File name:

KBDYAK.exe

Full analysis: https://app.any.run/tasks/0128afa9-1c51-4769-901a-cce78743eeb8
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: June 17, 2024, 13:46:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A4513379DAD5233AFA402CC56A8B9222

SHA1:

805727279208DE9CF49E6374B1F3A6DC0052620E

SHA256:

CCD380EA868FFAD4F960D7455FECF88C2AC3550001BBB6C21C31AE70B3BBF4F6

SSDEEP:

6144:/TaQZdJnaB1kNOlFSm9tc6c6c6c6c6c6c6c6c6csImOksMWNIDK5:/GQfJyFrz7i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • KBDYAK.exe (PID: 3976)
    • Connects to the CnC server

      • msctfp.exe (PID: 4016)
    • EMOTET has been detected (SURICATA)

      • msctfp.exe (PID: 4016)
  • SUSPICIOUS

    • Starts itself from another location

      • KBDYAK.exe (PID: 3976)
    • Executable content was dropped or overwritten

      • KBDYAK.exe (PID: 3976)
    • Reads the Internet Settings

      • msctfp.exe (PID: 4016)
    • Reads security settings of Internet Explorer

      • msctfp.exe (PID: 4016)
  • INFO

    • Reads the machine GUID from the registry

      • KBDYAK.exe (PID: 3976)
      • msctfp.exe (PID: 4016)
    • Checks supported languages

      • KBDYAK.exe (PID: 3976)
      • msctfp.exe (PID: 4016)
      • wmpnscfg.exe (PID: 1292)
    • Reads the computer name

      • KBDYAK.exe (PID: 3976)
      • msctfp.exe (PID: 4016)
      • wmpnscfg.exe (PID: 1292)
    • Checks proxy server information

      • msctfp.exe (PID: 4016)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (38.7)
.exe | Win64 Executable (generic) (34.3)
.scr | Windows screen saver (16.2)
.exe | Win32 Executable (generic) (5.6)
.exe | Generic Win/DOS Executable (2.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:08:28 16:38:33+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 98304
InitializedDataSize: 778240
UninitializedDataSize: -
EntryPoint: 0x4878
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: TestDigitalControl Microsoft
FileVersion: 1, 0, 0, 1
InternalName: TestDigitalControl
LegalCopyright: °æÈ¨ËùÓÐ (C) 2007
LegalTrademarks: -
OriginalFileName: TestDigitalControl.EXE
PrivateBuild: -
ProductName: TestDigitalControl
ProductVersion: 1, 0, 0, 1
SpecialBuild: -
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start kbdyak.exe #EMOTET msctfp.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1292"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3976"C:\Users\admin\AppData\Local\Temp\KBDYAK.exe" C:\Users\admin\AppData\Local\Temp\KBDYAK.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\kbdyak.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
4016"C:\Users\admin\AppData\Local\comcat\msctfp.exe"C:\Users\admin\AppData\Local\comcat\msctfp.exe
KBDYAK.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TestDigitalControl Microsoft
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\comcat\msctfp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
Total events
1 374
Read events
1 314
Write events
48
Delete events
12

Modification events

(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4016) msctfp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47}
Operation:writeName:WpadDecisionReason
Value:
1
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3976KBDYAK.exeC:\Users\admin\AppData\Local\comcat\msctfp.exeexecutable
MD5:A4513379DAD5233AFA402CC56A8B9222
SHA256:CCD380EA868FFAD4F960D7455FECF88C2AC3550001BBB6C21C31AE70B3BBF4F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
28
DNS requests
5
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4016
msctfp.exe
POST
301
45.55.36.51:443
http://45.55.36.51:443/GCkjH0z71uEmzPJz/oBR0Ri9q26d/ujozvnsN5d8/um1ZbRLrtf6IZOjzJ/y400LQugMIP2NOb6/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
4016
msctfp.exe
67.68.210.95:80
BACOM
CA
unknown
4016
msctfp.exe
162.241.242.173:8080
UNIFIEDLAYER-AS-1
US
unknown
4016
msctfp.exe
45.55.36.51:443
DIGITALOCEAN-ASN
US
unknown
4016
msctfp.exe
45.55.219.163:443
DIGITALOCEAN-ASN
US
unknown
4016
msctfp.exe
68.188.112.97:80
CHARTER-20115
US
unknown
4016
msctfp.exe
46.105.131.79:8080
OVH SAS
FR
unknown
4016
msctfp.exe
78.24.219.147:8080
JSC IOT
RU
unknown

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
4016
msctfp.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
4016
msctfp.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
4016
msctfp.exe
A Network Trojan was detected
ET MALWARE Win32/Emotet CnC Activity (POST) M9
No debug info