File name:

d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e

Full analysis: https://app.any.run/tasks/500f0990-281b-456e-b78b-c15741395bef
Verdict: Malicious activity
Analysis date: December 06, 2022, 04:36:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5:

C9C15C4061AB4DE4CB7C473C2760F923

SHA1:

E64CBCD186178D44A1E8584C417B7D865417BE0B

SHA256:

D8E22530AA884E9E742A102F9ACB53A2727B749DAC4489C72B37782E2EC6383E

SSDEEP:

49152:h49vU9KmxBp6C9niHX/GAqhFd3uEaPVSajlC6k118t:h494PxBpBn0jNlH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Uses WMIC.EXE to obtain CPU information

      • cmd.exe (PID: 3408)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 3076)
    • Reads browser cookies

      • d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe (PID: 1328)
    • Uses WMIC.EXE to obtain operating system information

      • d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe (PID: 1328)
  • INFO

    • Checks supported languages

      • d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe (PID: 1328)
    • Reads the computer name

      • d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe (PID: 1328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 1970-Jan-01 00:00:00

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: 4
e_cparhdr: 0
e_minalloc: 0
e_maxalloc: 65535
e_ss: 0
e_sp: 139
e_csum: 0
e_ip: 0
e_cs: 0
e_ovno: 0
e_oemid: 0
e_oeminfo: 0
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 6
TimeDateStamp: 1970-Jan-01 00:00:00
PointerToSymbolTable: 3089920
NumberOfSymbols: 0
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_DEBUG_STRIPPED
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
1631194
1631232
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.84715
.rdata
1638400
1182020
1182208
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.73437
.data
2822144
395800
205312
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.71296
.idata
3219456
988
1024
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.66522
.reloc
3223552
68838
69120
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.68049
.symtab
3293184
4
512
IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.0203931

Imports

kernel32.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1328"C:\Users\admin\AppData\Local\Temp\d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe" C:\Users\admin\AppData\Local\Temp\d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
2428wmic os get CaptionC:\Windows\System32\Wbem\wmic.exed8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3076cmd /C "wmic path win32_VideoController get name"C:\Windows\system32\cmd.exed8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3492wmic path win32_VideoController get nameC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3408cmd /C "wmic cpu get name"C:\Windows\system32\cmd.exed8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3924wmic cpu get nameC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
385
Read events
385
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1328
d8e22530aa884e9e742a102f9acb53a2727b749dac4489c72b37782e2ec6383e.exe
62.204.41.3:8081
Horizon LLC
RU
unknown

DNS requests

No data

Threats

No threats detected
No debug info