File name:

GuildFTPd_0.999.14.exe

Full analysis: https://app.any.run/tasks/2532b1f1-78b4-4664-a01a-a03df4019a91
Verdict: Malicious activity
Analysis date: September 11, 2024, 22:03:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9A15F9A3287C06D56DE9D23654FC61B6

SHA1:

1570A70CBBD5762A2E32144484914887BA0B4C21

SHA256:

DAFE744AB172692A9F9F8B72D7D856CEA78B19340E8271EB37F775DC21FCC23A

SSDEEP:

98304:LYmkmnReS03nk5nt2/Upnh8iB+Jiwtcv41TURydb2/tJJNnk6NZOo0qvDF+5Ow3+:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Reads security settings of Internet Explorer

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
    • The process creates files with name similar to system file names

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Executable content was dropped or overwritten

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Creates a software uninstall entry

      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Reads Internet Explorer settings

      • hh.exe (PID: 2572)
    • Reads Microsoft Outlook installation path

      • hh.exe (PID: 2572)
  • INFO

    • Create files in a temporary directory

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
      • hh.exe (PID: 2572)
    • Checks supported languages

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
      • GuildFTPd.exe (PID: 5516)
    • Reads the computer name

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
      • GuildFTPd.exe (PID: 5516)
    • Creates files or folders in the user directory

      • GuildFTPd_0.999.14.exe (PID: 812)
      • GuildFTPd_0.999.14.exe (PID: 5044)
      • hh.exe (PID: 2572)
      • GuildFTPd.exe (PID: 5516)
    • Manual execution by a user

      • GuildFTPd_0.999.14.exe (PID: 5044)
      • GuildFTPd_0.999.14.exe (PID: 1164)
      • GuildFTPd.exe (PID: 5516)
    • Creates files in the program directory

      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Checks proxy server information

      • hh.exe (PID: 2572)
    • The process uses the downloaded file

      • GuildFTPd_0.999.14.exe (PID: 1164)
      • hh.exe (PID: 2572)
    • Process checks computer location settings

      • GuildFTPd_0.999.14.exe (PID: 1164)
    • Reads security settings of Internet Explorer

      • hh.exe (PID: 2572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2006:05:27 03:33:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 49152
InitializedDataSize: 1798144
UninitializedDataSize: -
EntryPoint: 0x6c1f
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: http://www.guildftpd.com
CompanyName: Nitrolic, GuildFTPd
FileDescription: GuildFTPd FTP server deamon
FileVersion: 1.01
LegalCopyright: Copyright © Nitrolic 2001
ProductName: GuildFTPd
Undernet: #GuildFTPd
Efnet: #GuildFTPd
ProductVersion: 1.01
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
5
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start guildftpd_0.999.14.exe guildftpd_0.999.14.exe no specs guildftpd_0.999.14.exe hh.exe no specs guildftpd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
812"C:\Users\admin\AppData\Local\Temp\GuildFTPd_0.999.14.exe" C:\Users\admin\AppData\Local\Temp\GuildFTPd_0.999.14.exe
explorer.exe
User:
admin
Company:
Nitrolic, GuildFTPd
Integrity Level:
MEDIUM
Description:
GuildFTPd FTP server deamon
Exit code:
0
Version:
1.01
Modules
Images
c:\users\admin\appdata\local\temp\guildftpd_0.999.14.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1164"C:\Users\admin\Desktop\GuildFTPd_0.999.14.exe" C:\Users\admin\Desktop\GuildFTPd_0.999.14.exe
explorer.exe
User:
admin
Company:
Nitrolic, GuildFTPd
Integrity Level:
HIGH
Description:
GuildFTPd FTP server deamon
Exit code:
0
Version:
1.01
Modules
Images
c:\users\admin\desktop\guildftpd_0.999.14.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2572"C:\WINDOWS\hh.exe" C:\PROGRA~2\GUILDF~1\guildftpd.chmC:\Windows\hh.exeGuildFTPd_0.999.14.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® HTML Help Executable
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\hh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5044"C:\Users\admin\Desktop\GuildFTPd_0.999.14.exe" C:\Users\admin\Desktop\GuildFTPd_0.999.14.exeexplorer.exe
User:
admin
Company:
Nitrolic, GuildFTPd
Integrity Level:
MEDIUM
Description:
GuildFTPd FTP server deamon
Exit code:
0
Version:
1.01
Modules
Images
c:\users\admin\desktop\guildftpd_0.999.14.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5516"C:\Program Files (x86)\GuildFTPd\GuildFTPd.exe" C:\Program Files (x86)\GuildFTPd\GuildFTPd.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
GuildFTPd FTP Server Deamon
Version:
0.999.14
Modules
Images
c:\program files (x86)\guildftpd\guildftpd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
1 684
Read events
1 675
Write events
9
Delete events
0

