA51F469A5CCA554AAE75FCB33

SHA256:

AB66CC0A2046E9CF6CE495C140966A702E219FEB7EED0D1950E26410505200E3

SSDEEP:

6144:uPFY0wgBYwTRPbZR+oL5O/+xT/hybI1imSbqyocXw9dyxmYb+lizAoKlVVVVV3jX:uPFYOZNRLc+xT/Ab8iKlVVVVVj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs injected code in another process

      • 9038b8ddd27a701655fedebecd7bb62b.exe (PID: 1228)
    • Application was injected by another process

      • explorer.exe (PID: 1944)
  • SUSPICIOUS

    • Application launched itself

      • 9038b8ddd27a701655fedebecd7bb62b.exe (PID: 2560)
  • INFO

    • Checks supported languages

      • 9038b8ddd27a701655fedebecd7bb62b.exe (PID: 1228)
      • 9038b8ddd27a701655fedebecd7bb62b.exe (PID: 2560)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 1944)
    • Drops the executable file immediately after the start

      • explorer.exe (PID: 1944)
    • Reads the Internet Settings

      • explorer.exe (PID: 1944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:04 20:53:09+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 167936
InitializedDataSize: 40488448
UninitializedDataSize: -
EntryPoint: 0x3704
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 37.0.0.0
ProductVersionNumber: 46.0.0.0
FileFlagsMask: 0x145a
FileFlags: (none)
FileOS: Unknown (0x20723)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Unknown (0452)
CharacterSet: Unknown (30F3)
FileDescription: Mabling
LegalCopyright: Copyright (C) 2022, Crazy
OriginalFileName: Munpler
ProductsVersion: 19.3.71.61
ProductionVersion: 16.78.79.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start inject 9038b8ddd27a701655fedebecd7bb62b.exe no specs 9038b8ddd27a701655fedebecd7bb62b.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Users\admin\AppData\Local\Temp\9038b8ddd27a701655fedebecd7bb62b.exe" C:\Users\admin\AppData\Local\Temp\9038b8ddd27a701655fedebecd7bb62b.exe9038b8ddd27a701655fedebecd7bb62b.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\9038b8ddd27a701655fedebecd7bb62b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1944C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2560"C:\Users\admin\AppData\Local\Temp\9038b8ddd27a701655fedebecd7bb62b.exe" C:\Users\admin\AppData\Local\Temp\9038b8ddd27a701655fedebecd7bb62b.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\9038b8ddd27a701655fedebecd7bb62b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
90
Read events
89
Write events
1
Delete events
0

Modification events

(PID) Process:(1944) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944explorer.exeC:\Users\admin\AppData\Roaming\evhtujvexecutable
MD5:9038B8DDD27A701655FEDEBECD7BB62B
SHA256:AB66CC0A2046E9CF6CE495C140966A702E219FEB7EED0D1950E26410505200E3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
1944
explorer.exe
212.193.56.210:80
host-host-file8.com
Trader soft LLC
RU
unknown

DNS requests

Domain
IP
Reputation
host-file-host6.com
unknown
host-host-file8.com
  • 212.193.56.210
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info