File name:

0f1278e0606fb786114c66a67c2a6425.exe

Full analysis: https://app.any.run/tasks/897c360a-d7b1-47f8-8a84-1d5f5251a4f5
Verdict: Malicious activity
Analysis date: December 02, 2023, 17:11:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0F1278E0606FB786114C66A67C2A6425

SHA1:

2128E3685998B227E4A1AC33313C444113823960

SHA256:

CC9CC644F51AE4DB1B77207F2CF9EF624ED5624E64B55513A2D4056534DBCF70

SSDEEP:

98304:EawLGKjcBbWzK1XrlC3Waie8kQ5yEzfC/t1jPev+7sYRKvhya+MYqQz83O7qImBx:EXg2hLJapEeRh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
    • Uses Task Scheduler to run other applications

      • XRJNZC.exe (PID: 2728)
  • SUSPICIOUS

    • Reads the BIOS version

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
      • XRJNZC.exe (PID: 2728)
      • XRJNZC.exe (PID: 1772)
    • Executing commands from a ".bat" file

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1940)
    • Starts CMD.EXE for commands execution

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
    • Reads the Internet Settings

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
      • XRJNZC.exe (PID: 2728)
    • The process executes via Task Scheduler

      • XRJNZC.exe (PID: 1772)
  • INFO

    • Create files in a temporary directory

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
    • Checks supported languages

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
      • XRJNZC.exe (PID: 2728)
      • XRJNZC.exe (PID: 1772)
    • Creates files in the program directory

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
    • Reads the computer name

      • 0f1278e0606fb786114c66a67c2a6425.exe (PID: 1584)
      • XRJNZC.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:11:15 19:26:29+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 166912
InitializedDataSize: 436736
UninitializedDataSize: -
EntryPoint: 0xa5eb00
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.5.0.12
ProductVersionNumber: 4.5.0.12
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Atom.SDK.Core
FileVersion: 4.5.0.12
InternalName: Atom.SDK.Core.dll
LegalCopyright: Copyright 2023
LegalTrademarks: -
OriginalFileName: Atom.SDK.Core.dll
ProductName: Atom.SDK.Core
ProductVersion: 4.5.0.12
AssemblyVersion: 4.5.0.12
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 0f1278e0606fb786114c66a67c2a6425.exe no specs cmd.exe no specs timeout.exe no specs xrjnzc.exe no specs schtasks.exe no specs xrjnzc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1036"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /fC:\Windows\SysWOW64\schtasks.exeXRJNZC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1584"C:\Users\admin\AppData\Local\Temp\0f1278e0606fb786114c66a67c2a6425.exe" C:\Users\admin\AppData\Local\Temp\0f1278e0606fb786114c66a67c2a6425.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Atom.SDK.Core
Exit code:
0
Version:
4.5.0.12
Modules
Images
c:\users\admin\appdata\local\temp\0f1278e0606fb786114c66a67c2a6425.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1772C:\ProgramData\pinterests\XRJNZC.exe C:\ProgramData\pinterests\XRJNZC.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Atom.SDK.Core
Exit code:
0
Version:
4.5.0.12
Modules
Images
c:\programdata\pinterests\xrjnzc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1940C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\s180.0.bat" "C:\Windows\SysWOW64\cmd.exe0f1278e0606fb786114c66a67c2a6425.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2728"C:\ProgramData\pinterests\XRJNZC.exe" C:\ProgramData\pinterests\XRJNZC.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Atom.SDK.Core
Exit code:
0
Version:
4.5.0.12
Modules
Images
c:\programdata\pinterests\xrjnzc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
3052timeout 3 C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
887
Read events
871
Write events
16
Delete events
0

Modification events

(PID) Process:(1584) 0f1278e0606fb786114c66a67c2a6425.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1584) 0f1278e0606fb786114c66a67c2a6425.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1584) 0f1278e0606fb786114c66a67c2a6425.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1584) 0f1278e0606fb786114c66a67c2a6425.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2728) XRJNZC.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2728) XRJNZC.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2728) XRJNZC.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2728) XRJNZC.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
15840f1278e0606fb786114c66a67c2a6425.exeC:\Users\admin\AppData\Local\Temp\s180.0.battext
MD5:C0AF8A87FAF01FE7B5AC81B93089C91E
SHA256:5C8974BD6CE8E94DED0528337FCB3AB8FE46766651082A25BF0D72A5671C4F48
15840f1278e0606fb786114c66a67c2a6425.exeC:\ProgramData\pinterests\XRJNZC.exeexecutable
MD5:0F1278E0606FB786114C66A67C2A6425
SHA256:CC9CC644F51AE4DB1B77207F2CF9EF624ED5624E64B55513A2D4056534DBCF70
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info