File name:

injector.exe

Full analysis: https://app.any.run/tasks/8d644595-e9cd-41f6-b417-043cba47324d
Verdict: Malicious activity
Analysis date: January 21, 2024, 13:13:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

448064E48D4D61F213FB8889D672EE46

SHA1:

CDEE079DBA3325980192938B05AB661801612F24

SHA256:

CB936C01E3BF684DC3E48EBDDAA711ABB3E6C2175975715D6B09F6D76F13C405

SSDEEP:

384:U6q/rquCaNc3jMk3FHsFeH7xWst15Buv:UWuCAvqB70st15BG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • runas.exe (PID: 2044)
      • injector.exe (PID: 2208)
    • Creates a writable file in the system directory

      • injector.exe (PID: 2208)
    • Changes the autorun value in the registry

      • injector.exe (PID: 2208)
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • injector.exe (PID: 2208)
    • Reads the Internet Settings

      • injector.exe (PID: 2208)
    • Executable content was dropped or overwritten

      • injector.exe (PID: 2208)
    • Reads security settings of Internet Explorer

      • injector.exe (PID: 2208)
    • Reads settings of System Certificates

      • injector.exe (PID: 2208)
    • Checks Windows Trust Settings

      • injector.exe (PID: 2208)
    • Adds/modifies Windows certificates

      • injector.exe (PID: 2208)
  • INFO

    • Checks supported languages

      • injector.exe (PID: 2208)
    • Reads the computer name

      • injector.exe (PID: 2208)
    • Reads the machine GUID from the registry

      • injector.exe (PID: 2208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:26 13:27:56+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 13312
InitializedDataSize: 20992
UninitializedDataSize: -
EntryPoint: 0x154c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start runas.exe no specs injector.exe

Process information

PID
CMD
Path
Indicators
Parent process
2044"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\injector.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2208C:\Users\admin\Desktop\injector.exeC:\Users\admin\Desktop\injector.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\injector.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
Total events
5 807
Read events
5 710
Write events
93
Delete events
4

Modification events

(PID) Process:(2208) injector.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2208) injector.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Operation:writeName:userini
Value:
C:\Windows\system32\userini.exe
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:ProxyBypass
Value:
0
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:IntranetName
Value:
0
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2208) injector.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
10
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2208injector.exeC:\Users\ADMINI~1\AppData\Local\Temp\Cab4179.tmpcompressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2208injector.exeC:\Windows\system32\userini.exeexecutable
MD5:448064E48D4D61F213FB8889D672EE46
SHA256:CB936C01E3BF684DC3E48EBDDAA711ABB3E6C2175975715D6B09F6D76F13C405
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:5CCEC59F2882F4905BD9ED7FD17E6448
SHA256:C56E2A7DD346BCBE5C0B6E9E1C126AE294F1360B2FD5934B14AE07441F1211FD
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:8329D489853C0F6DE5D26AC0B3F9116B
SHA256:954896FBE8D38AE8361A91D00AB51A90190347ECDA809A71131813B91ED7B5A3
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:60FE01DF86BE2E5331B0CDBE86165686
SHA256:C08CCBC876CD5A7CDFA9670F9637DA57F6A1282198A9BC71FC7D7247A6E5B7A8
2208injector.exeC:\Users\ADMINI~1\AppData\Local\Temp\Tar417A.tmpbinary
MD5:9C0C641C06238516F27941AA1166D427
SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:2D49B003055C55D349E68B1427626B74
SHA256:4E10E6F7801DADEA50F429DEEAE92D4D24F08E994D90F5A4C26787E59E852B2F
2208injector.exeC:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0328AFE0B44E13D2CF647D059EBC3DFbinary
MD5:EE2F81EAC7417CAC9319A8461D443CDB
SHA256:F1A85436942267FCDE094FA848792BDE25D8915C0781C7181D0A69F45EF49CA8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
11
DNS requests
4
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2208
injector.exe
GET
307
3.125.223.134:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
html
111 b
unknown
2208
injector.exe
GET
200
2.23.176.63:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?722ea6196f9e5944
unknown
compressed
4.66 Kb
unknown
2208
injector.exe
GET
200
2.23.176.63:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3a150d8513e32e4b
unknown
compressed
65.2 Kb
unknown
2208
injector.exe
GET
200
104.108.145.136:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
2208
injector.exe
GET
200
88.221.221.224:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPuMSrZIUiHzhl0Ccc8ys%2F0hw%3D%3D
unknown
binary
503 b
unknown
2208
injector.exe
GET
307
3.125.223.134:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
html
111 b
unknown
2208
injector.exe
GET
307
3.125.223.134:80
http://32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app/page.php
unknown
html
111 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2208
injector.exe
3.125.223.134:80
32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app
AMAZON-02
DE
malicious
2208
injector.exe
3.125.223.134:443
32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app
AMAZON-02
DE
malicious
2208
injector.exe
2.23.176.63:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
2208
injector.exe
104.108.145.136:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
2208
injector.exe
88.221.221.224:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
32a2-2a01-e34-ec67-99e0-2911-f69e-8593-8211.ngrok-free.app
  • 3.125.223.134
unknown
ctldl.windowsupdate.com
  • 2.23.176.63
whitelisted
x1.c.lencr.org
  • 104.108.145.136
whitelisted
r3.o.lencr.org
  • 88.221.221.224
shared

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to *.ngrok Domain (ngrok .app)
3 ETPRO signatures available at the full report
No debug info