download:

test.exe

Full analysis: https://app.any.run/tasks/4d9d7739-7469-439b-9dc6-36b1bdb9a76b
Verdict: Malicious activity
Analysis date: January 15, 2022, 01:01:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

71CA06D7DFE21E83EA5D8D0E983FC1A1

SHA1:

DD4289EF7833356330D1570BB232E9D3121AEDF3

SHA256:

E6DF557815C5B2166DE06728ABE0C4FBA66BDBC2470E7CCB8725ED7D1A1B6275

SSDEEP:

6144:xDqZJaSeEyfWyELiU3hSCr2SqCsvxAt4uer5W1+8Hbc6AKA7zzSbQ5BI28PwP43A:xGZAjEyOylOhSCrXsvxAKTc3cLhUUP4w

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs injected code in another process

      • powercfg.exe (PID: 2500)
    • Application was injected by another process

      • svchost.exe (PID: 864)
    • Drops executable file immediately after starts

      • test.exe (PID: 2184)
  • SUSPICIOUS

    • Checks supported languages

      • test.exe (PID: 2184)
    • Creates files in the Windows directory

      • powercfg.exe (PID: 2500)
    • Removes files from Windows directory

      • powercfg.exe (PID: 2500)
    • Creates files in the program directory

      • powercfg.exe (PID: 2500)
    • Drops a file with a compile date too recent

      • test.exe (PID: 2184)
    • Executed as Windows Service

      • powercfg.exe (PID: 2500)
    • Executable content was dropped or overwritten

      • test.exe (PID: 2184)
    • Reads Microsoft Outlook installation path

      • powercfg.exe (PID: 2500)
  • INFO

    • Checks supported languages

      • powercfg.exe (PID: 2500)
    • Reads CPU info

      • powercfg.exe (PID: 2500)
    • Reads the computer name

      • powercfg.exe (PID: 2500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

ProductVersion: 2.746
FileVersion: 323423423423r,lsf
ProductName: sdfsdf34434
LegalCopyright: sfsffi34fo34f
CompanyName: dnsfsjdfoisdf
filedescription: The New
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Unknown (0)
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 52159.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x4d9c1
UninitializedDataSize: -
InitializedDataSize: 51200
CodeSize: 326144
LinkerVersion: 14.29
PEType: PE32
TimeStamp: 2022:01:14 14:24:16+01:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject test.exe powercfg.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
864C:\Windows\system32\svchost.exe -k DcomLaunchC:\Windows\system32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpnpmgr.dll
c:\windows\system32\spinf.dll
c:\windows\system32\user32.dll
2184"C:\Users\admin\AppData\Local\Temp\test.exe" C:\Users\admin\AppData\Local\Temp\test.exe
Explorer.EXE
User:
admin
Company:
dnsfsjdfoisdf
Integrity Level:
MEDIUM
Description:
The New
Exit code:
0
Version:
323423423423r,lsf
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\users\admin\appdata\local\temp\test.exe
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\user32.dll
2500C:\Windows\System32\powercfg.exe -energy -autoC:\Windows\System32\powercfg.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Power Settings Command-Line Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\powercfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
4 393
Read events
4 386
Write events
7
Delete events
0

Modification events

(PID) Process:(2500) powercfg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2500) powercfg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2500) powercfg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2500) powercfg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2500) powercfg.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
0
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
2500powercfg.exeC:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-ntkl.etl
MD5:
SHA256:
2500powercfg.exeC:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report-2022-01-15.xmlxml
MD5:
SHA256:
2500powercfg.exeC:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report-latest.xmlxml
MD5:
SHA256:
2184test.exeC:\Users\admin\AppData\Local\Intel Graphic Card\RuntimeBroker.exeexecutable
MD5:
SHA256:
2500powercfg.exeC:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-trace.etletl
MD5:
SHA256:
2500powercfg.exeC:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report.htmlhtml
MD5:
SHA256:
2500powercfg.exeC:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IDR_XML_DEFAULT_TRANSFORM[1]xml
MD5:7B9A05D16BE2420D5588E8E7E589D467
SHA256:000657B88AF66C4C62026AF12D97EBE3BFC8BA57B6262EA9B96BCE21AAE3F6BF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info