File name:

?????.exe

Full analysis: https://app.any.run/tasks/cef184f2-1cf2-4b2f-b6e7-eff10116baca
Verdict: Malicious activity
Analysis date: May 18, 2025, 10:54:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
telegram
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

9575E0C4CD65C8E2A6B57FBF35C02778

SHA1:

FFEC1D3FA3E999EA7BE9530C503723271B987B37

SHA256:

B7D8BAF7B42E19C1A07A6E79DE9FB53EBD899379D96CD2CFD5671F618E2D8A9C

SSDEEP:

49152:CbzHsOQ0qKCKpI6AXK7Zp/CXub5BXheOv23aWqyw1KKTYqH0Ies4wIEPzDZUrZtu:CcOXa1a7oQBXsOOlo9WW7D6qwha89md/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AutoIt loader has been detected (YARA)

      • Commitment.com (PID: 920)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
      • cmd.exe (PID: 4688)
    • Reads security settings of Internet Explorer

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4688)
    • Executing commands from a ".bat" file

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
    • Get information on the list of running processes

      • cmd.exe (PID: 4688)
    • Application launched itself

      • cmd.exe (PID: 4688)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 4688)
    • The executable file from the user directory is run by the CMD process

      • Commitment.com (PID: 920)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4688)
    • There is functionality for taking screenshot (YARA)

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
      • Commitment.com (PID: 920)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Commitment.com (PID: 920)
  • INFO

    • Checks supported languages

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
      • extrac32.exe (PID: 6944)
      • Commitment.com (PID: 920)
    • Create files in a temporary directory

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
      • extrac32.exe (PID: 6944)
    • Reads the computer name

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
      • extrac32.exe (PID: 6944)
      • Commitment.com (PID: 920)
    • Process checks computer location settings

      • cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe (PID: 976)
    • Creates a new folder

      • cmd.exe (PID: 4652)
    • Reads mouse settings

      • Commitment.com (PID: 920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:10 12:19:23+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 25600
InitializedDataSize: 431104
UninitializedDataSize: 16896
EntryPoint: 0x33e9
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
16
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs sppextcomobj.exe no specs slui.exe tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs commitment.com choice.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
920Commitment.com S C:\Users\admin\AppData\Local\Temp\631913\Commitment.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\631913\commitment.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
976"C:\Users\admin\AppData\Local\Temp\cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe" C:\Users\admin\AppData\Local\Temp\cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cef184f2-1cf2-4b2f-b6e7-eff10116baca.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1164findstr "bdservicehost SophosHealth AvastUI AVGUI nsWscSvc ekrn" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2136tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2268C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3020findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4652cmd /c md 631913C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4652choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4688"C:\WINDOWS\System32\CMd.exe" /c copy Aspnet.pot Aspnet.pot.bat & Aspnet.pot.batC:\Windows\SysWOW64\cmd.execef184f2-1cf2-4b2f-b6e7-eff10116baca.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4980"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 636
Read events
1 636
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
22
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6944extrac32.exeC:\Users\admin\AppData\Local\Temp\Housewivesbinary
MD5:BA51861B4DDE8B1DD36FC3CB56DFD16D
SHA256:0E379803C03BB7B5BC2E03529CECC791EF218F5FE5A0660CEB9CD24289087549
6944extrac32.exeC:\Users\admin\AppData\Local\Temp\Liebinary
MD5:3BDE4B57EC11D9DFEC504241D055EAFF
SHA256:C5716414D19988EAC1769D1FB6717A6745736D83FF0851D63FDF245A57F35B71
976cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeC:\Users\admin\AppData\Local\Temp\Eng.potbinary
MD5:E1B6D89A22B75D99E59D3A111D3D5C61
SHA256:625819B6169E54A023E95FF89DEAE5A467159E03E52405ACFEA422AC8BC6EBDD
976cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeC:\Users\admin\AppData\Local\Temp\Scheme.potbinary
MD5:90A41C464B5B37239E75D976F12CA7A7
SHA256:BFBEA4719659A6D742C05D28A0DB8106AC510FB0EE96B11AEAED025DE9615CF4
976cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeC:\Users\admin\AppData\Local\Temp\Discounted.potcompressed
MD5:3B29699E0CAC04287F5760A26A018E08
SHA256:DE1FC03D0EECCC008AA6C44DB8C96C93E4511AE3A62C97AC1C40E116C349D22E
4688cmd.exeC:\Users\admin\AppData\Local\Temp\Aspnet.pot.battext
MD5:09F4FE4CD6603B37DBDE66CBB6EE7E59
SHA256:B33592DA9468DC284D62DA390415B6206C87A39406D0B508B8E63532D6B50A68
976cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeC:\Users\admin\AppData\Local\Temp\Unified.potbinary
MD5:34493D38CFEDD8E60E2EFC0254475035
SHA256:1F40995B201BFC83E67A2E369A99CFC2FE29F701371030E3AF1807FF3C50BE62
976cef184f2-1cf2-4b2f-b6e7-eff10116baca.exeC:\Users\admin\AppData\Local\Temp\Aspnet.pottext
MD5:09F4FE4CD6603B37DBDE66CBB6EE7E59
SHA256:B33592DA9468DC284D62DA390415B6206C87A39406D0B508B8E63532D6B50A68
6944extrac32.exeC:\Users\admin\AppData\Local\Temp\Wornbinary
MD5:5A182DE49019551E7AC6F6F85982BE4D
SHA256:2BE8EBCF600101D6A897FED4D033E538021CD0933FB16E1B327F382115A88BBB
6944extrac32.exeC:\Users\admin\AppData\Local\Temp\Relevantbinary
MD5:A982E98833BD4FE50688B90729F589FB
SHA256:F7C352F9D30BEB8C782F5AC528801749EA0E9B4DE90175A9EBB88134BFDBBDFD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
27
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5892
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5892
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.7
  • 23.216.77.41
  • 23.216.77.37
  • 23.216.77.39
  • 23.216.77.13
  • 23.216.77.6
  • 23.216.77.8
  • 23.216.77.42
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
OLUbHpbeZj.OLUbHpbeZj
unknown
login.live.com
  • 20.190.159.4
  • 40.126.31.69
  • 40.126.31.3
  • 40.126.31.131
  • 20.190.159.129
  • 40.126.31.67
  • 40.126.31.128
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
920
Commitment.com
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
No debug info