File name:

snmptrap.exe

Full analysis: https://app.any.run/tasks/87617e24-b366-42c5-bbbd-766e8a07bfa7
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 11, 2023, 11:48:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

52C1B08E6FADFD8F7A763AF2993DAD49

SHA1:

2E596A7BF820BA46EEC9696063CEB90DD28D9957

SHA256:

E4EF60D42A5B8EE5CD7ED2DFA293B3637D9D8A2E5633443575DCE2B864485DA4

SSDEEP:

6144:9Gq5RaafE3sgFcukLJ4YEGGEmGsgMq48/:9Gq5RaafEHcvLJEGGE2gxT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • snmptrap.exe (PID: 3264)
      • manage-bde.exe (PID: 280)
    • Renames files like ransomware

      • manage-bde.exe (PID: 280)
    • Modifies files in the Chrome extension folder

      • manage-bde.exe (PID: 280)
    • Steals credentials from Web Browsers

      • manage-bde.exe (PID: 280)
    • Actions looks like stealing of personal data

      • manage-bde.exe (PID: 280)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • snmptrap.exe (PID: 3264)
    • Creates files like ransomware instruction

      • manage-bde.exe (PID: 280)
    • Reads browser cookies

      • manage-bde.exe (PID: 280)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1696)
      • sipnotify.exe (PID: 1460)
    • Reads the Internet Settings

      • sipnotify.exe (PID: 1460)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1460)
  • INFO

    • Checks supported languages

      • snmptrap.exe (PID: 3264)
      • manage-bde.exe (PID: 280)
      • IMEKLMG.EXE (PID: 340)
      • IMEKLMG.EXE (PID: 2060)
      • wmpnscfg.exe (PID: 2344)
      • wmpnscfg.exe (PID: 2424)
    • Reads the computer name

      • snmptrap.exe (PID: 3264)
      • IMEKLMG.EXE (PID: 340)
      • IMEKLMG.EXE (PID: 2060)
      • wmpnscfg.exe (PID: 2344)
      • wmpnscfg.exe (PID: 2424)
    • Reads the machine GUID from the registry

      • snmptrap.exe (PID: 3264)
      • manage-bde.exe (PID: 280)
      • wmpnscfg.exe (PID: 2344)
      • wmpnscfg.exe (PID: 2424)
    • Creates files or folders in the user directory

      • snmptrap.exe (PID: 3264)
      • sipnotify.exe (PID: 1460)
    • Dropped object may contain TOR URL's

      • manage-bde.exe (PID: 280)
    • Manual execution by a user

      • notepad.exe (PID: 1036)
      • IMEKLMG.EXE (PID: 340)
      • wmpnscfg.exe (PID: 2344)
      • wmpnscfg.exe (PID: 2424)
      • IMEKLMG.EXE (PID: 2060)
    • Process checks are UAC notifies on

      • IMEKLMG.EXE (PID: 340)
      • IMEKLMG.EXE (PID: 2060)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1460)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:06:18 23:01:49+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 194560
InitializedDataSize: 66048
UninitializedDataSize: -
EntryPoint: 0xc424
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 6.1.7600.16385
ProductVersionNumber: 6.1.7600.16385
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: SNMP Trap
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
InternalName: snmptrap.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: snmptrap.exe
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.1.7600.16385
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start snmptrap.exe no specs manage-bde.exe notepad.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Users\admin\AppData\Roaming\{efebfa8e-8026-42f6-b0d2-19400a14e665}\manage-bde.exe"C:\Users\admin\AppData\Roaming\{efebfa8e-8026-42f6-b0d2-19400a14e665}\manage-bde.exe
snmptrap.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BitLocker Drive Encryption: Configuration Tool
Exit code:
1073807364
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\appdata\roaming\{efebfa8e-8026-42f6-b0d2-19400a14e665}\manage-bde.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
340"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
1036"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXTC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1460C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1696C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2060"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2344"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2424"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3264"C:\Users\admin\AppData\Local\Temp\snmptrap.exe" C:\Users\admin\AppData\Local\Temp\snmptrap.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
SNMP Trap
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\users\admin\appdata\local\temp\snmptrap.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
9 251
Read events
9 226
Write events
14
Delete events
11