Modification events

(PID) Process:(1164) GuildFTPd_0.999.14.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GuildFTPd
Operation:writeName:DisplayName
Value:
GuildFTPd FTP Deamon
(PID) Process:(1164) GuildFTPd_0.999.14.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GuildFTPd
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\GuildFTPd\Uninstall.exe
(PID) Process:(1164) GuildFTPd_0.999.14.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GuildFTPd
Operation:writeName:Installation directory
Value:
C:\Program Files (x86)\GuildFTPd
(PID) Process:(1164) GuildFTPd_0.999.14.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuildFTPd
Operation:writeName:InstallDir
Value:
C:\Program Files (x86)\GuildFTPd
(PID) Process:(1164) GuildFTPd_0.999.14.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.chm\OpenWithProgids
Operation:writeName:chm.file
Value:
(PID) Process:(2572) hh.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2572) hh.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2572) hh.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5516) GuildFTPd.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuildFTPd
Operation:writeName:LogDir
Value:
C:\Program Files (x86)\GuildFTPd\syslog.txt
Executable files
18
Suspicious files
16
Text files
24
Unknown types
1

Dropped files

PID
Process
Filename
Type
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\GuildCsh.dllexecutable
MD5:F3DF70C4DAB6675C9FAA3FC568EB2C2E
SHA256:538E7624E5DA7011293C5C99068E84BB7EE55B673556456484D01D9275B85361
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\GuildFTPd.exeexecutable
MD5:6E56CF86212A3BE4715F96E3B60E2B7A
SHA256:0D9083F1FDD78807BA2D584812E18A175A23AA0162C6E0DE335CD21A9DE2B924
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\zlib.dllexecutable
MD5:87EDDCEB9D22C129E386E652C5CDA521
SHA256:792D768258EDDAEC86D9263E51FF64EE6F0BED2F28205F535EE150E94F8D6A2B
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\site_commands.txttext
MD5:237E5BE199B011A087D65332A9E5717A
SHA256:A4B9B606CA6FA55FA5EF26760EFC1190E9776238D9896FA874B0368A5989A08A
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\readme.txttext
MD5:C932A2326FE8CD4399AF924D4B6F84F5
SHA256:B0138D2BF57465BF2EA9762FDB081BBCB12A43C873653497B71B9700DC52E3B4
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\guildftpd.chmchm
MD5:D569C8CC8749AD5B7B7FEB50E53A533B
SHA256:9075E749098E393DACF0873D9AEBBAFA4B66BA5FF4C06284F8FEBAA41811D9E5
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\UNINSTALL.exeexecutable
MD5:9AA8E8005D9B732737E8E53F35CB7D34
SHA256:574AF793A78D5EC9099614838B1ECF0E66B79B4D28413048ADF4CB81F723A8C5
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\dbghelp.dllexecutable
MD5:E458D88C71990F545EF941CD16080BAD
SHA256:5EC121730240548A85B7EF1F7E30D5FDBEE153BB20DD92C2D44BF37395294EC0
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\history.txttext
MD5:6EFAF487392406612B9559EBEC478613
SHA256:0DE7B1A5A47D2BE48408DCE55EB96911240A122696B2D8C94B6C8857E7F7F1FA
812GuildFTPd_0.999.14.exeC:\Users\admin\AppData\Local\Temp\gftpdChatClient.exeexecutable
MD5:E33C3D6D24A51121E72AE5E9B4A0F035
SHA256:8D14FBE5E219CDCC524DDE4D660DF1707C8B288D1A9C70E1E6E0D368B0DAA9DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
32
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4132
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7156
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1780
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7156
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6260
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4132
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4132
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4132
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1780
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1780
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.64
  • 40.126.31.67
  • 20.190.159.0
  • 20.190.159.23
  • 20.190.159.4
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info