| File name: | Soda.v1.4.exe |
| Full analysis: | https://app.any.run/tasks/f7bae2bf-4728-435d-93ce-cf17c37db337 |
| Verdict: | Malicious activity |
| Analysis date: | June 21, 2025, 20:19:58 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 6 sections |
| MD5: | 3EBA7AED5636CFFD9B8B8A3780870DB3 |
| SHA1: | E843680DB1ECCDE091CD8ED10C4E65F91472CA5E |
| SHA256: | E06623CC4BC2227BD3AEECED3758776051FEEE79102AD9F8CF79F1575F6D2E7E |
| SSDEEP: | 98304:UDZikAK/WfDcvDr0vg8OgxP1PXmRbS2zjI+GHELnu0XuYVpoSX6eC5qSc0IjlcLj:3qSTcsHuNBYNWbf2h |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:08:17 22:25:45+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.4 |
| CodeSize: | 173056 |
| InitializedDataSize: | 151040 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb4d0 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | C:\WINDOWS\system32\cmd.exe /c "wmic useraccount where name='%username%' get sid" | C:\Windows\System32\cmd.exe | — | Soda.v1.4.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1068 | "C:\Users\admin\AppData\Local\Temp\Soda.v1.4.exe" | C:\Users\admin\AppData\Local\Temp\Soda.v1.4.exe | — | Soda.v1.4.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1560 | "C:\Users\admin\AppData\Local\Temp\Soda.v1.4.exe" | C:\Users\admin\AppData\Local\Temp\Soda.v1.4.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 3580 | wmic useraccount where name='admin' get sid | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3580 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3756 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | Soda.v1.4.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4968 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | Soda.v1.4.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_queue.pyd | executable | |
MD5:8EABD51D536276F3B3257EE975E50BFC | SHA256:24C23D04D274A4C1234F1A1A35B1805E1F17F99968F8BAEEC0C3B5295F05608A | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\VCRUNTIME140.dll | executable | |
MD5:F12681A472B9DD04A812E16096514974 | SHA256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8 | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_asyncio.pyd | executable | |
MD5:4AB3A456C59F6AED0D147C31FAB59604 | SHA256:97ED94F8D35445573177BA75E17DCF4C667E3C236C0B4D436FA97F8C862CC0BD | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_decimal.pyd | executable | |
MD5:B6ACB44C2F580991DF7B1358A0FC0B69 | SHA256:2BAB2833C24EB4E07FE082D291013EED000A5CFC22DF49311C729E7A57FE632E | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_socket.pyd | executable | |
MD5:4CEB5B09B8E7DC208C45C6AC11F13335 | SHA256:71F014C3C56661EC93500DB1D9F120E11725A8AEDABC3A395658275710065178 | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_ctypes.pyd | executable | |
MD5:2ABEEBE2166921A4D8B67B8F8A2B878A | SHA256:7ADCEA3A5568752A6050610CFBE791A4F8186AAAA002F916B88560A1DDAB580F | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_hashlib.pyd | executable | |
MD5:477DD76DBB15BAD8D77B978EA336F014 | SHA256:23063B56AA067C3D4A79A873D4DB113F6396F3E1FE0AF4B12D95D240C4CF9969 | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\_lzma.pyd | executable | |
MD5:401ECA12E2BEB9C2FBF4A0D871C1C500 | SHA256:5361824DDAC7C84811B80834ECA3ACB5FE6D63BF506CF92BAF5BD6C3786BF209 | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\base_library.zip | compressed | |
MD5:B71C1E073B7A1BB2E4F87767EB17BF63 | SHA256:927B335F7088B8A9F8509F99E59E5A86435A4A691A85A889A5BC6833A3A3381E | |||
| 1560 | Soda.v1.4.exe | C:\Users\admin\AppData\Local\Temp\_MEI15602\MSVCP140.dll | executable | |
MD5:72F3D84384E888BF0D38852EB863026B | SHA256:A4C2229BDC2A2A630ACDC095B4D86008E5C3E3BC7773174354F3DA4F5BEB9CDE | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 184.24.77.4:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1932 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7020 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1932 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5908 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 184.24.77.4:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1932 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |