URL:

https://docs.google.com/document/d/1HvnpGIeNtrgNAOe6bDLps9xufvHEP4Nz_gzvfSgRqiQ/edit?usp=drivesdk

Full analysis: https://app.any.run/tasks/3a4dc493-5cb6-41b1-bd92-d88a881759a3
Verdict: Malicious activity
Analysis date: January 11, 2025, 00:14:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
fileshare
Indicators:
MD5:

6CA5B6AD6D5315C4E604358D2F5E63AE

SHA1:

EB112279E40AC6B315829B065BF176ACE2C906D3

SHA256:

D531AE17F874B28F8C3152A9F1C595827C1E58FC03F7FC1CB983BF3524674E5A

SSDEEP:

3:N8SP3unKJRBUt1g02HhpNwZnKrCMZ:2SmKJst1/2H/cWCo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • cmd.exe (PID: 7668)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • cmd.exe (PID: 7668)
    • Application launched itself

      • cmd.exe (PID: 7668)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 7668)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 7668)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7156)
    • The process creates files with name similar to system file names

      • wermgr.exe (PID: 8656)
      • wermgr.exe (PID: 8636)
      • wermgr.exe (PID: 8864)
      • wermgr.exe (PID: 9520)
      • WerFault.exe (PID: 5732)
    • Executes application which crashes

      • explorer.exe (PID: 7968)
      • explorer.exe (PID: 20284)
      • explorer.exe (PID: 19936)
    • Reads security settings of Internet Explorer

      • StartMenuExperienceHost.exe (PID: 15912)
  • INFO

    • Reads the computer name

      • identity_helper.exe (PID: 7908)
      • StartMenuExperienceHost.exe (PID: 15912)
      • TextInputHost.exe (PID: 19460)
    • Reads Environment values

      • identity_helper.exe (PID: 7908)
    • Checks supported languages

      • identity_helper.exe (PID: 7908)
      • chcp.com (PID: 7632)
      • SearchApp.exe (PID: 4156)
      • TextInputHost.exe (PID: 19460)
      • StartMenuExperienceHost.exe (PID: 15912)
    • Manual execution by a user

      • notepad.exe (PID: 624)
      • cmd.exe (PID: 7668)
    • Attempting to use file storage service

      • msedge.exe (PID: 6648)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 624)
      • explorer.exe (PID: 7968)
      • explorer.exe (PID: 19936)
      • explorer.exe (PID: 20284)
    • Changes the display of characters in the console

      • cmd.exe (PID: 7668)
    • Application launched itself

      • msedge.exe (PID: 6428)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 2828)
      • explorer.exe (PID: 7048)
      • explorer.exe (PID: 6392)
      • explorer.exe (PID: 7408)
      • explorer.exe (PID: 2076)
      • explorer.exe (PID: 8016)
      • explorer.exe (PID: 7176)
      • explorer.exe (PID: 1296)
      • explorer.exe (PID: 8032)
      • explorer.exe (PID: 5560)
      • explorer.exe (PID: 904)
      • explorer.exe (PID: 8180)
      • explorer.exe (PID: 1140)
      • explorer.exe (PID: 7308)
      • explorer.exe (PID: 4716)
      • explorer.exe (PID: 2612)
      • explorer.exe (PID: 5576)
      • explorer.exe (PID: 3984)
      • explorer.exe (PID: 7564)
      • explorer.exe (PID: 5076)
      • explorer.exe (PID: 8148)
      • explorer.exe (PID: 3832)
      • explorer.exe (PID: 7720)
      • explorer.exe (PID: 8048)
      • explorer.exe (PID: 8012)
      • explorer.exe (PID: 4592)
      • explorer.exe (PID: 5392)
      • explorer.exe (PID: 5096)
      • explorer.exe (PID: 6732)
      • explorer.exe (PID: 5604)
      • explorer.exe (PID: 7968)
      • explorer.exe (PID: 7712)
      • explorer.exe (PID: 1572)
      • explorer.exe (PID: 5388)
      • explorer.exe (PID: 8468)
      • explorer.exe (PID: 8872)
      • explorer.exe (PID: 8892)
      • explorer.exe (PID: 8684)
      • explorer.exe (PID: 4640)
      • explorer.exe (PID: 15556)
      • explorer.exe (PID: 12440)
      • explorer.exe (PID: 8960)
      • explorer.exe (PID: 9020)
      • explorer.exe (PID: 16012)
      • explorer.exe (PID: 21720)
      • explorer.exe (PID: 21652)
      • explorer.exe (PID: 19936)
      • explorer.exe (PID: 23600)
      • explorer.exe (PID: 20588)
      • explorer.exe (PID: 7280)
      • explorer.exe (PID: 18880)
      • explorer.exe (PID: 20004)
    • Creates files in the program directory

      • explorer.exe (PID: 7968)
      • explorer.exe (PID: 20284)
    • Process checks computer location settings

      • SearchApp.exe (PID: 4156)
    • Checks proxy server information

      • WerFault.exe (PID: 12316)
      • explorer.exe (PID: 19936)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 4156)
    • Reads the software policy settings

      • SearchApp.exe (PID: 4156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
2 603
Monitored processes
2 459
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start start start