File name:

iconutils-5-20-en-win.exe

Full analysis: https://app.any.run/tasks/9f465c89-f5df-4688-9954-52044db8c48f
Verdict: Malicious activity
Analysis date: September 03, 2024, 13:46:34
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
phish-doc
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

DAB07082F58A4F5E446DD02EB1765E9D

SHA1:

E168B97DF6F30FED89E2342A930285FE8B221240

SHA256:

DF596881757A7724C2BB7C80DB96B5B393418257D3ED0121BB1C989E9FC2E9A3

SSDEEP:

98304:77of6V1Gneofol1fTtWov5hFLvI+lM+elBlwv6+/46Ljo1k8HnUangiCiwoUQWY6:kODagMZixMPVZVP0GkTyKSCmzD8LHn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Phishing document has been detected

      • iconutils-5-20-en-win.exe (PID: 2088)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • iconutils-5-20-en-win.exe (PID: 2088)
    • Executable content was dropped or overwritten

      • iconutils-5-20-en-win.exe (PID: 2088)
    • Creates a software uninstall entry

      • iconutils-5-20-en-win.exe (PID: 2088)
    • Searches for installed software

      • iconutils-5-20-en-win.exe (PID: 2088)
  • INFO

    • Checks supported languages

      • iconutils-5-20-en-win.exe (PID: 2088)
      • icolover.exe (PID: 4292)
    • Create files in a temporary directory

      • iconutils-5-20-en-win.exe (PID: 2088)
    • Reads the computer name

      • iconutils-5-20-en-win.exe (PID: 2088)
      • icolover.exe (PID: 4292)
    • Creates files in the program directory

      • iconutils-5-20-en-win.exe (PID: 2088)
    • Creates files or folders in the user directory

      • iconutils-5-20-en-win.exe (PID: 2088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:09:02 04:13:09+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 4096
InitializedDataSize: 196608
UninitializedDataSize: -
EntryPoint: 0x1d20
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.20.0.0
ProductVersionNumber: 5.20.0.0
FileFlagsMask: 0x003f
FileFlags: Pre-release
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unknown (01B5)
Comments: -
CompanyName: Aha-Soft
FileDescription: IconUtils Setup
FileVersion: 5.2
InternalName: setup
LegalCopyright: Copyright © 2011 Aha-Soft
LegalTrademarks: -
OriginalFileName: setup.exe
PrivateBuild: -
ProductName: IconUtils
ProductVersion: 5.2
SpecialBuild: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT iconutils-5-20-en-win.exe icolover.exe no specs iconutils-5-20-en-win.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Users\admin\AppData\Local\Temp\iconutils-5-20-en-win.exe" C:\Users\admin\AppData\Local\Temp\iconutils-5-20-en-win.exeexplorer.exe
User:
admin
Company:
Aha-Soft
Integrity Level:
MEDIUM
Description:
IconUtils Setup
Exit code:
3221226540
Version:
5.20
Modules
Images
c:\users\admin\appdata\local\temp\iconutils-5-20-en-win.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2088"C:\Users\admin\AppData\Local\Temp\iconutils-5-20-en-win.exe" C:\Users\admin\AppData\Local\Temp\iconutils-5-20-en-win.exe
explorer.exe
User:
admin
Company:
Aha-Soft
Integrity Level:
HIGH
Description:
IconUtils Setup
Exit code:
0
Version:
5.20
Modules
Images
c:\users\admin\appdata\local\temp\iconutils-5-20-en-win.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4292"C:\Program Files (x86)\IconUtils\iconlover\icolover.exe"C:\Program Files (x86)\IconUtils\IconLover\icolover.exeiconutils-5-20-en-win.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\iconutils\iconlover\icolover.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
2 751
Read events
2 658
Write events
82
Delete events
11

