File name:

injector.exe

Full analysis: https://app.any.run/tasks/590ab5b7-64a5-4ea0-abd8-6fcd8b849eb8
Verdict: Malicious activity
Analysis date: October 26, 2023, 11:39:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
sinkhole
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

448064E48D4D61F213FB8889D672EE46

SHA1:

CDEE079DBA3325980192938B05AB661801612F24

SHA256:

CB936C01E3BF684DC3E48EBDDAA711ABB3E6C2175975715D6B09F6D76F13C405

SSDEEP:

384:U6q/rquCaNc3jMk3FHsFeH7xWst15Buv:UWuCAvqB70st15BG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • injector.exe (PID: 2328)
    • Creates a writable file the system directory

      • injector.exe (PID: 2328)
    • Changes the autorun value in the registry

      • injector.exe (PID: 2328)
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • injector.exe (PID: 2328)
    • Reads the Internet Settings

      • injector.exe (PID: 2328)
    • Connects to SMTP port

      • injector.exe (PID: 2328)
  • INFO

    • Checks supported languages

      • injector.exe (PID: 2328)
      • wmpnscfg.exe (PID: 576)
    • Reads the computer name

      • injector.exe (PID: 2328)
      • wmpnscfg.exe (PID: 576)
    • Reads the machine GUID from the registry

      • injector.exe (PID: 2328)
      • wmpnscfg.exe (PID: 576)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:26 13:27:56+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 13312
InitializedDataSize: 20992
UninitializedDataSize: -
EntryPoint: 0x154c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start runas.exe no specs injector.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
576"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2328C:\Users\admin\Desktop\injector.exeC:\Users\admin\Desktop\injector.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\injector.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2752"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\injector.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\runas.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
587
Read events
344
Write events
238
Delete events
5

Modification events

(PID) Process:(2328) injector.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2328) injector.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:ProxyBypass
Value:
0
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:IntranetName
Value:
0
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2328) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2328injector.exeC:\Windows\system32\userini.exeexecutable
MD5:448064E48D4D61F213FB8889D672EE46
SHA256:CB936C01E3BF684DC3E48EBDDAA711ABB3E6C2175975715D6B09F6D76F13C405
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
982
DNS requests
375
Threats
231

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2328
injector.exe
GET
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.8 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.7 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.6 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.7 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.8 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.8 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.4 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.5 Kb
unknown
2328
injector.exe
GET
200
18.158.249.75:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
text
70.7 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
2328
injector.exe
18.158.249.75:80
32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app
AMAZON-02
DE
unknown
2328
injector.exe
98.136.96.92:25
mx-aol.mail.gm0.yahoodns.net
YAHOO-NE1
US
unknown
2328
injector.exe
80.12.26.32:25
smtp-in.orange.fr
Orange
FR
unknown
2328
injector.exe
104.47.58.161:25
hotmail-com.olc.protection.outlook.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2328
injector.exe
67.219.246.209:25
cluster4.us.messagelabs.com
AMAZON-AES
US
unknown
2328
injector.exe
67.195.204.82:25
mx-rogers.mail.am0.yahoodns.net
YAHOO-BF1
US
unknown

DNS requests

Domain
IP
Reputation
32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app
  • 18.158.249.75
  • 3.124.142.205
  • 18.192.31.165
  • 3.125.209.94
  • 3.125.223.134
  • 3.125.102.39
unknown
aol.com
unknown
mx-aol.mail.gm0.yahoodns.net
  • 98.136.96.92
  • 67.195.228.84
  • 67.195.204.75
  • 67.195.204.80
  • 98.136.96.93
  • 67.195.228.86
unknown
orange.fr
unknown
smtp-in.orange.fr
  • 80.12.26.32
unknown
hotmail.com
unknown
hotmail-com.olc.protection.outlook.com
  • 104.47.58.161
  • 104.47.57.161
  • 104.47.56.161
  • 104.47.22.161
  • 104.47.18.225
  • 104.47.73.161
  • 104.47.73.33
  • 104.47.55.161
  • 104.47.66.33
  • 104.47.14.33
  • 104.47.12.33
  • 104.47.58.33
  • 104.47.55.33
  • 104.47.17.161
  • 104.47.17.97
  • 104.47.11.225
  • 104.47.11.33
shared
ford.com
unknown
cluster4.us.messagelabs.com
  • 67.219.246.209
  • 67.219.246.216
  • 67.219.247.97
  • 67.219.247.193
  • 67.219.250.211
  • 67.219.250.216
unknown
rogers.com
unknown

Threats

PID
Process
Class
Message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP data command rejected
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP data command rejected
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
2328
injector.exe
Generic Protocol Command Decode
SURICATA SMTP no server welcome message
12 ETPRO signatures available at the full report
No debug info