File name:

asdasd.exe

Full analysis: https://app.any.run/tasks/61238617-d1b3-49c3-a113-409704e9dc6b
Verdict: Malicious activity
Analysis date: November 27, 2023, 16:07:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

735C55A0BDD52F23A1F61761E81C13F9

SHA1:

97B09A73A02358A48149BBE98D94A0E9139EC228

SHA256:

B1D8BD3173B7A7C759614BEFFB1CA3342957C71890BD2D504B873D10469B08A5

SSDEEP:

98304:m+cD4dn3EsXb8v/b9Sk0/46326xfsIkWnXFopLQ3iUrex4vkY7mZNmijVPiZQo:1+5WYi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • asdasd.exe (PID: 888)
      • asdasd.exe (PID: 2976)
      • asdasd.tmp (PID: 2308)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 1360)
      • cmd.exe (PID: 2204)
      • cmd.exe (PID: 3468)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • asdasd.tmp (PID: 2308)
    • Process drops legitimate windows executable

      • asdasd.tmp (PID: 2308)
    • Executing commands from a ".bat" file

      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
    • Reads the Internet Settings

      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
    • The process drops C-runtime libraries

      • asdasd.tmp (PID: 2308)
    • Starts CMD.EXE for commands execution

      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
  • INFO

    • Checks supported languages

      • asdasd.exe (PID: 888)
      • asdasd.tmp (PID: 2308)
      • asdasd.tmp (PID: 844)
      • asdasd.exe (PID: 2976)
      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
    • Reads the computer name

      • asdasd.tmp (PID: 844)
      • asdasd.tmp (PID: 2308)
      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
    • Create files in a temporary directory

      • asdasd.exe (PID: 888)
      • asdasd.exe (PID: 2976)
      • exec.exe (PID: 2416)
      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
    • Creates files in the program directory

      • asdasd.tmp (PID: 2308)
    • Manual execution by a user

      • exec.exe (PID: 3216)
      • exec.exe (PID: 3108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 15:54:16+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 89600
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: My Company, Inc.
FileDescription: ABC Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: ABC
ProductVersion: 1.5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
64
Monitored processes
16
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start asdasd.exe no specs asdasd.tmp no specs asdasd.exe asdasd.tmp no specs exec.exe no specs cmd.exe no specs regsvr32.exe no specs saferpacer.exe no specs exec.exe no specs cmd.exe no specs regsvr32.exe no specs saferpacer.exe no specs exec.exe cmd.exe no specs regsvr32.exe no specs saferpacer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
664regsvr32 msvcp140.dllC:\Windows\System32\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
4
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
844"C:\Users\admin\AppData\Local\Temp\is-KP8MI.tmp\asdasd.tmp" /SL5="$7019C,1336641,832512,C:\Users\admin\AppData\Local\Temp\asdasd.exe" C:\Users\admin\AppData\Local\Temp\is-KP8MI.tmp\asdasd.tmpasdasd.exe
User:
admin
Company:
My Company, Inc.
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-kp8mi.tmp\asdasd.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
888"C:\Users\admin\AppData\Local\Temp\asdasd.exe" C:\Users\admin\AppData\Local\Temp\asdasd.exeexplorer.exe
User:
admin
Company:
My Company, Inc.
Integrity Level:
MEDIUM
Description:
ABC Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\asdasd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1360C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\6WXkRTJ0.bat" "C:\Windows\System32\cmd.exeexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1784regsvr32 msvcp140.dllC:\Windows\System32\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
4
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2204C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\kurxkrZp.bat" "C:\Windows\System32\cmd.exeexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2308"C:\Users\admin\AppData\Local\Temp\is-MK4IK.tmp\asdasd.tmp" /SL5="$E0194,1336641,832512,C:\Users\admin\AppData\Local\Temp\asdasd.exe" /SPAWNWND=$C0182 /NOTIFYWND=$7019C C:\Users\admin\AppData\Local\Temp\is-MK4IK.tmp\asdasd.tmpasdasd.exe
User:
admin
Company:
My Company, Inc.
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-mk4ik.tmp\asdasd.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2416"C:\Program Files\ABC\exec.exe"C:\Program Files\ABC\exec.exeasdasd.tmp
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\program files\abc\exec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2976"C:\Users\admin\AppData\Local\Temp\asdasd.exe" /SPAWNWND=$C0182 /NOTIFYWND=$7019C C:\Users\admin\AppData\Local\Temp\asdasd.exe
asdasd.tmp
User:
admin
Company:
My Company, Inc.
Integrity Level:
HIGH
Description:
ABC Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\asdasd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3108"C:\Program Files\ABC\exec.exe" C:\Program Files\ABC\exec.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\program files\abc\exec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
3 285
Read events
3 254
Write events
25
Delete events
6

