File name:

kswapd0

Full analysis: https://app.any.run/tasks/9ace8dd4-6f5b-471d-89d0-b677629c6535
Verdict: Malicious activity
Analysis date: July 03, 2024, 09:48:58
OS: Ubuntu 22.04.2
Indicators:
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
MD5:

C442535BC9BBDAA09B53D5FB948EDF11

SHA1:

859AA929157D58F0DD01530D06BD27FF123CF297

SHA256:

C4E5FDBD9CBB6F03B553BEE7B32EC33E08FE81085A3FBB4F45208781662B43CD

SSDEEP:

98304:gFHQrhRrTNpiadQgXxSU6x6lSF2HNAWDqOlqwrwBOCP0DDvMh9bhe6Twn/G8qbaV:Rt7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • bash (PID: 12941)
      • kswapd0.o (PID: 12939)
    • Checks DMI information (probably VM detection)

      • kswapd0.o (PID: 12939)
    • Modifies file or directory owner

      • sudo (PID: 12935)
    • Executes the "rm" command to delete files or directories

      • sh (PID: 12946)
      • sh (PID: 12950)
    • Removes file immutable attribute

      • sh (PID: 12950)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • kswapd0.o (PID: 12939)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (49.8)

EXIF

EXE

CPUArchitecture: 64 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: AMD x86-64
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
243
Monitored processes
29
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
systemctl no specs systemctl no specs sh no specs sudo no specs chown no specs chmod no specs sudo no specs kswapd0.o no specs locale-check no specs bash no specs sh no specs tr no specs mesg no specs cat no specs sh no specs rm no specs mkdir no specs chmod no specs sh no specs chattr no specs rm no specs chattr no specs rm no specs systemctl no specs systemctl no specs kswapd0.o systemctl no specs systemctl no specs systemctl no specs

Process information

PID
CMD
Path
Indicators
Parent process
12932systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12933systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12934/bin/sh -c "sudo chown user /tmp/kswapd0\.o && chmod +x /tmp/kswapd0\.o && DISPLAY=:0 sudo -i /tmp/kswapd0\.o "/bin/shany-guest-agent
User:
user
Integrity Level:
UNKNOWN
12935sudo chown user /tmp/kswapd0.o/usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
12936chown user /tmp/kswapd0.o/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12937chmod +x /tmp/kswapd0.o/usr/bin/chmodsh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
12938sudo -i /tmp/kswapd0.o/usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
482
12939/tmp/kswapd0.o/tmp/kswapd0.osudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
482
12940/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkkswapd0.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12941-bash --login -c \/tmp\/kswapd0\.o/usr/bin/bashkswapd0.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
12939kswapd0.o/root/cert_key.pemtext
MD5:
SHA256:
12939kswapd0.o/root/cert.pemtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
7
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
470
avahi-daemon
224.0.0.251:5353
unknown
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
malicious
485
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
485
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
12957
kswapd0.o
179.43.139.84:80
Private Layer INC
CH
unknown

DNS requests

Domain
IP
Reputation
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.55
  • 185.125.188.54
  • 185.125.188.59
unknown
43.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::22
  • 2001:67c:1562::23
  • 2620:2d:4002:1::197
  • 2001:67c:1562::24
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::23
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::97
  • 2620:2d:4002:1::198
unknown

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info