File name:

CleanThis.exe

Full analysis: https://app.any.run/tasks/1bf6a351-08a0-4c13-9b56-ae3df8b3d075
Verdict: Malicious activity
Analysis date: December 09, 2023, 01:32:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

A50FC0DA1D2B3C4AA8A6ADACCF69A5DE

SHA1:

E001F4043AB4BE644EA10E0D65303D6E57B31FFE

SHA256:

CF6EB8377789E316629C0396A2DBB53C69B5FD67BBD0E7163B8D305AAA756E90

SSDEEP:

12288:EQIfqOiX9P/aazd1ctyDXHrJW2dGMToCRn5VxWRaqsrOkqgyQDd:EQIydX/d1rTLRd/TvVUsrOkqFQDd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Change Internet Settings

      • CleanThis.exe (PID: 280)
      • gog.exe (PID: 1028)
    • Drops the executable file immediately after the start

      • CleanThis.exe (PID: 280)
    • Creates a writable file in the system directory

      • svchost.exe (PID: 904)
      • svchost.exe (PID: 1284)
    • Steals credentials from Web Browsers

      • taskhost.exe (PID: 332)
    • Changes the login/logoff helper path in the registry

      • gog.exe (PID: 1028)
    • Changes Security Center notification settings

      • svchost.exe (PID: 780)
  • SUSPICIOUS

    • Reads the Internet Settings

      • CleanThis.exe (PID: 280)
      • gog.exe (PID: 1028)
      • sipnotify.exe (PID: 1804)
    • Reads Microsoft Outlook installation path

      • CleanThis.exe (PID: 280)
    • Reads Internet Explorer settings

      • CleanThis.exe (PID: 280)
    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 820)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1804)
  • INFO

    • Checks supported languages

      • CleanThis.exe (PID: 280)
      • CleanThis.exe (PID: 3112)
      • gog.exe (PID: 1028)
      • IMEKLMG.EXE (PID: 2124)
      • wmpnscfg.exe (PID: 2388)
      • IMEKLMG.EXE (PID: 2108)
      • wmpnscfg.exe (PID: 2432)
      • mscorsvw.exe (PID: 2796)
    • Reads the computer name

      • CleanThis.exe (PID: 280)
      • CleanThis.exe (PID: 3112)
      • IMEKLMG.EXE (PID: 2108)
      • IMEKLMG.EXE (PID: 2124)
      • wmpnscfg.exe (PID: 2432)
      • wmpnscfg.exe (PID: 2388)
      • mscorsvw.exe (PID: 2796)
      • gog.exe (PID: 1028)
    • Reads the machine GUID from the registry

      • CleanThis.exe (PID: 280)
    • Checks proxy server information

      • CleanThis.exe (PID: 280)
    • Creates files or folders in the user directory

      • CleanThis.exe (PID: 280)
    • Manual execution by a user

      • CleanThis.exe (PID: 3112)
      • smss.exe (PID: 392)
      • smss.exe (PID: 332)
    • Reads the time zone

      • svchost.exe (PID: 780)
      • services.exe (PID: 504)
      • svchost.exe (PID: 1404)
    • Reads the Internet Settings

      • explorer.exe (PID: 1808)
    • Process checks are UAC notifies on

      • IMEKLMG.EXE (PID: 2108)
      • IMEKLMG.EXE (PID: 2124)
    • Creates files in the program directory

