File name:

Kontakt_Button.exe

Full analysis: https://app.any.run/tasks/268d2161-3c7e-41bc-86f1-e6f67eb3b62b
Verdict: Malicious activity
Analysis date: September 13, 2024, 05:30:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

8004BAAC30D89D12AD6451963822D83F

SHA1:

28EE4629801933E5C41955D26ED1909F67EF84A3

SHA256:

D2AAECF14E2EC86E964B0782D539A1EA661D4AD6E46DF8565966D38BD54074BE

SSDEEP:

98304:lWqTK7zpN+Vj3bPjOlrwf4+18Rka8FIwcAbcrCgMw38FZ5L5txL4P8F8vvYzYFpD:53GXGHsEehM39HsBgdSYWnGTM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Kontakt_Button.exe (PID: 6152)
      • Kontakt_button.exe (PID: 5692)
      • Add Library.exe (PID: 6712)
    • Reads security settings of Internet Explorer

      • Kontakt_Button.exe (PID: 6152)
      • Add Library.exe (PID: 6712)
      • Kontakt_button.exe (PID: 5692)
    • Drops a system driver (possible attempt to evade defenses)

      • Kontakt_Button.exe (PID: 6152)
    • Reads the date of Windows installation

      • Kontakt_Button.exe (PID: 6152)
      • Add Library.exe (PID: 6712)
    • Drops 7-zip archiver for unpacking

      • Kontakt_Button.exe (PID: 6152)
    • There is functionality for taking screenshot (YARA)

      • Kontakt_button.exe (PID: 5692)
    • Reads Microsoft Outlook installation path

      • Kontakt_button.exe (PID: 5692)
    • Reads Internet Explorer settings

      • Kontakt_button.exe (PID: 5692)
  • INFO

    • Reads the computer name

      • Kontakt_Button.exe (PID: 6152)
      • Kontakt_button.exe (PID: 5692)
      • Add Library.exe (PID: 6712)
      • Add Library.exe (PID: 3272)
    • Checks supported languages

      • Kontakt_Button.exe (PID: 6152)
      • Kontakt_button.exe (PID: 5692)
      • Add Library.exe (PID: 6712)
      • Add Library.exe (PID: 3272)
    • Create files in a temporary directory

      • Kontakt_Button.exe (PID: 6152)
      • Kontakt_button.exe (PID: 5692)
      • Add Library.exe (PID: 6712)
    • The process uses the downloaded file

      • Kontakt_Button.exe (PID: 6152)
      • Add Library.exe (PID: 6712)
      • Kontakt_button.exe (PID: 5692)
    • Process checks computer location settings

      • Kontakt_Button.exe (PID: 6152)
      • Kontakt_button.exe (PID: 5692)
      • Add Library.exe (PID: 6712)
    • Checks proxy server information

      • Kontakt_button.exe (PID: 5692)
    • UPX packer has been detected

      • Kontakt_button.exe (PID: 5692)
    • Creates files or folders in the user directory

      • Kontakt_button.exe (PID: 5692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2021:06:11 09:16:51+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 223744
InitializedDataSize: 115200
UninitializedDataSize: -
EntryPoint: 0x24b40
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 7.0.0.0
ProductVersionNumber: 7.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: Kontakt Library Tools 7.0.0
CompanyName: Native Instruments
FileDescription: Kontakt Library Tools
FileVersion: 7.0.0.0
LegalCopyright: Bob Dule
ProductName: Kontakt Library Tools 7
ProductVersion: 7
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start kontakt_button.exe THREAT kontakt_button.exe add library.exe add library.exe no specs add library.exe

