File name:

dd.exe

Full analysis: https://app.any.run/tasks/a1c93162-34e2-432c-9b6d-874f733dfb58
Verdict: Malicious activity
Analysis date: November 05, 2024, 14:36:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

761510C85D347F8ED337B49BDD7770A6

SHA1:

B51575F6CD3A88B25149A23D8B44249F52A10953

SHA256:

C204DC4C06D97A3DF65A36ECE3EAD1800CDC74F295E23F9FD58ED545E7F0A2A7

SSDEEP:

98304:xDZMBEWwombEuYh3SfLg5073YVmb50EhiwOQcrfORUYzqAqo33MYfZ92HC48HI6H:rynzyrrx8XHyi/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • dd.exe (PID: 4516)
    • Executable content was dropped or overwritten

      • dd.exe (PID: 4516)
    • Process drops python dynamic module

      • dd.exe (PID: 4516)
    • Process drops legitimate windows executable

      • dd.exe (PID: 4516)
    • Application launched itself

      • dd.exe (PID: 4516)
  • INFO

    • Checks supported languages

      • dd.exe (PID: 4516)
    • Reads the computer name

      • dd.exe (PID: 4516)
    • Create files in a temporary directory

      • dd.exe (PID: 4516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:08:30 15:30:41+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 173056
InitializedDataSize: 151040
UninitializedDataSize: -
EntryPoint: 0xb4d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dd.exe conhost.exe no specs dd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1156"C:\Users\admin\AppData\Local\Temp\dd.exe" C:\Users\admin\AppData\Local\Temp\dd.exedd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\dd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4516"C:\Users\admin\AppData\Local\Temp\dd.exe" C:\Users\admin\AppData\Local\Temp\dd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\dd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6480\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
200
Read events
200
Write events
0
Delete events
0

Modification events

No data
Executable files
67
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_bz2.pydexecutable
MD5:10D42EFAC304861AD19821B4594FA959
SHA256:8EECDCC250637652E6BABC306EA6B8820E9E835DDD2434816D0E0FD0CA67FD14
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\VCRUNTIME140_1.dllexecutable
MD5:BBA9680BC310D8D25E97B12463196C92
SHA256:E0B66601CC28ECB171C3D4B7AC690C667F47DA6B6183BFF80604C84C00D265AB
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_hashlib.pydexecutable
MD5:F419AC6E11B4138EEA1FE8C86689076A
SHA256:441D32922122E59F75A728CC818F8E50613866A6C3DEC627098E6CC6C53624E2
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A17FF429442D4E5298F0FAF95950A77D
SHA256:8E9D1D206DA69DA744D77F730233344EBE7C2A392550511698A79CE2D9180B41
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:4A8F3A1847F216B8AC3E6B53BC20BD81
SHA256:29B7D786D9F421765A4F4904F79605C41E17C0A24D7F91E44C0B7B0DEA489FC3
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_decimal.pydexecutable
MD5:A1FFC2A156E9266932C351A88E5E7FAB
SHA256:B8409829DC4FDE70F38754DE55D3090A1CD52C78FFECE2A08572A58DE3AF294D
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\_elementtree.pydexecutable
MD5:F12B69DF1E983913E7F870EB8E79BC29
SHA256:B7EC9604084FA090135032633A38B0564F3F5F37FE1446197D008B78975E0418
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:3473BC217562594B5B126D7AEB9380E9
SHA256:0D8190FD619FEB20DF123931108D499132F7051F1EBB0EF246082F4C52C88B22
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:D7AD8DB12FF42D620A657127DADA1D88
SHA256:26054D8FEBAB1AACF11AA5CB64055808CD33388A8E77D0B3BCBC7543B0EEA3BD
4516dd.exeC:\Users\admin\AppData\Local\Temp\_MEI45162\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:ECEE1B7DA6539C233E8DEC78BFC8E1F9
SHA256:249D7CD1C87738F87458B95ACE4AB8F87B0DE99EEEFB796F6B86CBA889D49B2C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
23.32.238.34:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3788
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6100
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6100
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6760
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
104.126.37.153:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5488
MoUsoCoreWorker.exe
23.32.238.34:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3788
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.155
  • 104.126.37.128
  • 104.126.37.131
  • 104.126.37.161
  • 104.126.37.137
  • 104.126.37.162
  • 104.126.37.160
  • 104.126.37.139
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.32.238.34
  • 2.19.198.194
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.218.209.163
whitelisted
google.com
  • 142.250.185.110
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.73
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.4
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
th.bing.com
  • 104.126.37.139
  • 104.126.37.179
  • 104.126.37.153
  • 104.126.37.186
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.137
  • 104.126.37.130
  • 104.126.37.123
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info