File name:

cee576f6d4d05bfb4f0e0704a4712af10b0afcb369407f5edf3526145a53a685.exe

Full analysis: https://app.any.run/tasks/cf976b53-8f3c-4bef-aa80-d7a6b1db3245
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: May 18, 2024, 22:50:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
backdoor
badspace
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5:

12AA84E2E56AE684D211679072695906

SHA1:

FB91125F7D84381A517CC8B83823B917C0E1FACA

SHA256:

CEE576F6D4D05BFB4F0E0704A4712AF10B0AFCB369407F5EDF3526145A53A685

SSDEEP:

3072:gNsbljWEcB1KpmjlBJ4sxpUO5RUCavO0zkWV3LS:zblSEcBZlwsxpUO5BNJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • regsvr32.exe (PID: 6224)
    • Unusual connection from system programs

      • rundll32.exe (PID: 6996)
    • Connects to the CnC server

      • rundll32.exe (PID: 6996)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • regsvr32.exe (PID: 6224)
    • The process executes via Task Scheduler

      • rundll32.exe (PID: 6996)
    • Searches for installed software

      • rundll32.exe (PID: 6996)
    • Connects to the server without a host name

      • rundll32.exe (PID: 6996)
  • INFO

    • Creates files in the program directory

      • regsvr32.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 6996)
    • Reads the software policy settings

      • slui.exe (PID: 5620)
    • Checks proxy server information

      • rundll32.exe (PID: 6996)
    • Creates files or folders in the user directory

      • rundll32.exe (PID: 6996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2017:12:22 18:53:39+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14
CodeSize: 90112
InitializedDataSize: 60416
UninitializedDataSize: -
EntryPoint: 0x80a0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start regsvr32.exe rundll32.exe sppextcomobj.exe no specs slui.exe filecoauth.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1208C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2588C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2764C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5620"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6224"C:\WINDOWS\System32\regsvr32.exe" C:\Users\admin\AppData\Local\Temp\cee576f6d4d05bfb4f0e0704a4712af10b0afcb369407f5edf3526145a53a685.exe.dllC:\Windows\System32\regsvr32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6996"C:\WINDOWS\system32\rundll32.exe" "C:\ProgramData\RtlCpl\RtlCpl.dll",Start /pC:\Windows\System32\rundll32.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
1 916
Read events
1 912
Write events
4
Delete events
0

Modification events

(PID) Process:(6996) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6996) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6996) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2764) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
Executable files
1
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1208FileCoAuth.exeC:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-05-18.2252.1208.1.odlbinary
MD5:86442CFA5B62FC3FA9E723ED0403A998
SHA256:F4E7868B0B0346B64DE8860AB0719808CD5EFBC7ACAB287C3706A431E793396A
6996rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\13UTP64T.htmbinary
MD5:328235BEF59599CA93504FB142C7E9B2
SHA256:D214355692C767260D3D5D61F9377DA1B8F134CE11141EF6FFC17C8998E7B0F3
1208FileCoAuth.exeC:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-05-18.2252.1208.1.aodlbinary
MD5:28DCA2FF4B34B5A52A2E59DF202A6ED3
SHA256:33BACCB7296F1ED1F995FC77A23049F261CF391AC0388F9E8DD161F8C17B7F94
6224regsvr32.exeC:\ProgramData\RtlCpl\RtlCpl.dllexecutable
MD5:12AA84E2E56AE684D211679072695906
SHA256:CEE576F6D4D05BFB4F0E0704A4712AF10B0AFCB369407F5EDF3526145A53A685
6224regsvr32.exeC:\WINDOWS\Tasks\RtlCpl.jobbinary
MD5:D3D70DB22F15C3BB37FF429099FFE869
SHA256:E332670FBA203F04E4A1424806426AD5697D59BD0B493A058DD80A41621250BB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
71
DNS requests
20
Threats
23

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6996
rundll32.exe
GET
400
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
6996
rundll32.exe
GET
400
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
6996
rundll32.exe
GET
400
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
5004
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5004
svchost.exe
GET
200
104.119.109.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
4680
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
3052
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6996
rundll32.exe
GET
200
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
6996
rundll32.exe
POST
400
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
6996
rundll32.exe
POST
400
185.49.69.41:80
http://185.49.69.41/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4364
svchost.exe
239.255.255.250:1900
unknown
5004
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5612
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5140
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5004
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5004
svchost.exe
104.119.109.218:80
www.microsoft.com
AKAMAI-AS
DE
unknown
4680
SearchApp.exe
2.23.209.133:443
Akamai International B.V.
GB
unknown
4
System
192.168.100.255:137
whitelisted
4680
SearchApp.exe
2.23.209.182:443
Akamai International B.V.
GB
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 104.119.109.218
  • 95.101.149.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.140
whitelisted
go.microsoft.com
  • 23.43.62.58
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
www.bing.com
  • 2.19.120.29
  • 2.19.120.21
whitelisted

Threats

PID
Process
Class
Message
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (GET)
6996
rundll32.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (POST)
6996
rundll32.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (POST)
6996
rundll32.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (POST)
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (GET)
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (GET)
6996
rundll32.exe
A Network Trojan was detected
ET MALWARE W32/Badspace.Backdoor CnC Activity (GET)
No debug info