File name:

Launcher.exe

Full analysis: https://app.any.run/tasks/43cf5d7f-1a5e-4600-abe7-ae13a5891e65
Verdict: Malicious activity
Analysis date: July 24, 2024, 01:22:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

968B9FE8A83A058B6794B3C3AE4C4BCA

SHA1:

7259756216CE6E841244F68D2929B1D9FAF3167F

SHA256:

C2B6239C217A9A45A6503088ACBAC95EE64F5995E634FDA3BADB89B8934D069A

SSDEEP:

98304:htTyn/BzJG89xqhJ2zc2AA72x5NJNfrjcZo4fJW57zZ7U7SAbLnyT1eI5zx6rRvl:azXF6xYxWH67Q83RVFGW5hmGZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Launcher.exe (PID: 2256)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Launcher.exe (PID: 2256)
    • Executes application which crashes

      • Launcher.exe (PID: 2256)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Launcher.exe (PID: 2256)
    • Checks Windows Trust Settings

      • Launcher.exe (PID: 2256)
  • INFO

    • Checks proxy server information

      • Launcher.exe (PID: 2256)
      • WerFault.exe (PID: 6592)
    • Checks supported languages

      • Launcher.exe (PID: 2256)
    • Reads the machine GUID from the registry

      • Launcher.exe (PID: 2256)
    • Reads the computer name

      • Launcher.exe (PID: 2256)
    • Reads the software policy settings

      • Launcher.exe (PID: 2256)
      • WerFault.exe (PID: 6592)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (49.3)
.exe | Win64 Executable (generic) (32.7)
.dll | Win32 Dynamic Link Library (generic) (7.8)
.exe | Win32 Executable (generic) (5.3)
.exe | Generic Win/DOS Executable (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:09 19:33:08+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 7576576
InitializedDataSize: 3716096
UninitializedDataSize: -
EntryPoint: 0x6f4d99
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start launcher.exe werfault.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2256"C:\Users\admin\AppData\Local\Temp\Launcher.exe" C:\Users\admin\AppData\Local\Temp\Launcher.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6140C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6592C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2256 -s 2456C:\Windows\SysWOW64\WerFault.exe
Launcher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
10 496
Read events
10 485
Write events
11
Delete events
0

Modification events

(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2256) Launcher.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6592WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Launcher.exe_unk_f4eca5d352919dee65787cc484c6fd26a869e6a_8d590276_a7f5cc23-25f6-4ffd-b56f-85cce7cf5491\Report.wer
MD5:
SHA256:
6592WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER3342.tmp.WERInternalMetadata.xmlxml
MD5:71376E43910A4A873EC605A63CF4086F
SHA256:D51716C55A8573C4949E68A67A78765D0CBAF022BEFDD574C9BD08592119936B
6592WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Launcher.exe.2256.dmpbinary
MD5:E9E93396177B5496AB39E38B8FE1CF8F
SHA256:AD660444AA529E01091EB7F0826F83B56A760229252632F601C018D38011416C
6592WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER3371.tmp.xmlxml
MD5:CF8B551F3564100CAD9BCB8C95214BCB
SHA256:64C85C5D09DAD34FB5E1803FC6BBC0E56F761476C43F0E88669BF91FCD1D9E6F
6592WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER31CA.tmp.dmpbinary
MD5:C63500C1437B6DD000EDCBFBB7AE918F
SHA256:440261433F515C96A54B9E8B2D6879B9B2ADA204AE8F280056F2613A98B784FB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
28
DNS requests
6
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
6012
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.133:443
Akamai International B.V.
GB
unknown
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
whitelisted
2256
Launcher.exe
149.154.164.13:443
telegra.ph
Telegram Messenger Inc
GB
unknown
6592
WerFault.exe
52.182.143.212:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.46
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
telegra.ph
  • 149.154.164.13
malicious
watson.events.data.microsoft.com
  • 52.182.143.212
whitelisted

Threats

No threats detected
Process
Message
Launcher.exe
url before fix: https://telegra.ph/bigmachonok-07-09
Launcher.exe
url after fix: https://telegra.ph/bigmachonok-07-09