File name:

HWiNFO64[1].exe

Full analysis: https://app.any.run/tasks/c30bc38c-0232-4e51-8e87-7932a37b19fc
Verdict: Malicious activity
Analysis date: November 27, 2024, 21:09:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

DDC37BB951D7E0EB3FB340C65F04D0E3

SHA1:

3379533D80A8604C6BBBADE7CDB09CB01918516E

SHA256:

D3810EFE8ECA9FCAE71C09409A859506A469BAC9417609F9A02ABBFD3B56ED29

SSDEEP:

98304:AawkBKI0osH9I5XMHR3EsMeEc8Cs4wYUUhIcM9sBkcsS7iEFL5K5rlgKE2STJPIu:chD8wMN2e/qZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates file in the systems drive root

      • HWiNFO64[1].exe (PID: 6508)
    • Executable content was dropped or overwritten

      • HWiNFO64[1].exe (PID: 6508)
    • Drops a system driver (possible attempt to evade defenses)

      • HWiNFO64[1].exe (PID: 6508)
    • Reads security settings of Internet Explorer

      • HWiNFO64[1].exe (PID: 6508)
    • Reads the BIOS version

      • HWiNFO64[1].exe (PID: 6508)
    • Checks Windows Trust Settings

      • HWiNFO64[1].exe (PID: 6508)
    • There is functionality for VM detection antiVM strings (YARA)

      • HWiNFO64[1].exe (PID: 6508)
    • The process checks if it is being run in the virtual environment

      • HWiNFO64[1].exe (PID: 6508)
  • INFO

    • Reads the computer name

      • HWiNFO64[1].exe (PID: 6508)
    • Checks supported languages

      • HWiNFO64[1].exe (PID: 6508)
    • Reads CPU info

      • HWiNFO64[1].exe (PID: 6508)
    • Create files in a temporary directory

      • HWiNFO64[1].exe (PID: 6508)
    • Checks proxy server information

      • HWiNFO64[1].exe (PID: 6508)
    • Reads the machine GUID from the registry

      • HWiNFO64[1].exe (PID: 6508)
    • Reads the time zone

      • HWiNFO64[1].exe (PID: 6508)
    • Reads the software policy settings

      • HWiNFO64[1].exe (PID: 6508)
    • UPX packer has been detected

      • HWiNFO64[1].exe (PID: 6508)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:25 07:28:39+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 9424896
InitializedDataSize: 114688
UninitializedDataSize: 19611648
EntryPoint: 0x1bb06b0
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 8.16.5600.0
ProductVersionNumber: 8.16.5600.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: REALiX s.r.o.
FileVersion: 8.16-5600
ProductVersion: 8.16-5600
LegalCopyright: Copyright (c)1999-2024 Martin Malik, REALiX s.r.o.
InternalName: HWiNFO® 64
FileDescription: HWiNFO® 64 (x64)
OriginalFileName: HWiNFO64.EXE
ProductName: Hardware Info Program for x64 (HWiNFO® 64)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hwinfo64[1].exe hwinfo64[1].exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6360"C:\HWiNFO64[1].exe" C:\HWiNFO64[1].exeexplorer.exe
User:
admin
Company:
REALiX s.r.o.
Integrity Level:
MEDIUM
Description:
HWiNFO® 64 (x64)
Exit code:
3221226540
Version:
8.16-5600
Modules
Images
c:\hwinfo64[1].exe
c:\windows\system32\ntdll.dll
6508"C:\HWiNFO64[1].exe" C:\HWiNFO64[1].exe
explorer.exe
User:
admin
Company:
REALiX s.r.o.
Integrity Level:
HIGH
Description:
HWiNFO® 64 (x64)
Version:
8.16-5600
Modules
Images
c:\hwinfo64[1].exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
8 065
Read events
5 866
Write events
28
Delete events
2 171

Modification events

(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64
Operation:writeName:FontFace
Value:
Tahoma
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:LgLcdValueType
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:TrayDivideBy
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:TrayFontFace
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:TrayFontSize
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:TrayMaxDigits
Value:
(PID) Process:(6508) HWiNFO64[1].exeKey:HKEY_CURRENT_USER\SOFTWARE\HWiNFO64\Sensors\F000EA00_0\Other1
Operation:delete valueName:TrayFontBold
Value:
Executable files
1
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6508HWiNFO64[1].exeC:\Windows\INF\display.PNFbinary
MD5:62887E3F2C67C748F05C629DB62182A4
SHA256:1B686CFC6E98A6034A28BA9BE22C190723467365477E75A18A78104A26554CE9
6508HWiNFO64[1].exeC:\HWiNFO64.INItext
MD5:3374593BE3E6B939DFB668CE69D47545
SHA256:E367CF415149B37D4D3376D7D5EA17D4E7B4FCE73C5C07DB69F2C01AF43B9565
6508HWiNFO64[1].exeC:\Windows\INF\basicrender.PNFbinary
MD5:8567F128605CC616A38D0870D077D165
SHA256:7B2D28D317F49EED7BC242241E54EB3FFFB512C5FB6F719C4F5E9395E6B1F533
6508HWiNFO64[1].exeC:\Windows\INF\basicdisplay.PNFbinary
MD5:914DCB989709A0CE3F4B24A4CD147F1A
SHA256:C2FEE0EAD23C7B3B509FDDE94DDD6A549F999F364C5CA9D09AC084F22BC0ECB4
6508HWiNFO64[1].exeC:\Windows\INF\wvid.PNFbinary
MD5:001A053A392EF45B9336D4CF9748BE29
SHA256:258ED93549F63B9A368086660F32A95DF07E7603ED01BA8722EE8C1DA27789C2
6508HWiNFO64[1].exeC:\Users\admin\AppData\Local\Temp\HWiNFO_x64_204.sysexecutable
MD5:3E7E10631FC581DBB9C5F97793F07F15
SHA256:F79C9CCF61C35B7DDAE2D68BF74DEDCD87364430E76CA4E9955B8E5F606EEE51
6508HWiNFO64[1].exeC:\Windows\INF\machine.PNFbinary
MD5:2832AC38B3F7C5EAE6490E5DB414B98E
SHA256:DFE57032C2FC69400AD3CA6D96566387B4336FD19A363F4F32041EC81E35F12B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
24
DNS requests
10
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1684
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6508
HWiNFO64[1].exe
104.21.22.164:443
www.hwinfo.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
www.bing.com
whitelisted
google.com
  • 142.250.185.78
whitelisted
www.hwinfo.com
  • 104.21.22.164
  • 172.67.205.235
whitelisted
self.events.data.microsoft.com
  • 20.42.65.90
whitelisted

Threats

No threats detected
No debug info