File name:

dd.exe

Full analysis: https://app.any.run/tasks/a1c93162-34e2-432c-9b6d-874f733dfb58
Verdict: Malicious activity
Analysis date: November 05, 2024, 14:36:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

761510C85D347F8ED337B49BDD7770A6

SHA1:

B51575F6CD3A88B25149A23D8B44249F52A10953

SHA256:

C204DC4C06D97A3DF65A36ECE3EAD1800CDC74F295E23F9FD58ED545E7F0A2A7

SSDEEP:

98304:xDZMBEWwombEuYh3SfLg5073YVmb50EhiwOQcrfORUYzqAqo33MYfZ92HC48HI6H:rynzyrrx8XHyi/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • dd.exe (PID: 4516)
    • The process drops C-runtime libraries

      • dd.exe (PID: 4516)
    • Process drops legitimate windows executable

      • dd.exe (PID: 4516)
    • Application launched itself

      • dd.exe (PID: 4516)
    • Process drops python dynamic module

      • dd.exe (PID: 4516)
  • INFO

    • Create files in a temporary directory

      • dd.exe (PID: 4516)
    • Checks supported languages

      • dd.exe (PID: 4516)
    • Reads the computer name

      • dd.exe (PID: 4516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:08:30 15:30:41+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 173056
InitializedDataSize: 151040
UninitializedDataSize: -
EntryPoint: 0xb4d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dd.exe conhost.exe no specs dd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1156"C:\Users\admin\AppData\Local\Temp\dd.exe" C:\Users\admin\AppData\Local\Temp\dd.exedd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\dd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4516"C:\Users\admin\AppData\Local\Temp\dd.exe" C:\Users\admin\AppData\Local\Temp\dd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\dd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6480\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
200
Read events
200
Write events
0
Delete events
0

Modification events

No data
Executable files
67
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\VCRUNTIME140.dllexecutable
MD5:870FEA4E961E2FBD00110D3783E529BE
SHA256:76FDB83FDE238226B5BEBAF3392EE562E2CB7CA8D3EF75983BF5F9D6C7119644
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_decimal.pydexecutable
MD5:A1FFC2A156E9266932C351A88E5E7FAB
SHA256:B8409829DC4FDE70F38754DE55D3090A1CD52C78FFECE2A08572A58DE3AF294D
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_ctypes.pydexecutable
MD5:DF6BE515E183A0E4DBE9CDDA17836664
SHA256:AF598AE52DDC6869F24D36A483B77988385A5BBBF4618B2E2630D89D10A107EE
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_hashlib.pydexecutable
MD5:F419AC6E11B4138EEA1FE8C86689076A
SHA256:441D32922122E59F75A728CC818F8E50613866A6C3DEC627098E6CC6C53624E2
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_bz2.pydexecutable
MD5:10D42EFAC304861AD19821B4594FA959
SHA256:8EECDCC250637652E6BABC306EA6B8820E9E835DDD2434816D0E0FD0CA67FD14
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:D7AD8DB12FF42D620A657127DADA1D88
SHA256:26054D8FEBAB1AACF11AA5CB64055808CD33388A8E77D0B3BCBC7543B0EEA3BD
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:50ABF0A7EE67F00F247BADA185A7661C
SHA256:F957A4C261506484B53534A9BE8931C02EC1A349B3F431A858F8215CECFEC3F7
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:C68A86C180FF1FCAC90D1DA9A08179C1
SHA256:2C91C4861E88C92693A1B145EBE2F69FFB90797CD42061E2D84F3D7FC009A941
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A17FF429442D4E5298F0FAF95950A77D
SHA256:8E9D1D206DA69DA744D77F730233344EBE7C2A392550511698A79CE2D9180B41
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:73DD550364215163EA9EDB537E6B3714
SHA256:0235C78780EFF0BD34FCE01D1C366E5E5936EA361676CB9711A4CFFF747D457A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.238.34:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3788
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6100
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6100
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6760
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
104.126.37.153:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5488
MoUsoCoreWorker.exe
23.32.238.34:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3788
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.155
  • 104.126.37.128
  • 104.126.37.131
  • 104.126.37.161
  • 104.126.37.137
  • 104.126.37.162
  • 104.126.37.160
  • 104.126.37.139
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.32.238.34
  • 2.19.198.194
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.218.209.163
whitelisted
google.com
  • 142.250.185.110
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.73
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.4
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
th.bing.com
  • 104.126.37.139
  • 104.126.37.179
  • 104.126.37.153
  • 104.126.37.186
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.137
  • 104.126.37.130
  • 104.126.37.123
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info