File name:

bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe

Full analysis: https://app.any.run/tasks/0c84c441-a0ec-4755-a08c-7ae35ddd31f0
Verdict: Malicious activity
Analysis date: December 05, 2023, 08:38:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

4181810239214A953EF43F2968666793

SHA1:

E53FBA4B01D0E384451088BA7B0D9E78B6EF67B1

SHA256:

AEE5CB2F97FEE8DBE24ABE58EA7D3F87979560E3C60ECF2234DB28B1E95FA6EC

SSDEEP:

49152:N1kuUaoXRdLSLICgCHUkq5yTH252cv+hf3F:YYdq5yqE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
    • Reads settings of System Certificates

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
  • INFO

    • Reads Environment values

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
    • Checks supported languages

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • wmpnscfg.exe (PID: 1860)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
    • Reads the computer name

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • wmpnscfg.exe (PID: 1860)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
    • Reads the machine GUID from the registry

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
    • Creates files or folders in the user directory

      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 1864)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1860)
      • control.exe (PID: 3452)
      • bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe (PID: 4000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (49.4)
.scr | Windows screen saver (23.4)
.dll | Win32 Dynamic Link Library (generic) (11.7)
.exe | Win32 Executable (generic) (8)
.exe | Generic Win/DOS Executable (3.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:08:30 17:04:46+02:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 2708992
InitializedDataSize: 3584
UninitializedDataSize: -
EntryPoint: 0x29752e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.2.7.1
ProductVersionNumber: 1.2.7.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Rockwell Automation
FileDescription: RADAR Manage Download
FileVersion: 1.2.7.1
InternalName: RA.exe
LegalCopyright: Copyright ©2021 Rockwell Automation, Inc.
LegalTrademarks: -
OriginalFileName: RA.exe
ProductName: Download Manager
ProductVersion: 1.2.7.1
AssemblyVersion: 1.2.7.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe wmpnscfg.exe no specs control.exe no specs bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe

Process information

PID
CMD
Path
Indicators
Parent process
1860"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1864"C:\Users\admin\AppData\Local\Temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe" C:\Users\admin\AppData\Local\Temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
explorer.exe
User:
admin
Company:
Rockwell Automation
Integrity Level:
MEDIUM
Description:
RADAR Manage Download
Exit code:
0
Version:
1.2.7.1
Modules
Images
c:\users\admin\appdata\local\temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3452"C:\Windows\System32\control.exe" C:\Windows\System32\control.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Control Panel
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\control.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4000"C:\Users\admin\AppData\Local\Temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe" C:\Users\admin\AppData\Local\Temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
explorer.exe
User:
admin
Company:
Rockwell Automation
Integrity Level:
MEDIUM
Description:
RADAR Manage Download
Exit code:
0
Version:
1.2.7.1
Modules
Images
c:\users\admin\appdata\local\temp\bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
10 122
Read events
10 079
Write events
43
Delete events
0

Modification events

(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
Explorer.EXE
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM
Operation:writeName:DestinationFolderPath
Value:
C:\RA
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM
Operation:writeName:Speed
Value:
10
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM
Operation:writeName:RetryCount
Value:
5
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM
Operation:writeName:RetryInterval
Value:
1
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1864) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM\bwtmp43vzoqpd3xfjimcjeh4638361466559034182
Operation:writeName:IsRunning
Value:
1
(PID) Process:(4000) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM\bwtmp43vzoqpd3xfjimcjeh4638361466559034182
Operation:writeName:IsRunning
Value:
0
(PID) Process:(4000) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM
Operation:writeName:DestinationFolderPath
Value:
C:\RA
(PID) Process:(4000) bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeKey:HKEY_CURRENT_USER\Software\RADARDM\bwtmp43vzoqpd3xfjimcjeh4638361466559034182
Operation:writeName:FolderPath
Value:
C:\Users\admin\AppData\Local\RATemp
Executable files
0
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4000bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeC:\Users\admin\Desktop\RADAR Manage Download bwtmp43vzoqpd3xfjimcjeh4638361466559034182.lnkbinary
MD5:25BFED4234C89BCFF2D62847F1A3B161
SHA256:57EADD872E860F26B375699E0D5E7D50F697A6774D306CE466741AB117B81C36
1864bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeC:\Users\admin\AppData\Local\RockwellAutomation\logfile_session_bwtmp43vzoqpd3xfjimcjeh4638361466559034182.logtext
MD5:45CCEB9D59CD79BF78B339E364FD3D9F
SHA256:686FC365C3541A8D0F90E273FEC3742DDA03870259E97F330720541F52D189E6
1864bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exeC:\Users\admin\Desktop\RADAR Manage Download bwtmp43vzoqpd3xfjimcjeh4638361466559034182.lnkbinary
MD5:25BFED4234C89BCFF2D62847F1A3B161
SHA256:57EADD872E860F26B375699E0D5E7D50F697A6774D306CE466741AB117B81C36
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
10
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1864
bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
52.173.25.10:443
radar-downloadapi.rockwellautomation.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4000
bwtmp43vzoqpd3xfjimcjeh4638361466559034182.exe
52.173.25.10:443
radar-downloadapi.rockwellautomation.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
radar-downloadapi.rockwellautomation.com
  • 52.173.25.10
unknown

Threats

No threats detected
No debug info