| File name: | b90c8c645e7f9449e5d51523f6c84c7309d7d755c33c57073597ae330e49c273 |
| Full analysis: | https://app.any.run/tasks/a59c03a5-fbb5-4908-90fa-49674bdecd01 |
| Verdict: | Malicious activity |
| Analysis date: | November 02, 2024, 14:37:09 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
| MD5: | 1F25C98B9980DC2756C34B3751F580DA |
| SHA1: | 006E2E1A9223FAE0BC7E6817284B8BF0BFEC54D6 |
| SHA256: | B90C8C645E7F9449E5D51523F6C84C7309D7D755C33C57073597AE330E49C273 |
| SSDEEP: | 3072:nunsO3QZLqIlCubM+EMVezSFW3EFySfAb0LUorn5lCA8TA2Mn1klaQAid6yjquXS:nO3QZLqIlCubM+EMVkSFW3uySfAb0LUi |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:04:10 21:59:09+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 102400 |
| InitializedDataSize: | 20480 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1164 |
| OSVersion: | 4 |
| ImageVersion: | 1 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 540 | "C:\Users\admin\wuoucig.exe" | C:\Users\admin\wuoucig.exe | veonaof.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 696 | "C:\Users\admin\pouyef.exe" | C:\Users\admin\pouyef.exe | qxgeav.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 864 | "C:\Users\admin\qoedaej.exe" | C:\Users\admin\qoedaej.exe | ltruy.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1084 | "C:\Users\admin\guqup.exe" | C:\Users\admin\guqup.exe | wooohe.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1252 | "C:\Users\admin\naieya.exe" | C:\Users\admin\naieya.exe | fieas.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1572 | "C:\Users\admin\guined.exe" | C:\Users\admin\guined.exe | biukeum.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1952 | "C:\Users\admin\gouox.exe" | C:\Users\admin\gouox.exe | zoafaa.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2140 | "C:\Users\admin\tauxua.exe" | C:\Users\admin\tauxua.exe | fyjieg.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2272 | "C:\Users\admin\miaudo.exe" | C:\Users\admin\miaudo.exe | baueh.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2376 | "C:\Users\admin\rpkoug.exe" | C:\Users\admin\rpkoug.exe | xiedal.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| (PID) Process: | (6468) b90c8c645e7f9449e5d51523f6c84c7309d7d755c33c57073597ae330e49c273.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (6468) b90c8c645e7f9449e5d51523f6c84c7309d7d755c33c57073597ae330e49c273.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | jktef |
Value: C:\Users\admin\jktef.exe /c | |||
| (PID) Process: | (6468) b90c8c645e7f9449e5d51523f6c84c7309d7d755c33c57073597ae330e49c273.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU |
| Operation: | write | Name: | NoAutoUpdate |
Value: 1 | |||
| (PID) Process: | (3824) jktef.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (3824) jktef.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | wuiuxuh |
Value: C:\Users\admin\wuiuxuh.exe /I | |||
| (PID) Process: | (3824) jktef.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU |
| Operation: | write | Name: | NoAutoUpdate |
Value: 1 | |||
| (PID) Process: | (7080) wuiuxuh.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (7080) wuiuxuh.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | yeopa |
Value: C:\Users\admin\yeopa.exe /f | |||
| (PID) Process: | (7080) wuiuxuh.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU |
| Operation: | write | Name: | NoAutoUpdate |
Value: 1 | |||
| (PID) Process: | (7124) yeopa.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | toogel |
Value: C:\Users\admin\toogel.exe /a | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7128 | wooohe.exe | C:\Users\admin\guqup.exe | executable | |
MD5:2C55A02E3AF77910788EB64C66A5EACE | SHA256:BE3C86C0A9F7F1CA8B1785A5BEA43591A98D947D9798E6DA35BEB492C4AEBC36 | |||
| 2272 | miaudo.exe | C:\Users\admin\fetat.exe | executable | |
MD5:EBD197CCC8FF06E5EE01E8A14F9969B5 | SHA256:F8ACFACE984F4A7862501AAB965632A29432A5F899D5EE881E88F9CDB410FD16 | |||
| 2428 | meeazad.exe | C:\Users\admin\baueh.exe | executable | |
MD5:1F1C6F3717E57CE8327EA5208E082A3D | SHA256:74EBAC664A0FE93B1F94EE7C0ECBD3186347F7EB450B1807FCC7531DD902C3C3 | |||
| 3964 | toogel.exe | C:\Users\admin\wooohe.exe | executable | |
MD5:B117BF949D2FF7B83175CA2FC33C355B | SHA256:8D9DB7D5AC93A0A5603AFD53D953EC6069C443C718A548EED9C2AD360A44D863 | |||
| 6804 | maaiya.exe | C:\Users\admin\xuauyic.exe | executable | |
MD5:219D50A173C1786BCCA881F573894B18 | SHA256:6EDA493AEF4E50A506FC9F1D7F2CCDF97DAB7E76AE44928C235046DD499ADC56 | |||
| 1084 | guqup.exe | C:\Users\admin\meeazad.exe | executable | |
MD5:83E96CD293B24017BF3DC2F240C02885 | SHA256:238ADD90A16233DFEAE73A75837435DFFC44E91B458EBDBF1EE64898684D6CB6 | |||
| 6596 | neecek.exe | C:\Users\admin\hiehe.exe | executable | |
MD5:84D2AF1E6A26D1317039D1D7E6ED5917 | SHA256:D09E0686F38F0D654607FFA633B7F3253AB877A3BF5B17AD24A9AD198ED72E73 | |||
| 4868 | baueh.exe | C:\Users\admin\miaudo.exe | executable | |
MD5:6919E2C2F728A3C7F637C7DBD98D5767 | SHA256:B3F2935116D7386E6FF9216A246337D7B67D1E5CFFFB67AC968119EE88863A07 | |||
| 7052 | xiedal.exe | C:\Users\admin\rpkoug.exe | executable | |
MD5:1B37127EC35B86D05CAE31796089E42A | SHA256:7DBB1E2906A1825356896CD31C7096173B57C16D013BD665F98DB0FC4857F2BD | |||
| 6276 | hiehe.exe | C:\Users\admin\maaiya.exe | executable | |
MD5:293FD6EEC382DA93D910516D382AF7BC | SHA256:DF4FC5A0B1F90C3542AA1106A59553C3C488B45162F13E53AAAFE8A0DBDB0C4F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5488 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2464 | RUXIMICS.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 23.218.209.163:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 23.218.209.163:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2464 | RUXIMICS.exe | GET | 200 | 23.218.209.163:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6944 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2464 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 104.126.37.128:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 23.32.238.107:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 23.32.238.107:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2464 | RUXIMICS.exe | 23.32.238.107:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6944 | svchost.exe | 23.218.209.163:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ns1.spansearcher.net |
| unknown |
ns1.spinsearcher.org |
| unknown |
ns1.player1352.net |
| unknown |
self.events.data.microsoft.com |
| whitelisted |