Modification events

(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IconUtils
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\IconUtils\uninstall.exe
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IconUtils
Operation:writeName:DisplayName
Value:
IconUtils
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IconUtils
Operation:writeName:DisplayVersion
Value:
5.20
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IconUtils
Operation:writeName:Publisher
Value:
Aha-Soft
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IconUtils
Operation:writeName:URLInfoAbout
Value:
http://www.aha-soft.com/iconutils/
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\UserChoice
Operation:delete keyName:(default)
Value:
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\UserChoice
Operation:writeName:Progid
Value:
pngFile_IconLover
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png
Operation:writeName:Progid
Value:
pngFile_IconLover
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\pngFile_IconLover
Operation:writeName:AlwaysShowExt
Value:
(PID) Process:(2088) iconutils-5-20-en-win.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\pngFile_IconLover
Operation:writeName:EditFlags
Value:
00000000
Executable files
14
Suspicious files
30
Text files
200
Unknown types
8

Dropped files

PID
Process
Filename
Type
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\gentee73\guig.dllexecutable
MD5:8757CD8C68B85D668F15BEFC13251D5E
SHA256:96D1906EF8F1AC224830DA79BC9492AA21FFBACD4CAA4FB44CC64DEDF09047A2
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\genteert.dllexecutable
MD5:77D23A007A508370513420B2BFE16A06
SHA256:FCF17973B4F9CB25BDD2B36BDFE0DC9580020A8F0E30EFA6457846E010796F68
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\gentee73\4default.bmpbinary
MD5:0895D223FA59A94BED73D25D1CB5AF70
SHA256:53228A7C924889D300C7FFE9BAA1879EE94BD9B4286E84B7B29F870E9567B82D
2088iconutils-5-20-en-win.exeC:\Program Files (x86)\IconUtils\splashdata\all-perfect-icons-bundle.pngimage
MD5:C730BAA6C019504ED60AE2AABFF9A54B
SHA256:185D4689F0896ADCC6CB81635FAAC08357B4E6D2E2A932E95AD0597890A4468A
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\~DF95116B37D479F491.TMPbinary
MD5:2A777B215CFF1A8694A97A9D7E843485
SHA256:9C2DE7F57130FB69B3C6799A0AA3A8751FA87138DCF2B860398643A8B2A8D684
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\gentee73\2install - 1.bmpbinary
MD5:E168634D6C44995C14608F16C2E28693
SHA256:06263008AB7AB756D1254CE744B389F71B0DFFB186EBFA8BB0D2603271E9C6DA
2088iconutils-5-20-en-win.exeC:\Users\admin\AppData\Local\Temp\gentee73\setup_temp.geabinary
MD5:07FB63AFD536E029CA909B9C34C61F60
SHA256:93B40B49897C8788606164273C90701046190D26B1DFA6771F0DD38D27286107
2088iconutils-5-20-en-win.exeC:\Program Files (x86)\IconUtils\splashdata\accounting-development-example8.jpgimage
MD5:104D08F5D10A4A8D6982DC6426CF5AD3
SHA256:61A6F30BBE0FAC3EF5291F16B2F822EBB044ACB6DB734CDC420E232CB7CBB75A
2088iconutils-5-20-en-win.exeC:\Program Files (x86)\IconUtils\splashdata\3d-glossy-example2.jpgimage
MD5:1DD01DEA968F0B1FF1AC0C2C76EA62A0
SHA256:22F01C0B30B52AF3E472121EA569B2B88256E51628DC2F9CD4E2119D54E31935
2088iconutils-5-20-en-win.exeC:\Program Files (x86)\IconUtils\splashdata\android-dialog-example8.pngimage
MD5:E955D9438F01F3540AB169E4F9447367
SHA256:2C466994678556C9FBBFFDA3A23023DE9E0076CCB96B05FE9B0DEFF59421FE01
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
15
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6408
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6408
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6776
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6408
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6408
SIHClient.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6408
SIHClient.exe
13.85.23.206:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info