File name:

MusaLLaT.exe

Full analysis: https://app.any.run/tasks/779d805d-1205-4724-848f-a0d5ef3023a8
Verdict: Malicious activity
Analysis date: September 26, 2024, 11:22:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

55C38DB4B199F52BD5FE466746852A6C

SHA1:

E683A9FFFD0F16CD4D4E1F32089EC3AC5FCE2E96

SHA256:

D98CA9DE107C1F0C55D62A48D2AF195269D3BF2A164595E2E33D57B4FF975A2B

SSDEEP:

12288:cCxo78HVVVVVVSJdYkY5Lc0k2aNXgGw1gr:txo4Rkuc0krNXgGwm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • UAC/LUA settings modification

      • MusaLLaT.exe (PID: 4180)
      • MusaLLaT.exe (PID: 5512)
    • Changes the autorun value in the registry

      • MusaLLaT.exe (PID: 5512)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MusaLLaT.exe (PID: 4180)
    • Starts itself from another location

      • MusaLLaT.exe (PID: 4180)
  • INFO

    • Create files in a temporary directory

      • MusaLLaT.exe (PID: 4180)
      • MusaLLaT.exe (PID: 5512)
    • Checks supported languages

      • MusaLLaT.exe (PID: 4180)
      • MusaLLaT.exe (PID: 5512)
    • Creates files or folders in the user directory

      • MusaLLaT.exe (PID: 4180)
      • MusaLLaT.exe (PID: 5512)
    • Reads the computer name

      • MusaLLaT.exe (PID: 4180)
      • MusaLLaT.exe (PID: 5512)
    • UPX packer has been detected

      • MusaLLaT.exe (PID: 5512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:01:04 13:49:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 53248
InitializedDataSize: 81920
UninitializedDataSize: 434176
EntryPoint: 0x76580
OSVersion: 4
ImageVersion: 8.1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.1.0.8
ProductVersionNumber: 8.1.0.8
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: z 3 r 0 _ x
FileVersion: 8.01.0008
ProductVersion: 8.01.0008
InternalName: Dosya Klasörü
OriginalFileName: Dosya Klasörü.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start musallat.exe THREAT musallat.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3924C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4180"C:\Users\admin\AppData\Local\Temp\MusaLLaT.exe" C:\Users\admin\AppData\Local\Temp\MusaLLaT.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
8.01.0008
Modules
Images
c:\users\admin\appdata\local\temp\musallat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
5512C:\Users\admin\AppData\Roaming\MusaLLaT.exeC:\Users\admin\AppData\Roaming\MusaLLaT.exe
MusaLLaT.exe
User:
admin
Integrity Level:
MEDIUM
Version:
8.01.0008
Modules
Images
c:\users\admin\appdata\roaming\musallat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6272"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
202
Read events
168
Write events
34
Delete events
0

Modification events

(PID) Process:(4180) MusaLLaT.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:UACDisableNotify
Value:
0
(PID) Process:(4180) MusaLLaT.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(5512) MusaLLaT.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
Operation:writeName:UACDisableNotify
Value:
0
(PID) Process:(5512) MusaLLaT.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(5512) MusaLLaT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MusaLLaT
Value:
C:\Users\admin\AppData\Roaming\MusaLLaT.exe
Executable files
1
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4180MusaLLaT.exeC:\Users\admin\AppData\Roaming\MusaLLaT.exeexecutable
MD5:55C38DB4B199F52BD5FE466746852A6C
SHA256:D98CA9DE107C1F0C55D62A48D2AF195269D3BF2A164595E2E33D57B4FF975A2B
4180MusaLLaT.exeC:\Users\admin\AppData\Local\Temp\~DF8B66A2B80D8AD575.TMPbinary
MD5:BA81125F546887E7093DCB733A8C0111
SHA256:4448AB6FF98A95F4BD053A31565ABB5332C145A816B54F9CCA94817B1ACDE8D1
5512MusaLLaT.exeC:\Users\admin\AppData\Roaming\Declare.initext
MD5:57569FD8804FD8E0F7C2D02B47F71980
SHA256:6C62820CC197587E3C543B014895FAF7D92B40E22B062A908777981A3C6E1F47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
30
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5104
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3140
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6660
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3140
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
5104
svchost.exe
52.191.219.104:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6908
RUXIMICS.exe
52.191.219.104:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2120
MoUsoCoreWorker.exe
52.191.219.104:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
whitelisted
5104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5104
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6660
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 52.191.219.104
  • 40.127.240.158
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 184.30.21.171
whitelisted
login.live.com
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.20
  • 40.126.32.74
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
browser.pipe.aria.microsoft.com
  • 20.189.173.26
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

No threats detected
No debug info