File name:

b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe

Full analysis: https://app.any.run/tasks/61a27bb5-3327-4762-b8dc-c30e4e48c0b9
Verdict: Malicious activity
Analysis date: July 10, 2024, 12:04:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

2A46814F73C0EE996868DF06146B5BE4

SHA1:

3F17E2B4D1876A54A5E91B7601F2AFCC4479925F

SHA256:

B38322B2A1B73A0F2F1486FF04D8B7DB1F5193E804897C16DE83E4BE7EDDC647

SSDEEP:

12288:ufrfX38ym7TBgztfa2Rh+JuS9UsRIfuF1pmqEb:ufrfX38ymyHKuSD1pX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
      • ieinstal.exe (PID: 6328)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ieinstal.exe (PID: 6328)
    • Process drops legitimate windows executable

      • ieinstal.exe (PID: 6328)
      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
      • dllhost.exe (PID: 3232)
    • Checks Windows Trust Settings

      • ieinstal.exe (PID: 6328)
    • Executable content was dropped or overwritten

      • ieinstal.exe (PID: 6328)
      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
      • dllhost.exe (PID: 3232)
  • INFO

    • Checks supported languages

      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
      • ieinstal.exe (PID: 6328)
    • Reads the machine GUID from the registry

      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
      • ieinstal.exe (PID: 6328)
    • Reads the computer name

      • ieinstal.exe (PID: 6328)
      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
    • Process checks whether UAC notifications are on

      • ieinstal.exe (PID: 6328)
    • Checks proxy server information

      • ieinstal.exe (PID: 6328)
    • Create files in a temporary directory

      • ieinstal.exe (PID: 6328)
      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
    • Reads the software policy settings

      • ieinstal.exe (PID: 6328)
    • Creates files or folders in the user directory

      • ieinstal.exe (PID: 6328)
    • Checks transactions between databases Windows and Oracle

      • b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe (PID: 700)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 3232)
    • Drops the executable file immediately after the start

      • dllhost.exe (PID: 3232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:07:04 08:47:31+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.35
CodeSize: 178688
InitializedDataSize: 107008
UninitializedDataSize: -
EntryPoint: 0xa570
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe Copy/Move/Rename/Delete/Link Object ieinstal.exe

Process information

PID
CMD
Path
Indicators
Parent process
700"C:\Users\admin\AppData\Local\Temp\b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe" C:\Users\admin\AppData\Local\Temp\b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
3232C:\WINDOWS\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6328"C:\Program Files\Internet Explorer\IEInstal.exe" -EmbeddingC:\Program Files\Internet Explorer\ieinstal.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer Add-on Installer
Exit code:
2147942402
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files\internet explorer\ieinstal.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
10 534
Read events
10 525
Write events
9
Delete events
0

Modification events

(PID) Process:(6328) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:OperationalData
Value:
0D02000000000000
(PID) Process:(6328) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6328) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6328) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6328) ieinstal.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
4
Suspicious files
2
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
6328ieinstal.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850der
MD5:3582D5284FE8B34513E337C07AE9B8F8
SHA256:686C5D8F56C9BC20D444B6F3A32D78C249B94F10080F1B595CC8F856A62B65A6
6328ieinstal.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2CD1F910DD5DC23C234E99A91DE345C0der
MD5:6B769DB3020C81D2E526159023B9859E
SHA256:1E929D06F06A034171AB4F6C015C97C8927E5FB43C6DA2FDE645AD16CAE7CDEF
6328ieinstal.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2CD1F910DD5DC23C234E99A91DE345C0binary
MD5:7C042969706D603F8039D7AD5BF11550
SHA256:BC02DD189495B1865A7D8E5E002C4DB8AC68FF527CE4FEF92368179F88D02EBA
6328ieinstal.exeC:\Users\admin\AppData\Local\Temp\IDC1.tmp\[1]bdeunlock.exeexecutable
MD5:A7260013FC76F6F5908346DF1BC7966B
SHA256:58D896F7E78FA65345583479321F00CA14B0AE4B1AA3179DE86C3F0BCFDDBFEE
700b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647.exeC:\Users\admin\AppData\Local\Temp\[1]bdeunlock.exeexecutable
MD5:CB6CD09F6A25744A8FA6E4B3E4D260C5
SHA256:265B69033CEA7A9F8214A34CD9B17912909AF46C7A47395DD7BB893A24507E59
3232dllhost.exeC:\Users\admin\AppData\Local\Temp\IDC1.tmp\[1]bdeunlock.exeexecutable
MD5:CB6CD09F6A25744A8FA6E4B3E4D260C5
SHA256:265B69033CEA7A9F8214A34CD9B17912909AF46C7A47395DD7BB893A24507E59
6328ieinstal.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:D46F172E963492ADF53BA83EAE4FEB6F
SHA256:945245F729D8159311F5521665E3B8F26C449A8801D6D464C5EDA7E7EEECCF87
6328ieinstal.exeC:\Users\admin\AppData\Local\Temp\17efb6a4-9079-40ad-86d6-2a3194eba00f\bdeunlock.exe.datexecutable
MD5:A7260013FC76F6F5908346DF1BC7966B
SHA256:58D896F7E78FA65345583479321F00CA14B0AE4B1AA3179DE86C3F0BCFDDBFEE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
50
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2056
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2056
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
unknown
6328
ieinstal.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
unknown
6328
ieinstal.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl
unknown
unknown
6064
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6184
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
6268
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1776
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2056
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
2056
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1928
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4656
SearchApp.exe
2.23.209.143:443
www.bing.com
Akamai International B.V.
GB
unknown
6064
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4656
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.106
  • 2.16.164.97
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.bing.com
  • 2.23.209.143
  • 2.23.209.150
  • 2.23.209.158
  • 2.23.209.154
  • 2.23.209.142
  • 2.23.209.156
  • 2.23.209.141
  • 2.23.209.130
  • 2.23.209.149
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.76
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted

Threats

No threats detected
No debug info