| File name: | MEDefaultPCReset.exe |
| Full analysis: | https://app.any.run/tasks/18d918d9-de79-44cb-b7d4-0133da17baaf |
| Verdict: | Malicious activity |
| Analysis date: | July 01, 2024, 14:15:28 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 721E8F6718E324813D7FCE4B134FCD5F |
| SHA1: | 3D753621AD75412D1DB4C8630B1E11165A6B871E |
| SHA256: | D7CB7937EC870BEAFE6580C841B137FE2A7584E0CB3076E0FD1E8621DFC7FDE7 |
| SSDEEP: | 24576:ALnTKqndIHpAqmqoDJnuM8rsDgY8x28OvQR15J4UFnozq7QTv58G:ALnemIHpAqm11nuM8rs0Y8x28OvQRJ4V |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2068:06:21 06:07:02+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.15 |
| CodeSize: | 25600 |
| InitializedDataSize: | 624640 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a00 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | MEDefaultPCReset |
| FileVersion: | 1.0.0.0 |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | MEDefaultPCReset |
| ProductVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3280 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\MEDefaultPCReset.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\MEDefaultPCReset.exe | MEDefaultPCReset.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: MEDefaultPCReset Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 3380 | "C:\Users\admin\Desktop\MEDefaultPCReset.exe" | C:\Users\admin\Desktop\MEDefaultPCReset.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MEDefaultPCReset Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3280) MEDefaultPCReset.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MEDefaultPCReset_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3380 | MEDefaultPCReset.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\Newtonsoft.Json.dll | executable | |
MD5:6815034209687816D8CF401877EC8133 | SHA256:7F912B28A07C226E0BE3ACFB2F57F050538ABA0100FA1F0BF2C39F1A1F1DA814 | |||
| 3280 | MEDefaultPCReset.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences | binary | |
MD5:E52E55C4D109D60FB5546F6E3BB53C32 | SHA256:453606C79202E67BFBFEAE1502298CD8A5357E27C4E6931BF03F97EE4F952038 | |||
| 3380 | MEDefaultPCReset.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\DefaultPackOffer.dll | executable | |
MD5:8814D8E2B58A7238D0AC4538D6A062BB | SHA256:ED992E6D05307971933F7134034EDCCAB5845B682081BEE46AD59B35A5373802 | |||
| 3380 | MEDefaultPCReset.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\MEDefaultPCReset.exe | executable | |
MD5:3526350C8494AA9095693BBF82DEA05A | SHA256:12E74C699BCE84F5CED242E4BC6966A5CCF6E66CB4D00E3887FA0E7BA943565F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1372 | svchost.exe | GET | 304 | 23.50.131.200:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
1060 | svchost.exe | GET | 304 | 23.50.131.200:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8f69642324cc87bd | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1372 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3280 | MEDefaultPCReset.exe | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | unknown |
3280 | MEDefaultPCReset.exe | 52.173.134.115:443 | bingwallpaper.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1372 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1372 | svchost.exe | 23.50.131.200:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
1372 | svchost.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
1372 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
go.microsoft.com |
| whitelisted |
bingwallpaper.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |