File name:

sample_93

Full analysis: https://app.any.run/tasks/27dd0b06-7423-4d70-8ae3-0834adf63631
Verdict: Malicious activity
Analysis date: January 21, 2024, 09:55:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9EA625FC2DACA87D65050D6BC21C7812

SHA1:

57F4D1DED0B71FFA930BEE136D731DCF1E86B688

SHA256:

ADF4BD01A7C708C6B82B1F63E32E00D7B8B5B2FB01EBFFA59878ABA73A6586D7

SSDEEP:

384:vi2zvV9YOvkknB6fY9J/0WIJym29zkS4u9UDgitasZ/bqX9+BHm2IDiE8wuJRDEn:HzvJvloA/P9z3O9QiGJaX6S6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • sample_93.exe (PID: 2036)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • sample_93.exe (PID: 2036)
    • Starts CMD.EXE for commands execution

      • sample_93.exe (PID: 2036)
    • Checks Windows Trust Settings

      • sample_93.exe (PID: 2036)
    • Reads security settings of Internet Explorer

      • sample_93.exe (PID: 2036)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1404)
    • Reads the Internet Settings

      • sample_93.exe (PID: 2036)
    • Reads settings of System Certificates

      • sample_93.exe (PID: 2036)
  • INFO

    • Checks supported languages

      • sample_93.exe (PID: 2036)
    • Create files in a temporary directory

      • sample_93.exe (PID: 2036)
    • Reads the computer name

      • sample_93.exe (PID: 2036)
    • Creates files or folders in the user directory

      • sample_93.exe (PID: 2036)
    • Checks proxy server information

      • sample_93.exe (PID: 2036)
    • Reads the machine GUID from the registry

      • sample_93.exe (PID: 2036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (69.4)
.exe | Win64 Executable (generic) (23.3)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:04:06 20:02:35+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 28672
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x169c
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Spanish (Modern)
CharacterSet: Unicode
CompanyName: Knaguroo
ProductName: Project1
FileVersion: 1
ProductVersion: 1
InternalName: load
OriginalFileName: load.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sample_93.exe cmd.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1404C:\Windows\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\log00VISTA9.batC:\Windows\System32\cmd.exesample_93.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2036"C:\Users\admin\AppData\Local\Temp\sample_93.exe" C:\Users\admin\AppData\Local\Temp\sample_93.exe
explorer.exe
User:
admin
Company:
Knaguroo
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\sample_93.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2204Reg ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v nsShAcc1 /t REG_SZ /d "C:\Users\admin\AppData\Local\Temp\sample_93.exe" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
3 292
Read events
3 266
Write events
26
Delete events
0

Modification events

(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2036) sample_93.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2036) sample_93.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2036sample_93.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:7C1BA253BE4C351403D03ED5CFA90241
SHA256:98F6066FF67DF546AAD5ADDF0795934DE47F094229C353FB934F576B98D886EA
2036sample_93.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:2A80A04B20748AD0965663B0C7A8FC0E
SHA256:932C350BCD6F2A2F5057060C39017CB68CAE06C9EA754BE2EFDCF8B6D9D9F1B3
2036sample_93.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Q3RW2P5S.txttext
MD5:C7C2B11784F5A53794DDCC90024AD0D1
SHA256:229DB1A87FDFA68A91015E857047871AE6FA21970B777980867C3A5B8F006DA1
2036sample_93.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:350BFD1B7C827849D101D794812ED8D7
SHA256:7EAC3B995A9668B42D9B74F605A304F557C8F839BD7BAB01B392DCC6ED404155
2036sample_93.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
2036sample_93.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\5Y2BLH9L.txttext
MD5:BE3F5CD186B4263901F917DB6457FD16
SHA256:1196881376344B97952C1EE9F5C5B39CE59ADDBF65A71367F7EBB6C5AC813BBA
2036sample_93.exeC:\Users\admin\AppData\Local\Temp\log00VISTA9.battext
MD5:E3889467DC64FE2F2E568BF4889AC853
SHA256:A06F5F2B6C3C9AE46F7F1356DD7B5196C86C79CCD9241B77E84E64B2C8277448
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
10
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2036
sample_93.exe
GET
302
3.140.13.188:80
http://www.payfive.com/demos//log2.txt
unknown
unknown
2036
sample_93.exe
GET
200
95.101.54.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9c35526d3a6ecb8f
unknown
compressed
4.66 Kb
unknown
2036
sample_93.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
binary
1.47 Kb
unknown
2036
sample_93.exe
GET
302
3.140.13.188:80
http://www.payfive.com/demos//log2.txt
unknown
unknown
1080
svchost.exe
GET
304
95.101.54.203:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?34275567a5b520f7
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2036
sample_93.exe
3.140.13.188:80
www.payfive.com
AMAZON-02
US
unknown
2036
sample_93.exe
104.26.7.37:443
www.hugedomains.com
CLOUDFLARENET
US
shared
2036
sample_93.exe
95.101.54.128:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
2036
sample_93.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2036
sample_93.exe
216.58.206.46:80
google.com
GOOGLE
US
whitelisted
1080
svchost.exe
95.101.54.203:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
www.rutasdelbalsamo.com
unknown
www.rutaverde.cl
unknown
www.payfive.com
  • 3.140.13.188
  • 18.119.154.66
shared
www.hugedomains.com
  • 104.26.7.37
  • 172.67.70.191
  • 104.26.6.37
whitelisted
ctldl.windowsupdate.com
  • 95.101.54.128
  • 95.101.54.112
  • 95.101.54.208
  • 95.101.54.121
  • 2.16.202.112
  • 95.101.54.123
  • 95.101.54.138
  • 2.16.202.113
  • 95.101.54.106
  • 95.101.54.203
  • 95.101.54.195
  • 2.16.202.114
  • 95.101.54.115
  • 95.101.54.114
  • 95.101.54.105
  • 95.101.54.129
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 216.58.206.46
whitelisted

Threats

No threats detected
No debug info