Modification events

(PID) Process:(2308) asdasd.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
115
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
D450F7739F33D5ADC933F5AE55FC83737027BEF55C3F6210B069E0E6A1C01122
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Program Files\ABC\exec.exe
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
C809C5829014560D4EAFB17A8F0716F834A7F44BA37AC269E57E10ADB4E4771F
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
04090000B0198BDF4B21DA01
(PID) Process:(2308) asdasd.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(2416) exec.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2416) exec.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2416) exec.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
10
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3468cmd.exe
MD5:
SHA256:
2976asdasd.exeC:\Users\admin\AppData\Local\Temp\is-MK4IK.tmp\asdasd.tmpexecutable
MD5:E7F625813A3133E1124E693CD51F4A9D
SHA256:94DC10B62C04D0393DB46F6C57C9E7E59D1F26620688BB246F0619353CA63E77
2308asdasd.tmpC:\Program Files\ABC\is-M29H6.tmpexecutable
MD5:58A4E799053C1589FB4FEEBCDC219DBF
SHA256:F804BDC45164D91D80D9CC7FE2E7F7134A99AFCB31C06ABDE7A6BCAC4E730056
2308asdasd.tmpC:\Program Files\ABC\unins000.datbinary
MD5:C806415C14067B18937052B2D1D2BF53
SHA256:26951A65EDEBDCB5EDC362740CA007FB4749F5A892A12915D02E9ACBF49D5968
2308asdasd.tmpC:\Program Files\ABC\is-OLG53.tmpexecutable
MD5:ECEFF9C92E14B580EA84365F3D60F7DE
SHA256:265591A709A5DB413D73C95B538DA321EDEACB40059BDCEB142F997A3D458B49
2308asdasd.tmpC:\Program Files\ABC\exec.exeexecutable
MD5:0B4BF6AD2A1954CA1A5B0EEEE9DF3CA5
SHA256:8B93A9CE4965A612FF3CCC28F3349473AA89D630CBE3BC137D0857D4C8EB5FBA
2308asdasd.tmpC:\Users\Public\Desktop\ABC.lnkbinary
MD5:E620E0A059DEC0FAF5646FF53EABF728
SHA256:8C74D58ECF6556D3531138364E159B4FC3F30C293E6C720CDE36C8C9269199AE
2308asdasd.tmpC:\Program Files\ABC\msvcp140.dllexecutable
MD5:ECEFF9C92E14B580EA84365F3D60F7DE
SHA256:265591A709A5DB413D73C95B538DA321EDEACB40059BDCEB142F997A3D458B49
3216exec.exeC:\Users\admin\AppData\Local\Temp\6WXkRTJ0.battext
MD5:D526F7D237E0FDD40FC49C1B7659E9C3
SHA256:90F23108AD0084B48C8C666A7A0B04D37818E58AC617FDAC9716E0E8F5F6BAF2
3108exec.exeC:\Users\admin\AppData\Local\Temp\sMmEqfpF.battext
MD5:D526F7D237E0FDD40FC49C1B7659E9C3
SHA256:90F23108AD0084B48C8C666A7A0B04D37818E58AC617FDAC9716E0E8F5F6BAF2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info