File name:

c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c

Full analysis: https://app.any.run/tasks/c5873a93-f13f-491f-9770-3e5f89208acb
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:24:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

865467D9458F7044F67D145147EDF7CD

SHA1:

0A5F21D328DECD0503501A06F985C329ECED4C88

SHA256:

C8F95DD6BAF64AAED613BC29BA444B6F4D0CB15C48332380FA7ECD2AAC64E88C

SSDEEP:

3072:oSvVVVVVVVVwgWsgW2uFN1u8h55q8I+r8xLhWJEd2aNB415kUe7/w6:oSvVVVVVVVVguFTDhfqfWJUNo5kUe7/T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
    • The process creates files with name similar to system file names

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
  • INFO

    • Creates files or folders in the user directory

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
    • Checks supported languages

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
    • UPX packer has been detected

      • c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe (PID: 6232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.2)
.dll | Win32 Dynamic Link Library (generic) (15.6)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 4096
UninitializedDataSize: 24576
EntryPoint: 0x7f80
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe

Process information

PID
CMD
Path
Indicators
Parent process
6232"C:\Users\admin\Desktop\c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe" C:\Users\admin\Desktop\c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 453
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exe
MD5:
SHA256:
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:8CF4C08BEBEA3F28C2468C8CD98311A3
SHA256:DCAE0CF2133761E7972C400054C214C9D1F6EB3074A8CD193B1E0CC55CEB2F04
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:F91F6039A1C3B08F822EB08AB26ED2F1
SHA256:8B1CB53691CD8F8EEFBC1C88E4FB2C1A340877665CE5848D7CB29C6F741E28CF
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmpexecutable
MD5:937639561F7370B49A14EFED5F769FAD
SHA256:0ACA38A64AF6120D38F820168A624C187AB6BC81E9D0AA009D4513942F6F708D
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:8399BDCADA4D99515CF55250CF3081A8
SHA256:CE5DA7A3DBBE739543CEB91AEE42206347532D31BAA0ADBD6351C0DC39E410BF
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmpexecutable
MD5:97C04C5A862548C5B5B828C28AB06BB3
SHA256:BAB9518F3D5B0C2EB76C7CDD3004360A3110E5A2E43FDC480C610F2441F70C9B
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:953927049E193B32AB502218AE90945D
SHA256:1E105A8384ED0250CE99F8658470CB7C6233FB463CEA645EA74F1AB4BC1A78FD
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe.tmpexecutable
MD5:E20E2716C94B1B914F02E22A92E71585
SHA256:C0C939DDD8CFF5DC0CDDDE68B47458F5561EDD022AD00B2148B27C5633E2F33A
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:C69A65E57005D6DFB510CF21C29ED86A
SHA256:12BFAF0F67FD2CAF89FEE711318118AC697CC45FBE4F9001F82345C8A492048B
6232c8f95dd6baf64aaed613bc29ba444b6f4d0cb15c48332380fa7ecd2aac64e88c.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe.tmpexecutable
MD5:3D0FA946A5714E17E8A63A5B126739A0
SHA256:4FAEDDED755B5F9DDBA3182403D8DA4E8CEF7BAD3F25A2410EAA96B26742C952
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3032
RUXIMICS.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2736
svchost.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3032
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2736
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
2736
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3032
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2736
svchost.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3032
RUXIMICS.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2736
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.182
  • 2.23.209.130
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.187
  • 2.23.209.140
  • 2.23.209.179
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 20.42.65.89
whitelisted

Threats

No threats detected
No debug info