Process information

PID
CMD
Path
Indicators
Parent process
3268"C:\Users\admin\AppData\Local\Temp\RarSFX1\Add Library.exe" C:\Users\admin\AppData\Local\Temp\RarSFX1\Add Library.exeAdd Library.exe
User:
admin
Company:
Native Instruments
Integrity Level:
MEDIUM
Description:
Add Library Assistant for Kontakt 6.5.3+
Exit code:
3221226540
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx1\add library.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3272"C:\Users\admin\AppData\Local\Temp\RarSFX1\Add Library.exe" C:\Users\admin\AppData\Local\Temp\RarSFX1\Add Library.exe
Add Library.exe
User:
admin
Company:
Native Instruments
Integrity Level:
HIGH
Description:
Add Library Assistant for Kontakt 6.5.3+
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx1\add library.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5692"C:\Users\admin\AppData\Local\Temp\RarSFX0\Kontakt_Button.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\Kontakt_button.exe
Kontakt_Button.exe
User:
admin
Company:
Native Instruments
Integrity Level:
MEDIUM
Description:
Kontakt Debrider
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\kontakt_button.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6152"C:\Users\admin\AppData\Local\Temp\Kontakt_Button.exe" C:\Users\admin\AppData\Local\Temp\Kontakt_Button.exe
explorer.exe
User:
admin
Company:
Native Instruments
Integrity Level:
MEDIUM
Description:
Kontakt Library Tools
Version:
7.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\kontakt_button.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
6712"C:\Users\admin\AppData\Local\Temp\RarSFX0\Data\Add Library.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\Data\Add Library.exe
Kontakt_button.exe
User:
admin
Company:
Native Instruments
Integrity Level:
MEDIUM
Description:
Kontakt Add Library Tool
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\data\add library.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
2 292
Read events
2 289
Write events
3
Delete events
0

Modification events

(PID) Process:(5692) Kontakt_button.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5692) Kontakt_button.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5692) Kontakt_button.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
46
Suspicious files
6
Text files
79
Unknown types
1

Dropped files

PID
Process
Filename
Type
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\Native Access.cmdtext
MD5:ADB15CD976D5F5CCEE9AADE5944BAD62
SHA256:A0A01764C944C3CE9D01A17CDF0E1A5AB9F625C798E91FF8062262C440AC80E3
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\parser\Native_Access_SNPID.txttext
MD5:A71B30288342ECA0CA92169EFB7C475F
SHA256:36509EEC65F8268688EEF6371FF88CED8DD18B0A5E0AD04B253E3A7453FFBAE0
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\parser\Jsort.batbinary
MD5:335E6E5897DC39D02C75EEBA68CF6251
SHA256:4700A43EA1A532595CE0A4BCD91D72239A9EDAFADFD87FDD3D4995945D45CD90
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\totalcmd\BLAKEX64.DLLexecutable
MD5:CBD662A04F272CE00461A52AE2E74A49
SHA256:BB997248E7B5DA5B3C112EF3E2D127C300C412465D342004D3AC34D50D50FC85
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\totalcmd\CGLPT64.SYSexecutable
MD5:C6E5B7ECFB1AA7A104BC3C0C081E36E0
SHA256:0108B00762DE94C189224874DD064E6EC65EE8F3BFF65801A6FB8D25AF7DE617
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\parser\Native_Access_Parser.battext
MD5:5B43C8E27141342EB08ABC24BF5EB25B
SHA256:028F7E2F33CE3C25914A3AA1D481196104EFFB86CD751DD838156D276AC8F727
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\parser\XML_PARSER_Native_Access.ps1text
MD5:BE25BA0AE30F1309967E687A5585B22E
SHA256:156A7979747815411816B7331917221C1B23175F2C9D52213DFAA112DB380AA6
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\Nicnt Maker\How to Use.txttext
MD5:FCDE1AF11BCE0FCC803970B443AE4824
SHA256:F359AF872D818F0363E9D5218D06312C3B826EADDC294D2E22847217658D2E0A
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\totalcmd\DEFAULT.BARtext
MD5:F103B23C658D801D5C31CB056BAFDC16
SHA256:8159C946398EEC59D8065342C06B957AE38165E664850FB57F5D9971CFFB7C21
6152Kontakt_Button.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Data\KontaktLibOrganizer.exeexecutable
MD5:02AF6843BAE1B664C1CB0D05E0144A63
SHA256:A62D2B0230C67922D15E738F769ACAA3A980D080C671E5D42A84628735F54C9B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
32
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6012
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2028
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2028
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6012
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 40.127.240.158
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.140
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.68
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info