| File name: | Extract 3D Print Part All.exe |
| Full analysis: | https://app.any.run/tasks/e95be3c1-7c03-4f24-888d-5d9270286035 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | February 14, 2025, 16:17:57 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 8 sections |
| MD5: | 57F715859355BD66E6CE1F02BA7E3429 |
| SHA1: | 66240C3E10406D82BA9ED6DB48D90C40475B9170 |
| SHA256: | E3FFF8FDB26FFF7F7B7A7E8FE3DA1A48F85D57DA0445A58943941BBB82AFA6C2 |
| SSDEEP: | 12288:U519i8Q8roXav8fOskHQQSU18WiXcXgazJ3P6KWLOAN4Oj:U55kVmHQ6gazJfPAN4Oj |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:02:26 09:01:47+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.33 |
| CodeSize: | 288768 |
| InitializedDataSize: | 163328 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x32e60 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 204 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powercfg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 204 | C:\WINDOWS\system32\dialer.exe | C:\Windows\System32\dialer.exe | — | sdfg5fee.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Windows Phone Dialer Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 320 | C:\WINDOWS\system32\svchost.exe -k DcomLaunch -p -s LSM | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 376 | C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 536 | C:\WINDOWS\system32\sc.exe delete "WAGDKRVZ" | C:\Windows\System32\sc.exe | — | liu5jhg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 624 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 640 | C:\WINDOWS\system32\sc.exe stop dosvc | C:\Windows\System32\sc.exe | — | kaptsegthwf.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Service Control Manager Configuration Tool Exit code: 1062 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | winlogon.exe | C:\Windows\System32\winlogon.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Logon Application Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 760 | C:\WINDOWS\system32\lsass.exe | C:\Windows\System32\lsass.exe | wininit.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Local Security Authority Process Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 812 | C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1276) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C2AF3602-9179-4BAE-85B3-74A4EF5CF51F} |
| Operation: | write | Name: | DynamicInfo |
Value: 03000000BDCB09F80A59DA0186AED304FC7EDB010000000000000000CEF1EF07FC7EDB01 | |||
| (PID) Process: | (1276) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{4671B5C1-A383-4428-A45A-8D348E4CB873} |
| Operation: | write | Name: | DynamicInfo |
Value: 030000009F7DFD23AAB7D8010FF3C204FC7EDB010000000000000000FB2DCF09FC7EDB01 | |||
| (PID) Process: | (4268) ctfmon.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Input\TypingInsights |
| Operation: | write | Name: | Insights |
Value: 02000000071DE8C131CC8360A3D6D9C1330A686B165ABA2E235F5A5C | |||
| (PID) Process: | (1340) svchost.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store |
| Operation: | write | Name: | C:\Users\admin\AppData\Local\Temp\Extract 3D Print Part All.exe |
Value: 534143500100000000000000070000002800000057A25D000000000001000000000000000000000A0021000050BB64EDDDACD5010000000000000000 | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile\extract 3d print|a3de61c6c1be9498 |
| Operation: | write | Name: | ProgramId |
Value: 00065d5bacd373144b822b6dc26a4d06c9770000ffff | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile\extract 3d print|a3de61c6c1be9498 |
| Operation: | write | Name: | FileId |
Value: 000066240c3e10406d82ba9ed6db48d90c40475b9170 | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile\extract 3d print|a3de61c6c1be9498 |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\users\admin\appdata\local\temp\extract 3d print part all.exe | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{ba508f59-178e-7fcd-e401-10c27b47ebb6}\Root\InventoryApplicationFile\extract 3d print|a3de61c6c1be9498 |
| Operation: | write | Name: | LongPathHash |
Value: extract 3d print|a3de61c6c1be9498 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\auto14.bat | text | |
MD5:13314406B39C2CD68C21F73FB5142E75 | SHA256:216CF8A41A1A8A76E53AEEA94F5DBC090B7302656AA44B46360CA8BD1D65C0E5 | |||
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\bolt_25x8.stl | text | |
MD5:43772B7013656C84EF5E7A69E830F0CE | SHA256:0C3427A2F023F4DE599ABE1CDA57F299535B395CD56CF8DFE3E61BF5840AC0B7 | |||
| 4488 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\washer_1_x_8.5.stl | text | |
MD5:A1E7F53CED2F9B191CF640D378CFBF47 | SHA256:3D4BA8534F8D20736B3BB956E5141113B60391F6D7224620A88333A1C18253AE | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\EXTRACT 3D PRINT PART ALL.EXE-C687B749.pf | binary | |
MD5:274A80858C0364255B9A63AFF5B10318 | SHA256:3D0D09663C287862DA245CE3B102C73A47300BD7D25ECA6439E478157C8E7B4C | |||
| 5164 | dllhost.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk | binary | |
MD5:9628937F1D0F7449C2BB18557D32ABBC | SHA256:B4F5910E457A3718E24C74BC67529F799CE881225673F938E9462A76F90C40C3 | |||
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\wingnut_6x9.stl | text | |
MD5:09A76AB0D924B97201AEC851C2C589CC | SHA256:3B7FCAE304933F6FAAB1DE4218476FB439287E035EAA94247B72F0DF1285D278 | |||
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\Nut_Job.scad | text | |
MD5:97C6A47E07BD92F7236C783D40053793 | SHA256:1623961BB2F76E2EBD3685377A9D94ECC5ACB95C7B3451A5575F93F8BBAA7C42 | |||
| 6172 | Extract 3D Print Part All.exe | C:\Users\admin\AppData\Local\Temp\NutJoiner18x9.stl | text | |
MD5:8FA949B46484C44508E10E250ACBD7E2 | SHA256:A3BA0B63FEB4E766E3B214ED53D911198C2DB44CA6431175DC6D4588EC7FE22D | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\NET.EXE-DF44F913.pf | binary | |
MD5:79F497C83C7A4BD9C5234D1DF2D1DE55 | SHA256:03655BE0B5900A57D2878976A40092154872F684C1D2FDEC0CB8A2858C49564B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.180:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2508 | svchost.exe | GET | 200 | 23.48.23.180:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2508 | svchost.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.67.160.244:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 23.67.160.244:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6644 | powershell.exe | GET | 200 | 185.148.3.216:80 | http://185.148.3.216/Okfgjrg5d8gt | unknown | — | — | malicious |
6192 | SIHClient.exe | GET | 200 | 92.123.22.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6560 | backgroundTaskHost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
6192 | SIHClient.exe | GET | 200 | 92.123.22.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.180:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2508 | svchost.exe | 23.48.23.180:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.19.217.218:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
2508 | svchost.exe | 2.19.217.218:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 23.212.110.200:443 | www.bing.com | Akamai International B.V. | CZ | whitelisted |
— | — | 23.67.160.244:80 | ocsp.digicert.com | AKAMAI-AS | JP | whitelisted |
1176 | svchost.exe | 20.190.160.65:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1176 | svchost.exe | 23.67.160.244:80 | ocsp.digicert.com | AKAMAI-AS | JP | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6644 | powershell.exe | Not Suspicious Traffic | ET INFO Windows Powershell User-Agent Usage |
6644 | powershell.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6644 | powershell.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
7208 | dialer.exe | Crypto Currency Mining Activity Detected | ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message |
7208 | dialer.exe | Crypto Currency Mining Activity Detected | ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message |
7208 | dialer.exe | Crypto Currency Mining Activity Detected | ET COINMINER W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message |