File name:

auto.exe

Full analysis: https://app.any.run/tasks/2beffb26-919b-4fb1-a2a0-384665042dc2
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 01, 2024, 01:43:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

C6C413543A540DF9E8BBA36AAE7518E1

SHA1:

28D0D07C190FD9827560D3E59DD70A8A26392F82

SHA256:

D827F10BC073933F4839F8240F64FC34CFEE47B777A1BCCF80681D0902EE51C1

SSDEEP:

98304:RIX/9cWV9noBoTchx569C461kHtaGIQYeQo8FxpaAiv8vWvWvWbW7WvLI4Um9gv6:4VQ8CNsQN2o4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • auto.exe (PID: 6528)
  • SUSPICIOUS

    • There is functionality for VM detection VMWare (YARA)

      • auto.exe (PID: 6528)
  • INFO

    • Checks supported languages

      • auto.exe (PID: 6528)
    • Reads the computer name

      • auto.exe (PID: 6528)
    • Creates files or folders in the user directory

      • auto.exe (PID: 6528)
    • Creates files in the program directory

      • auto.exe (PID: 6528)
    • Reads CPU info

      • auto.exe (PID: 6528)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • auto.exe (PID: 6528)
    • Create files in a temporary directory

      • auto.exe (PID: 6528)
    • Reads the machine GUID from the registry

      • auto.exe (PID: 6528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:17 02:06:38+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 3202048
InitializedDataSize: 3471872
UninitializedDataSize: -
EntryPoint: 0x30f2e8
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: DesertSun@
FileDescription: Project1
FileVersion: 1.0.0.0
ProgramID: com.embarcadero.Project1
ProductName: Project1
ProductVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start auto.exe

Process information

PID
CMD
Path
Indicators
Parent process
6528"C:\Users\admin\AppData\Roaming\auto.exe" C:\Users\admin\AppData\Roaming\auto.exe
explorer.exe
User:
admin
Company:
DesertSun@
Integrity Level:
MEDIUM
Description:
Project1
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\auto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
Total events
3 585
Read events
3 585
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
293
Text files
164
Unknown types
0

Dropped files

PID
Process
Filename
Type
6528auto.exeC:\ProgramData\USOShared\Logs\User\HOW TO RECOVERY FILES.TXTtext
MD5:0799D58E92A02BAE0DBB4FB7548B8488
SHA256:5B536461C9B13FE6DEC965966BDD16D7C644CE9FBF33B4C4AD085CB253D7B90F
6528auto.exeC:\ProgramData\USOShared\Logs\User\VXBkYXRlVXguNTEyNTI4OWMtZWM1Mi00Mjg1LTljMmMtYzlmM2NiY2E5ZjBkLjEuZXRs.Encryptedbinary
MD5:77FC3280C53021402153795F3E06BCFC
SHA256:5AC5C5EC269156DB01C0A7667E680F0849875F3D56AA25BA52A9B6512093C999
6528auto.exeC:\ProgramData\USOShared\Logs\User\DECRYPTION_IDS.TXTtext
MD5:DCEEC8879F3E75849C426369319E5A14
SHA256:4E5F318B80A3FF26EFDB7EE3194ADF566999852F99C18259D8E433D183C8064E
6528auto.exeC:\ProgramData\USOShared\Logs\User\VXBkYXRlVXguNDU5MTQ1ZDItYjdiZC00ZDIyLWIxYzUtY2U0NDBiZThjNjZjLjEuZXRs.Encryptedbinary
MD5:A7F718D8AEA5D32FBDADEFF2526D3909
SHA256:E572352BA6B016F946A1CA7D966B69DD9DC9ED1A2DD80664CF5B29CC8B35EDBF
6528auto.exeC:\ProgramData\keytext
MD5:F8A67A37D4203E1DD53417D60DFA3014
SHA256:880CCD4DC816FDAF06FE79A2122002CF2482AEF758A0D56D4C510F8AEF169773
6528auto.exeC:\ProgramData\USOShared\Logs\User\UpdateUx.94ea639f-89c3-4817-855e-65e0f8ae1dcd.1.etlbinary
MD5:6041E29FB7702FC1E33438DD5898B3ED
SHA256:4A34A8CFB7252ED2704ABB971C02CDCE0B0B2F68254C88EB6B96DC810153CCA5
6528auto.exeC:\ProgramData\USOShared\Logs\User\UpdateUx.5125289c-ec52-4285-9c2c-c9f3cbca9f0d.1.etlbinary
MD5:C9A16867DF19140B3D049A0D5C741B97
SHA256:BE1C83818AD8C92295ADF5C859AAA428D594C42D0DE958D8FF8162B09E613DD7
6528auto.exeC:\ProgramData\USOShared\Logs\User\UpdateUx.459145d2-b7bd-4d22-b1c5-ce440be8c66c.1.etlbinary
MD5:6041E29FB7702FC1E33438DD5898B3ED
SHA256:4A34A8CFB7252ED2704ABB971C02CDCE0B0B2F68254C88EB6B96DC810153CCA5
6528auto.exeC:\ProgramData\USOShared\Logs\User\VXBkYXRlVXguOTRlYTYzOWYtODljMy00ODE3LTg1NWUtNjVlMGY4YWUxZGNkLjExLmV0bA==.Encryptedbinary
MD5:6F8A51C3124F738F9EF93AFF66B662B6
SHA256:4A4FB64BF8A8775A0BE2B63D5D5F96CEE08608AFA7AEAA0F6E2E8AD275F41486
6528auto.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\494bf419e40d26ec80a426c8fc08f5e8_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D162F28031D26AB0BD44342C6464C1DB
SHA256:DDD7CB18616E34FF447B47B0FFDDE3F25684B674FA298C34964D8B295E9C9C54
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4864
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4864
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 142.250.184.206
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.130
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.0
  • 20.190.159.64
  • 20.190.159.4
  • 40.126.31.67
  • 20.190.159.2
whitelisted
go.microsoft.com
  • 23.32.186.57
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info