File name:

SecuriteInfo.com.Win32.Malware-gen.26009.9463

Full analysis: https://app.any.run/tasks/5e9d6e2f-2e75-4a94-81a9-16e98a92aa30
Verdict: Malicious activity
Analysis date: August 04, 2024, 14:24:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
proxy
goproxy
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

923EC5C02989F28B859F51C6956B5AD1

SHA1:

FC483ECCE6307A9B0FEFF06876D70EC766D9B3EE

SHA256:

C3C657FA980E2DDCD6FC94D3464FEA9816A4D5803C6EC80DEE6A8B11FED28D36

SSDEEP:

98304:Md5eoRgrVRwuxVlqAoewLpTLZsaqcAata7:Z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe (PID: 6480)
    • Connects to the CnC server

      • SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe (PID: 6480)
    • GOPROXY has been detected (SURICATA)

      • SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe (PID: 6480)
  • SUSPICIOUS

    • Connects to unusual port

      • SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe (PID: 6480)
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe (PID: 6480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 3
CodeSize: 4199424
InitializedDataSize: 185856
UninitializedDataSize: -
EntryPoint: 0x601b0
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GOPROXY securiteinfo.com.win32.malware-gen.26009.9463.exe

Process information

PID
CMD
Path
Indicators
Parent process
6480"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malware-gen.26009.9463.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
Total events
1 651
Read events
1 405
Write events
246
Delete events
0

Modification events

(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-462
Value:
Afghanistan Standard Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-461
Value:
Afghanistan Daylight Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-222
Value:
Alaskan Standard Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-221
Value:
Alaskan Daylight Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2392
Value:
Aleutian Standard Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2391
Value:
Aleutian Daylight Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2162
Value:
Altai Standard Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2161
Value:
Altai Daylight Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-392
Value:
Arab Standard Time
(PID) Process:(6480) SecuriteInfo.com.Win32.Malware-gen.26009.9463.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-391
Value:
Arab Daylight Time
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
58
DNS requests
19
Threats
54

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
GET
429
195.2.70.38:30001
http://195.2.70.38:30001/api/helper-first-register?buildVersion=0Amd.uww2FVQ&md5=923ec5c02989f28b859f51c6956b5ad1&proxyPassword=acoplus&proxyUsername=acoplus&userId=4Sq6S3QBDg2k0LXayTco4Skn
unknown
unknown
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
GET
429
77.238.250.123:30001
http://77.238.250.123:30001/api/helper-first-register?buildVersion=0Amd.uww2FVQ&md5=923ec5c02989f28b859f51c6956b5ad1&proxyPassword=acoplus&proxyUsername=acoplus&userId=4Sq6S3QBDg2k0LXayTco4Skn
unknown
unknown
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
GET
429
77.238.229.63:30001
http://77.238.229.63:30001/api/helper-first-register?buildVersion=0Amd.uww2FVQ&md5=923ec5c02989f28b859f51c6956b5ad1&proxyPassword=acoplus&proxyUsername=acoplus&userId=4Sq6S3QBDg2k0LXayTco4Skn
unknown
unknown
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
GET
429
91.142.74.28:30001
http://91.142.74.28:30001/api/helper-first-register?buildVersion=0Amd.uww2FVQ&md5=923ec5c02989f28b859f51c6956b5ad1&proxyPassword=acoplus&proxyUsername=acoplus&userId=4Sq6S3QBDg2k0LXayTco4Skn
unknown
unknown
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
GET
429
77.238.224.56:30001
http://77.238.224.56:30001/api/helper-first-register?buildVersion=0Amd.uww2FVQ&md5=923ec5c02989f28b859f51c6956b5ad1&proxyPassword=acoplus&proxyUsername=acoplus&userId=4Sq6S3QBDg2k0LXayTco4Skn
unknown
unknown
3044
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3044
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6756
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6816
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4936
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3140
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
195.2.70.38:30001
Hosting technology LTD
RU
malicious
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
91.142.74.28:30001
VIP-TELECOM-SERVICE Ltd.
RU
malicious
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
77.238.224.56:30001
Tele.RU Ltd.
RU
malicious
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
77.238.229.63:30001
Tele.RU Ltd.
RU
malicious
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
77.238.250.123:30001
Tele.RU Ltd.
RU
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.bing.com
  • 95.100.146.35
  • 95.100.146.25
  • 95.100.146.17
  • 95.100.146.10
  • 95.100.146.40
  • 95.100.146.33
  • 95.100.146.32
  • 95.100.146.26
  • 95.100.146.27
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.73
  • 20.190.159.0
  • 40.126.31.67
  • 20.190.159.4
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.68
whitelisted
client.wns.windows.com
  • 40.113.103.199
  • 40.115.3.253
whitelisted
th.bing.com
  • 95.100.146.32
  • 95.100.146.27
  • 95.100.146.25
  • 95.100.146.35
  • 95.100.146.17
  • 95.100.146.10
  • 95.100.146.26
  • 95.100.146.33
  • 95.100.146.40
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

PID
Process
Class
Message
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
A Network Trojan was detected
PROXY [ANY.RUN] GoProxy Check-in
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
A Network Trojan was detected
PROXY [ANY.RUN] GoProxy Check-in
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
A Network Trojan was detected
PROXY [ANY.RUN] GoProxy Check-in
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
A Network Trojan was detected
PROXY [ANY.RUN] GoProxy Check-in
6480
SecuriteInfo.com.Win32.Malware-gen.26009.9463.exe
A Network Trojan was detected
PROXY [ANY.RUN] GoProxy Check-in
18 ETPRO signatures available at the full report
No debug info