File name:

af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe

Full analysis: https://app.any.run/tasks/f67633e7-32b0-4d10-a9ae-d036c0d15cd0
Verdict: Malicious activity
Analysis date: June 03, 2024, 22:30:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
MD5:

F1D15428316E5175DDA634132F8BC94C

SHA1:

130F3319FEFDCE5470F0B7AC3842B7D57FBC70C4

SHA256:

AF2F3EB377EA1A81EA4F29280A3467BF0965C6C5EF31F8AAC1B4F9252D306F14

SSDEEP:

192:oSqQtieaDdJduTxbdYQhOJ/kaJaQ3SBhc9WlJdxqHbrbg:oFQyJdud49WlJj+s

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
  • INFO

    • Checks supported languages

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
    • Checks proxy server information

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
    • Reads the computer name

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
    • Create files in a temporary directory

      • af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe (PID: 6384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 6
CodeSize: 9216
InitializedDataSize: 4096
UninitializedDataSize: -
EntryPoint: 0x3000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6384"C:\Users\admin\AppData\Local\Temp\af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe" C:\Users\admin\AppData\Local\Temp\af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\sechost.dll
6392\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeaf2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
557
Read events
557
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6384af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exeC:\Users\admin\AppData\Local\Temp\242603223023724.exeexecutable
MD5:9EFC137C27B7A0899B7900D0D1FC26A0
SHA256:63653D8B8D8D0F434CA77C92E2B01D6BF19A097B654541CCFDEAF0662D684E92
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
52
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
GET
193.70.94.19:80
http://fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro/v5/ucph/yzxt/242603223023724/000ac6000ffa/000000/dvdd.bin
unknown
unknown
1412
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
GET
193.70.94.19:80
http://fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro/v5/ucph/yzxt/242603223023724/000ac6000ffa/000000/dvdd.bin
unknown
unknown
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
GET
193.70.94.19:80
http://fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro/v5/ucph/yzxt/242603223023724/000ac6000ffa/000000/dvdd.bin
unknown
unknown
7004
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
GET
193.70.94.19:80
http://fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro/v5/ucph/yzxt/242603223023724/000ac6000ffa/000000/dvdd.bin
unknown
unknown
7004
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
GET
193.70.94.19:80
http://fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro/v5/ucph/yzxt/242603223023724/000ac6000ffa/000000/dvdd.bin
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4364
svchost.exe
239.255.255.250:1900
unknown
1324
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5140
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6384
af2f3eb377ea1a81ea4f29280a3467bf0965c6c5ef31f8aac1b4f9252d306f14.exe
193.70.94.19:80
fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro
OVH SAS
PL
unknown
1412
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1032
svchost.exe
2.21.18.188:443
go.microsoft.com
AKAMAI-AS
BE
unknown
1412
svchost.exe
192.229.221.95:80
EDGECAST
US
whitelisted
5140
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
fjhf.ejjt.v5.mrmpzjjhn3sgtq5w.pro
  • 193.70.94.19
unknown
login.live.com
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.134
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.14
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 2.21.18.188
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted
www.microsoft.com
  • 2.21.17.194
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.11
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info