File name:

dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b

Full analysis: https://app.any.run/tasks/31052a6c-eef2-4695-aa93-0628b71aa9fa
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:03:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

AC923D1AA76D97FB42C12B795643250C

SHA1:

0E10FEABD608A04DCD5E38395A76AE8A803AE34A

SHA256:

DAB572480877AF38FC372B833DD5E7150BD17EAE56B9ECA3288A979149F92B8B

SSDEEP:

1536:BPl52z7Q707Q7Jts4hcWk7U+SK+a53nN3J3IEhzI:9lk7Q707Q7JtrOR+a5NZYEhc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
    • The process creates files with name similar to system file names

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
    • Executable content was dropped or overwritten

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
  • INFO

    • Checks supported languages

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
    • Creates files or folders in the user directory

      • dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe (PID: 5628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe

Process information

PID
CMD
Path
Indicators
Parent process
5628"C:\Users\admin\Desktop\dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe" C:\Users\admin\Desktop\dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 642
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exe
MD5:
SHA256:
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmpexecutable
MD5:CB8A7DD1C5856D3A6FAE765089AE1D74
SHA256:B188522795860F220A488C0104F66B9D835C55465413DD269E96E8B0A2743950
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:65C8EBEBAA952A406323268D47057E3F
SHA256:41E651F6D22D7F63902E0868791124D0E9A1BB72F3ADE6DE291E83B22DF4E34F
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:048DF356CB0E59DE8212EA170D6FED89
SHA256:C3C70261B766896559FF33728DFF6DD4199435292BD269F3C666E980ED82F768
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:71C91CF03FA6F75D28BC645C2632B52F
SHA256:0FD28A0DFF6214991C2FB137B26455DF84FE870A0D68F727A565A19CA4AEDDD2
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmpexecutable
MD5:66D4E6B26DE48CD8ED81791DA7BB66F5
SHA256:29F23E04B753665431DB8617A3FAF341D79F4B2E2CE6920F5CE7EC752D5743D0
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.tmpexecutable
MD5:264E0805FBAB4EC0635B7E25481A0660
SHA256:57B233B15CBBF28A4B6FB261181409AF81EF780F3AD9CA5F6EF345D294A98E45
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:CB8A7DD1C5856D3A6FAE765089AE1D74
SHA256:B188522795860F220A488C0104F66B9D835C55465413DD269E96E8B0A2743950
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmpexecutable
MD5:7B0F7648D9C142E82E5E2AABC0DCBA39
SHA256:DCD2E8DA31187B7F4718AE43D5F914C5125BE6D145D8D054A516AA907E897A92
5628dab572480877af38fc372b833dd5e7150bd17eae56b9eca3288a979149f92b8b.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.tmpexecutable
MD5:9FA1731CCD2EF95EC1309B5393E9AD3C
SHA256:FF308D1732B63B1AA0EF9B1E2D771D4487C8A44064A46356C28383E73608F201
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.26:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5732
svchost.exe
GET
200
2.16.164.26:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5732
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
5732
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.26:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5732
svchost.exe
2.16.164.26:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5732
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5732
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 172.217.23.110
whitelisted
crl.microsoft.com
  • 2.16.164.26
  • 2.16.164.65
  • 2.16.164.99
  • 2.16.164.81
  • 2.16.164.34
  • 2.16.164.83
  • 2.16.164.8
  • 2.16.164.57
  • 2.16.164.59
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 20.189.173.2
whitelisted

Threats

No threats detected
No debug info