      • SearchIndexer.exe (PID: 2328)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (38.2)
.exe | Win32 EXE Yoda's Crypter (37.5)
.dll | Win32 Dynamic Link Library (generic) (9.2)
.exe | Win32 Executable (generic) (6.3)
.exe | Win16/32 Executable Delphi generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:05:02 23:13:07+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 598016
InitializedDataSize: 40960
UninitializedDataSize: 925696
EntryPoint: 0x173f80
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
96
Monitored processes
49
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start start cleanthis.exe cleanthis.exe autochk.exe no specs smss.exe no specs csrss.exe no specs smss.exe no specs wininit.exe no specs csrss.exe no specs winlogon.exe no specs services.exe no specs lsass.exe no specs lsm.exe no specs svchost.exe no specs svchost.exe no specs logonui.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs audiodg.exe no specs svchost.exe no specs svchost.exe spoolsv.exe no specs svchost.exe no specs svchost.exe no specs svchost.exe no specs imedictupdate.exe no specs svchost.exe no specs svchost.exe no specs dllhost.exe no specs taskhost.exe userinit.exe no specs taskeng.exe no specs dwm.exe no specs gog.exe ctfmon.exe no specs sipnotify.exe explorer.exe no specs imeklmg.exe no specs imeklmg.exe no specs searchindexer.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs searchprotocolhost.exe no specs searchfilterhost.exe no specs eosnotify.exe no specs svchost.exe mscorsvw.exe no specs sppsvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Users\admin\Desktop\CleanThis.exe" C:\Users\admin\Desktop\CleanThis.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1073807364
Modules
Images
c:\users\admin\desktop\cleanthis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
280\??\C:\Windows\system32\autochk.exe *C:\Windows\System32\autochk.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Auto Check Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\autochk.exe
c:\windows\system32\ntdll.dll
284C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}C:\Windows\System32\dllhost.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
332\SystemRoot\System32\smss.exe 00000000 00000048 C:\Windows\System32\smss.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Session Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\smss.exe
c:\windows\system32\ntdll.dll
332"taskhost.exe"C:\Windows\System32\taskhost.exe
services.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
356%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
392\SystemRoot\System32\smss.exe 00000001 00000048 C:\Windows\System32\smss.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Session Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\smss.exe
c:\windows\system32\ntdll.dll
400wininit.exeC:\Windows\System32\wininit.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Start-Up Application
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
408%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
452winlogon.exeC:\Windows\System32\winlogon.exesmss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Logon Application
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winsta.dll
Total events
44 158
Read events
43 523
Write events
582
Delete events
53

Modification events

(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:WarnOnZoneCrossing
Value:
0
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005A010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(280) CleanThis.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:WarnonBadCertRecving
Value:
1
Executable files
1
Suspicious files
17
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
860svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\~FontCache-FontFace.dat
MD5:
SHA256:
1404svchost.exeC:\ProgramData\Microsoft\Diagnosis\events00.rbs
MD5:
SHA256:
1404svchost.exeC:\ProgramData\Microsoft\Diagnosis\events01.rbs
MD5:
SHA256:
780svchost.exeC:\Windows\System32\Winevt\Logs\System.evtx
MD5:
SHA256:
780svchost.exeC:\Windows\System32\Winevt\Logs\Security.evtx
MD5:
SHA256:
2328SearchIndexer.exeC:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb
MD5:
SHA256:
504services.exeC:\Windows\system32\logfiles\scm\25de21d7-cc44-4ba2-8584-6edfd50d5518binary
MD5:39D121A5C05C0C546A8E72E5A7138E6E
SHA256:94224ABE4811B434E5ABB135544E80320A21BCE250895208C31D47856B2FEF45
1924svchost.exeC:\ProgramData\Microsoft\Windows Defender\Support\MPLog-03192019-130535.logtext
MD5:01B63DF96C9D2CA8584E7E12B46FFD9B
SHA256:77C9A007D9BF4B2D5B3044799173AE939CE2B82A8D4E0CBAB7AD5614DA4FDE24
904svchost.exeC:\Windows\Tasks\SA.DATbinary
MD5:F1A6CD5ADAAB953A6764EA364E17BFB8
SHA256:12DC5CCD7FECAFE070976A1916E9672E3D53085633C86957AEE305CCC584184C
904svchost.exeC:\Windows\appcompat\programs\RecentFileCache.bcfbinary
MD5:223E876A37A1729E3678873E33530AA6
SHA256:E3BC03BD8C406C98D55EC882EA4FDC667DECAC693FDCA17DC142523D93B0F760
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
12
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1804
sipnotify.exe
HEAD
200
23.197.138.118:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133465592804210000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
280
CleanThis.exe
94.244.80.60:80
UAB Kauno interneto sistemos
LT
unknown
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
1104
svchost.exe
224.0.0.252:5355
unknown
1804
sipnotify.exe
23.197.138.118:80
query.prod.cms.rt.microsoft.com
Akamai International B.V.
US
unknown
2764
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
query.prod.cms.rt.microsoft.com
  • 23.197.138.118
whitelisted

Threats

No threats detected
No debug info