File name:

kdmapper.exe

Full analysis: https://app.any.run/tasks/6a1c6ca0-978e-4c98-909c-7b01264c0730
Verdict: Malicious activity
Analysis date: February 22, 2025, 12:19:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

ED463D82261453BF71C3A7D6F14808BD

SHA1:

26E8A4E098920E624F2D892BDF49C4DE5EE29041

SHA256:

DD10FA10E1785219BAFF248BAD74FDF6F5152534ACEA58EAB64938102EF30C8D

SSDEEP:

3072:EF1Ov2XtacME4Pfs0iycvxAkMMo/WDQajkA6hQfAMMI:EF1Ov2XwcBEfs0iyRYQUkAga

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • kdmapper.exe (PID: 6568)
      • kdmapper.exe (PID: 6536)
      • DragonBurn.exe (PID: 3612)
    • Creates or modifies Windows services

      • kdmapper.exe (PID: 6536)
    • Executable content was dropped or overwritten

      • kdmapper.exe (PID: 6536)
    • Execution of CURL command

      • DragonBurn.exe (PID: 3612)
    • Hides command output

      • cmd.exe (PID: 5472)
      • cmd.exe (PID: 3508)
  • INFO

    • Checks supported languages

      • kdmapper.exe (PID: 6568)
      • kdmapper.exe (PID: 6536)
      • DragonBurn.exe (PID: 3612)
      • curl.exe (PID: 5640)
      • curl.exe (PID: 6136)
      • curl.exe (PID: 5544)
      • curl.exe (PID: 3808)
    • Create files in a temporary directory

      • kdmapper.exe (PID: 6536)
    • Manual execution by a user

      • kdmapper.exe (PID: 6380)
      • kdmapper.exe (PID: 6536)
      • DragonBurn.exe (PID: 6684)
      • DragonBurn.exe (PID: 3612)
    • The sample compiled with english language support

      • kdmapper.exe (PID: 6536)
    • Reads the computer name

      • curl.exe (PID: 5640)
      • curl.exe (PID: 6136)
      • curl.exe (PID: 3808)
      • curl.exe (PID: 5544)
    • Execution of CURL command

      • cmd.exe (PID: 5240)
      • cmd.exe (PID: 2796)
      • cmd.exe (PID: 3840)
      • cmd.exe (PID: 5028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:12:03 16:01:25+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 63488
InitializedDataSize: 77312
UninitializedDataSize: -
EntryPoint: 0xf258
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
23
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start kdmapper.exe conhost.exe no specs cmd.exe no specs kdmapper.exe no specs kdmapper.exe conhost.exe no specs cmd.exe no specs dragonburn.exe no specs dragonburn.exe conhost.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs curl.exe cmd.exe no specs ping.exe no specs cmd.exe no specs curl.exe cmd.exe no specs curl.exe cmd.exe no specs curl.exe kdmapper.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1876C:\WINDOWS\system32\cmd.exe /c pauseC:\Windows\System32\cmd.exekdmapper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2796C:\WINDOWS\system32\cmd.exe /c curl -s -X GET https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/offsets.jsonC:\Windows\System32\cmd.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
3508C:\WINDOWS\system32\cmd.exe /c ping google.com > nulC:\Windows\System32\cmd.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
3608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3612"C:\Users\admin\Desktop\DragonBurn.exe" C:\Users\admin\Desktop\DragonBurn.exe
explorer.exe
User:
admin
Company:
ByteCorum
Integrity Level:
HIGH
Description:
DragonBurn is one of the best CS2 kernel mode read only external cheats. Undetected by all anti-cheats except faceit.
Exit code:
3221225547
Version:
2.0.4.0
Modules
Images
c:\users\admin\desktop\dragonburn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3808curl -s -X GET https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/buttons.jsonC:\Windows\System32\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
HIGH
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
3840C:\WINDOWS\system32\cmd.exe /c curl -s -X GET https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/buttons.jsonC:\Windows\System32\cmd.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4244ping google.com C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
5028C:\WINDOWS\system32\cmd.exe /c curl -s -X GET https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/client_dll.jsonC:\Windows\System32\cmd.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
5240C:\WINDOWS\system32\cmd.exe /c curl -s -X GET https://raw.githubusercontent.com/ByteCorum/DragonBurn/data/versionC:\Windows\System32\cmd.exeDragonBurn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
1 911
Read events
1 908
Write events
2
Delete events
1

Modification events

(PID) Process:(6536) kdmapper.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jpMZVnyMZaRDtgVajGnPYUsG
Operation:delete keyName:(default)
Value:
(PID) Process:(6536) kdmapper.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jpMZVnyMZaRDtgVajGnPYUsG
Operation:writeName:ImagePath
Value:
\??\C:\Users\admin\AppData\Local\Temp\jpMZVnyMZaRDtgVajGnPYUsG
(PID) Process:(6536) kdmapper.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jpMZVnyMZaRDtgVajGnPYUsG
Operation:writeName:Type
Value:
1
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6536kdmapper.exeC:\Users\admin\AppData\Local\Temp\jpMZVnyMZaRDtgVajGnPYUsGexecutable
MD5:1898CEDA3247213C084F43637EF163B3
SHA256:4429F32DB1CC70567919D7D47B844A91CF1329A6CD116F582305F3B7B60CD60B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
36
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.186:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6824
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6288
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6288
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
760
lsass.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4308
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
6092
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.186:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.86.251.22:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3976
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.186
  • 23.48.23.189
  • 23.48.23.193
  • 23.48.23.188
  • 23.48.23.190
  • 23.48.23.195
  • 23.48.23.182
  • 23.48.23.132
  • 23.48.23.185
whitelisted
www.microsoft.com
  • 23.38.73.129
  • 2.23.246.101
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.bing.com
  • 184.86.251.22
  • 184.86.251.27
  • 184.86.251.7
  • 184.86.251.4
  • 184.86.251.24
  • 184.86.251.14
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.65
  • 20.190.160.17
  • 20.190.160.3
  • 20.190.160.131
  • 40.126.32.138
  • 40.126.32.140
  • 20.190.160.5
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info