File name:

mediacreationtool.exe

Full analysis: https://app.any.run/tasks/0c41bf09-e05e-438d-82ba-f53910f3bac3
Verdict: Malicious activity
Analysis date: December 12, 2024, 11:26:52
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

B2EF653A8575CEBF20A4AABE17B70B6B

SHA1:

A686304500E45EBF945C85B9DE9085E6B58604C0

SHA256:

AB9967C2CD345FFDBF3C4283D95BB23C77A82A2782F381634F5DFA48F2B75071

SSDEEP:

98304:Ysz0wdECELHH2W8sMBNzTIH7hg9b8k4UVAR3FciZBLZnxMDgeNeOs2saqavaPJJT:shCKnxYsC2Tz5fylD/0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • The DLL Hijacking

      • SetupHost.exe (PID: 4320)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • mediacreationtool.exe (PID: 3436)
      • mediacreationtool.exe (PID: 4824)
    • Process drops legitimate windows executable

      • mediacreationtool.exe (PID: 3436)
    • Executable content was dropped or overwritten

      • mediacreationtool.exe (PID: 3436)
    • The process creates files with name similar to system file names

      • mediacreationtool.exe (PID: 3436)
  • INFO

    • Reads the computer name

      • mediacreationtool.exe (PID: 3436)
      • SetupHost.exe (PID: 4320)
    • Checks supported languages

      • mediacreationtool.exe (PID: 3436)
      • SetupHost.exe (PID: 4320)
    • The sample compiled with english language support

      • mediacreationtool.exe (PID: 3436)
    • Reads Environment values

      • SetupHost.exe (PID: 4320)
    • Reads the software policy settings

      • SetupHost.exe (PID: 4320)
    • Checks proxy server information

      • SetupHost.exe (PID: 4320)
    • Reads the machine GUID from the registry

      • SetupHost.exe (PID: 4320)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2090:07:21 07:23:50+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.38
CodeSize: 567296
InitializedDataSize: 1466368
UninitializedDataSize: -
EntryPoint: 0x7b150
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 10.0.26100.1
ProductVersionNumber: 10.0.26100.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Arabic
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: إعداد Windows 11
FileVersion: 10.0.26100.1 (ge_release.240331-1435)
InternalName: SetupPrep.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: SetupPrep.exe
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.26100.1
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mediacreationtool.exe setuphost.exe vdsldr.exe no specs mediacreationtool.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3436"C:\Users\admin\Desktop\mediacreationtool.exe" C:\Users\admin\Desktop\mediacreationtool.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows 11 Setup
Version:
10.0.26100.1 (ge_release.240331-1435)
Modules
Images
c:\users\admin\desktop\mediacreationtool.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4320"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web C:\$Windows.~WS\Sources\SetupHost.exe
mediacreationtool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Modern Setup Host
Version:
10.0.26100.1 (ge_release.240331-1435)
Modules
Images
c:\$windows.~ws\sources\setuphost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\rpcrt4.dll
4824"C:\Users\admin\Desktop\mediacreationtool.exe" C:\Users\admin\Desktop\mediacreationtool.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows 11 Setup
Exit code:
3221226540
Version:
10.0.26100.1 (ge_release.240331-1435)
Modules
Images
c:\users\admin\desktop\mediacreationtool.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5788C:\WINDOWS\System32\vdsldr.exe -EmbeddingC:\Windows\System32\vdsldr.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Virtual Disk Service Loader
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vdsldr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 886
Read events
3 849
Write events
35
Delete events
2