Modification events

(PID) Process:(2060) IMEKLMG.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\IMEKR\14.0
Operation:writeName:SetPreload
Value:
1
(PID) Process:(340) IMEKLMG.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\IMEJP\14.0
Operation:writeName:SetPreload
Value:
1
(PID) Process:(1460) sipnotify.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{9B03ED22-05E2-4995-BE7A-55B5EE3FD362}\{81C33B93-9E5C-4FFA-9EB8-880544B3200B}
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}\{81C33B93-9E5C-4FFA-9EB8-880544B3200B}
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B8ECC31C-9278-4C55-A213-F19A3B41AC3E}
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{F0C86FF2-B108-49B8-AE42-7338A6A9DD00}\{81C33B93-9E5C-4FFA-9EB8-880544B3200B}
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{F0C86FF2-B108-49B8-AE42-7338A6A9DD00}
Operation:delete keyName:(default)
Value:
(PID) Process:(2424) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{9B03ED22-05E2-4995-BE7A-55B5EE3FD362}
Operation:delete keyName:(default)
Value:
(PID) Process:(2344) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{A5B9794E-D97A-43C4-BCD8-21AA5B0D7E53}\{81C33B93-9E5C-4FFA-9EB8-880544B3200B}
Operation:delete keyName:(default)
Value:
Executable files
5
Suspicious files
883
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
280manage-bde.exeC:\Users\admin\Pictures\kborganizations.jpgbinary
MD5:C939CBB2DE27FE48C42E23655266505C
SHA256:74C18348DC740CC53665A1C55926DA7F18C95879D7E194C0C8A76AC5248BC52D
280manage-bde.exeC:\Users\admin\Documents\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:B43689DE7C2A9F1806F6BF2F31A7DE5C
SHA256:33F29A734045E8349D5D274189C4B17CDA25DBEDFB2FCD56DA13DEED5AF542E0
3264snmptrap.exeC:\Users\admin\AppData\Roaming\{efebfa8e-8026-42f6-b0d2-19400a14e665}\manage-bde.exeexecutable
MD5:52C1B08E6FADFD8F7A763AF2993DAD49
SHA256:E4EF60D42A5B8EE5CD7ED2DFA293B3637D9D8A2E5633443575DCE2B864485DA4
280manage-bde.exeC:\Users\admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:B43689DE7C2A9F1806F6BF2F31A7DE5C
SHA256:33F29A734045E8349D5D274189C4B17CDA25DBEDFB2FCD56DA13DEED5AF542E0
3264snmptrap.exeC:\Users\admin\AppData\Roaming\{efebfa8e-8026-42f6-b0d2-19400a14e665}\RCX103B.tmpexecutable
MD5:49AFC544917643EB771F73632E26E658
SHA256:3C976C470F68DE67DED287AF42676EA7063BC1D87763F935DD50379A4782A463
280manage-bde.exeC:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:B43689DE7C2A9F1806F6BF2F31A7DE5C
SHA256:33F29A734045E8349D5D274189C4B17CDA25DBEDFB2FCD56DA13DEED5AF542E0
280manage-bde.exeC:\Users\admin\Pictures\kborganizations.jpg.sJCxNPxHbinary
MD5:C939CBB2DE27FE48C42E23655266505C
SHA256:74C18348DC740CC53665A1C55926DA7F18C95879D7E194C0C8A76AC5248BC52D
280manage-bde.exeC:\Users\admin\Pictures\testingcame.jpgbinary
MD5:51EB14A87F20D5A928E977FE95163AA3
SHA256:EA650AD57C34592248744C5228C80527046EAA5B4CB255F2D7EED69CADDBCDBA
280manage-bde.exeC:\Users\admin\Pictures\pastschedule.jpg.sJCxNPxHbinary
MD5:8CB9F16495E6F1EFB0156D36E3BF7FEC
SHA256:B35C0DBDBF5A3DF787E3C106E97C71D54F8BC303687F310B856A59DB399A53F2
280manage-bde.exeC:\Users\admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:B43689DE7C2A9F1806F6BF2F31A7DE5C
SHA256:33F29A734045E8349D5D274189C4B17CDA25DBEDFB2FCD56DA13DEED5AF542E0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1460
sipnotify.exe
HEAD
200
23.197.138.118:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133467689515780000
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1128
svchost.exe
224.0.0.252:5355
unknown
1460
sipnotify.exe
23.197.138.118:80
query.prod.cms.rt.microsoft.com
Akamai International B.V.
US
unknown

DNS requests

Domain
IP
Reputation
query.prod.cms.rt.microsoft.com
  • 23.197.138.118
unknown

Threats

No threats detected
No debug info