File name:

b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8

Full analysis: https://app.any.run/tasks/bbfaeddd-ab40-4c3e-aa2c-2642c4997687
Verdict: Malicious activity
Analysis date: April 29, 2025, 18:12:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
tofsee
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

46D364AB8D1EAC63855119C229BEBDDB

SHA1:

F5D19F508DDA2255D0D2D619B85226F85D019FB6

SHA256:

B98BAE92134BD86B8DFD0E0634869966A9F56E346DD5DD1E35F2DFBEFC849BE8

SSDEEP:

12288:ZuJfg4Gcn1HFx5jTV38WiVxVfuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:IJY4t1Hr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
    • TOFSEE has been detected (YARA)

      • svchost.exe (PID: 4880)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
    • Executes application which crashes

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
      • njbbynma.exe (PID: 7220)
    • Reads security settings of Internet Explorer

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 4880)
    • Connects to SMTP port

      • svchost.exe (PID: 4880)
  • INFO

    • Create files in a temporary directory

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
    • Checks supported languages

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
      • njbbynma.exe (PID: 7220)
    • Reads the computer name

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
      • njbbynma.exe (PID: 7220)
    • Process checks computer location settings

      • b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe (PID: 7376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.7)
.dll | Win32 Dynamic Link Library (generic) (14.7)
.exe | Win32 Executable (generic) (10)
.exe | Clipper DOS Executable (4.5)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:04:22 01:23:27+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 143872
InitializedDataSize: 49489920
UninitializedDataSize: -
EntryPoint: 0x15e36
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 14.31.55.12
ProductVersionNumber: 1.6.77.771
FileFlagsMask: 0x662f
FileFlags: Pre-release, Patched, Info inferred, [6], [8], [11]
FileOS: Unknown (0x14314)
ObjectFileType: Unknown (643)
FileSubtype: 1937
LanguageCode: Unknown (1204)
CharacterSet: Unicode
InternalName: sdnzsdj.ole
ProductVersion: 2.9.21.7
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
19
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe sppextcomobj.exe no specs slui.exe werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs wusa.exe no specs wusa.exe werfault.exe no specs njbbynma.exe werfault.exe no specs #TOFSEE svchost.exe werfault.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1280C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7376 -s 948C:\Windows\SysWOW64\WerFault.exeb98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4880svchost.exeC:\Windows\SysWOW64\svchost.exe
njbbynma.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
5680C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7220 -s 156C:\Windows\SysWOW64\WerFault.exenjbbynma.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6108C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7376 -s 156C:\Windows\SysWOW64\WerFault.exeb98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7220"C:\Users\admin\njbbynma.exe" /d"C:\Users\admin\AppData\Local\Temp\b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe" /e550302100000007FC:\Users\admin\njbbynma.exe
b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\njbbynma.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
7376"C:\Users\admin\AppData\Local\Temp\b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe" C:\Users\admin\AppData\Local\Temp\b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
7396C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7428"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7608C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7376 -s 692C:\Windows\SysWOW64\WerFault.exeb98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
4 489
Read events
4 488
Write events
1
Delete events
0

Modification events

(PID) Process:(7376) b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:hirqgskb
Value:
"C:\Users\admin\njbbynma.exe"
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7376b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exeC:\Users\admin\njbbynma.exeexecutable
MD5:DA3C9183ACCD38EBDCEE7F3B3FAC604A
SHA256:4A2EBEC019AE25BCF2A2A38B5418C6707CD7DBD0D7863511849AAB7205C94CD8
7376b98bae92134bd86b8dfd0e0634869966a9f56e346dd5dd1e35f2dfbefc849be8.exeC:\Users\admin\AppData\Local\Temp\lckisnui.exeexecutable
MD5:1486ACC0368C2F45B500263B7A3C17FD
SHA256:5908F0F17781B035DDC7192D3F2FFC3956B1AD6F5157254D878505A3C811795D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
27
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.21:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.21:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.21:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.216.77.21:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.216.77.21
  • 23.216.77.10
  • 23.216.77.42
  • 23.216.77.32
  • 23.216.77.8
  • 23.216.77.25
  • 23.216.77.13
  • 23.216.77.29
  • 23.216.77.43
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.134
  • 40.126.32.138
  • 20.190.160.130
  • 20.190.160.14
  • 20.190.160.66
  • 40.126.32.140
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
microsoft.com
  • 13.107.246.59
whitelisted
microsoft-com.mail.protection.outlook.com
  • 52.101.9.2
  • 52.101.40.4
  • 52.101.41.21
  • 52.101.11.13
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
No debug info