Modification events

(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:InstallScenario
Value:
7
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:InstallTicks
Value:
0
(PID) Process:(3436) mediacreationtool.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:delete keyName:(default)
Value:
(PID) Process:(3436) mediacreationtool.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup
Operation:delete valueName:CorrelationVector
Value:
IYXEGxww/0WC95lB.37
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup
Operation:writeName:CorrelationVector
Value:
JQPdc6B//kWTugSk.0
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:InstallTicks
Value:
1
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:SetupProgress
Value:
0
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:SetupPhase
Value:
2
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:SetupSubPhase
Value:
24
(PID) Process:(4320) SetupHost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup\Volatile
Operation:writeName:InstallTicks
Value:
2
Executable files
23
Suspicious files
1
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
3436mediacreationtool.exeC:\$Windows.~WS\Sources\Diager.dllexecutable
MD5:AD667CE37E222222A71BF8DA694BF012
SHA256:255A4157C25DA2DB8A5E5A1505E3B7630BE496316066AEB6E82F1EF671A21460
3436mediacreationtool.exeC:\$Windows.~WS\Sources\wdsutil.dllexecutable
MD5:F8EB9622154B98AD11416BBFE7CA2542
SHA256:0F86BEC1966F94E261BF0232B6C2499B1FD546D90C0C80C3BE075B5DF8BA566B
3436mediacreationtool.exeC:\$Windows.~WS\Sources\setupplatform.dllexecutable
MD5:199FC0A0977B155F6DAF1FA88DF565AE
SHA256:05ADA1EC86D60C0A6BAD54741D758A98F8C0D362F54F521F212D9E1F5CF81BD0
3436mediacreationtool.exeC:\$Windows.~WS\Sources\utcapi.dllexecutable
MD5:4DE8526A7473C40FD5D09F8F3E9ACBC0
SHA256:BA7D7BC704FD3250ED35E449EAE366C168E76B7636DBD1889B958AA123642074
3436mediacreationtool.exeC:\$Windows.~WS\Sources\unbcl.dllexecutable
MD5:598878BDA0CD9CD4C9E45813EE15A660
SHA256:9E8E14AAFECD40F1EC955BE958A39906DD508F9678BF15A73C8478967C209DD8
3436mediacreationtool.exeC:\$Windows.~WS\Sources\hwreqchk.dllexecutable
MD5:8BDCD3A20AE0F8D18F5EF55DC8658DC3
SHA256:2282903ACD07406E998343CABBA123B58822D86C3AD53EDB6CAED3B4D155A793
3436mediacreationtool.exeC:\$Windows.~WS\Sources\wimgapi.dllexecutable
MD5:27BD588CD3B091344E024FB6872FE6C8
SHA256:DA779496765D62BEA7957DE515F425C0F83CAC12A5FD8B1272B2E18296CBE119
3436mediacreationtool.exeC:\$Windows.~WS\Sources\bootsvc.dllexecutable
MD5:5A71C3E7AC88B90AA793FE0556BBE59B
SHA256:C90E2E02256F59AD4CEC7E16D0C519005A4FCDD6A78470A96BD9205F69D4DAE3
3436mediacreationtool.exeC:\$Windows.~WS\Sources\wpx.dllexecutable
MD5:8A9FAE3D0884ABA527273A5074077FAD
SHA256:358027EABF6E5D58A78EFB96753A9AA1E758D996EE56B4AE5A832974801755AE
3436mediacreationtool.exeC:\$Windows.~WS\Sources\MediaSetupUIMgr.dllexecutable
MD5:5FF880B8888B3B2041FDF0EA70B432B0
SHA256:FD0000749C4F0BB62E7A1863A2C63D52A8E312722F4F534D48A75A4C6F799011
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
HEAD
302
184.30.21.171:443
https://go.microsoft.com/fwlink/?LinkId=2156292
unknown
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
HEAD
200
184.30.21.171:443
https://download.microsoft.com/download/6/2/b/62b47bc5-1b28-4bfa-9422-e7a098d326d4/products-Win11-20241004.cab
unknown
GET
302
184.30.21.171:443
https://go.microsoft.com/fwlink/?LinkId=2156292
unknown
720
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
720
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
720
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.153:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
720
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
720
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.130
  • 104.126.37.171
  • 104.126.37.163
  • 104.126.37.137
  • 104.126.37.155
  • 104.126.37.170
  • 104.126.37.139
whitelisted
google.com
  • 142.250.186.46
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
download.microsoft.com
  • 184.30.24.206
whitelisted
self.events.data.microsoft.com
  • 104.208.16.88
whitelisted

Threats

No threats detected
No debug info