File name:

list.exe

Full analysis: https://app.any.run/tasks/2cd0ae53-4b95-400a-95e3-05ea41dcdad8
Verdict: Malicious activity
Analysis date: December 18, 2024, 14:10:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

8EABEA9B74251FE67F24B87E54486643

SHA1:

B8549E3ABE3828BE7164E507414658DF238C2652

SHA256:

EC252C14B60754A9E280E0E4624077FCC3AF03347F1A585B539F8D100777AD22

SSDEEP:

98304:YYGTU+iQlS0A9Enuf8BQA+kkwb0gwvkemRFpYMLi5zZufttbxnbL6f1Igbodr3UK:4bWnmSlQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • list.exe (PID: 6956)
      • list.tmp (PID: 6976)
      • bsoftvideocapture33.exe (PID: 6996)
    • Reads the Windows owner or organization settings

      • list.tmp (PID: 6976)
    • The process drops C-runtime libraries

      • list.tmp (PID: 6976)
    • Process drops legitimate windows executable

      • list.tmp (PID: 6976)
    • Reads security settings of Internet Explorer

      • bsoftvideocapture33.exe (PID: 6996)
    • Starts POWERSHELL.EXE for commands execution

      • bsoftvideocapture33.exe (PID: 6996)
  • INFO

    • Create files in a temporary directory

      • list.exe (PID: 6956)
      • list.tmp (PID: 6976)
    • Checks supported languages

      • list.exe (PID: 6956)
      • list.tmp (PID: 6976)
      • bsoftvideocapture33.exe (PID: 6996)
    • Reads the computer name

      • list.tmp (PID: 6976)
      • bsoftvideocapture33.exe (PID: 6996)
    • Creates files or folders in the user directory

      • list.tmp (PID: 6976)
    • The sample compiled with english language support

      • list.tmp (PID: 6976)
    • The sample compiled with russian language support

      • list.tmp (PID: 6976)
    • Creates a software uninstall entry

      • list.tmp (PID: 6976)
    • Creates files in the program directory

      • bsoftvideocapture33.exe (PID: 6996)
    • Changes the registry key values via Powershell

      • bsoftvideocapture33.exe (PID: 6996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (71.1)
.exe | Win32 Executable Delphi generic (9.1)
.scr | Windows screen saver (8.4)
.dll | Win32 Dynamic Link Library (generic) (4.2)
.exe | Win32 Executable (generic) (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 40448
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0xa5f8
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Brekkiesoft Video Capture Setup
FileVersion:
LegalCopyright:
ProductName: Brekkiesoft Video Capture
ProductVersion:
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start list.exe list.tmp bsoftvideocapture33.exe powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6956"C:\Users\admin\AppData\Local\Temp\list.exe" C:\Users\admin\AppData\Local\Temp\list.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Brekkiesoft Video Capture Setup
Version:
Modules
Images
c:\users\admin\appdata\local\temp\list.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6976"C:\Users\admin\AppData\Local\Temp\is-0KPM2.tmp\list.tmp" /SL5="$4035A,3326084,56832,C:\Users\admin\AppData\Local\Temp\list.exe" C:\Users\admin\AppData\Local\Temp\is-0KPM2.tmp\list.tmp
list.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-0kpm2.tmp\list.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6996"C:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\bsoftvideocapture33.exe" -iC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\bsoftvideocapture33.exe
list.tmp
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\brekkiesoft video capture 1.33\bsoftvideocapture33.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7048"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" -Name "vCapture8" -Value "C:\ProgramData\BrekkiesoftVideoCapture\BrekkiesoftVideoCapture.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exebsoftvideocapture33.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 617
Read events
4 603
Write events
14
Delete events
0

Modification events

(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.5.3 (a)
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:Inno Setup: Icon Group
Value:
(Default)
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:Inno Setup: Language
Value:
English
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:DisplayName
Value:
Brekkiesoft Video Capture 1.33
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\uninstall\unins000.exe"
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\uninstall\unins000.exe" /SILENT
(PID) Process:(6976) list.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brekkiesoft Video Capture_is1
Operation:writeName:NoModify
Value:
1
Executable files
22
Suspicious files
4
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
6956list.exeC:\Users\admin\AppData\Local\Temp\is-0KPM2.tmp\list.tmpexecutable
MD5:048F12CF9C44FE7D997B30F23A9A2228
SHA256:B3724BBFDF84CAAD3D390F27EF5EB513909BBF5389900BEFF465332317E56AAB
6976list.tmpC:\Users\admin\AppData\Local\Temp\is-T9HT8.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
6976list.tmpC:\Users\admin\AppData\Local\Temp\is-T9HT8.tmp\_isetup\_iscrypt.dllexecutable
MD5:A69559718AB506675E907FE49DEB71E9
SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\is-U2RVC.tmp
MD5:
SHA256:
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\uninstall\is-PHAB7.tmpexecutable
MD5:3D980E66654B6000D5D70CF137B56E1B
SHA256:73653CC7CF03FD06D7396E928CA524CD391B2BD061B031DA99F4E81E161B14B2
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\msvcp71.dllexecutable
MD5:561FA2ABB31DFA8FAB762145F81667C2
SHA256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\msvcr71.dllexecutable
MD5:86F1895AE8C5E8B17D99ECE768A70732
SHA256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\is-D6GUH.tmpexecutable
MD5:871C903A90C45CA08A9D42803916C3F7
SHA256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\is-PNL8J.tmpexecutable
MD5:FEC4FF0C2967A05543747E8D552CF9DF
SHA256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
6976list.tmpC:\Users\admin\AppData\Local\Brekkiesoft Video Capture 1.33\gdiplus.dllexecutable
MD5:871C903A90C45CA08A9D42803916C3F7
SHA256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3436
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6516
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3436
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.154:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
192.168.100.255:138
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 4.231.128.59
whitelisted
www.bing.com
  • 104.126.37.154
  • 104.126.37.152
  • 104.126.37.144
  • 104.126.37.136
  • 104.126.37.130
  • 104.126.37.185
  • 104.126.37.137
  • 104.126.37.123
  • 104.126.37.139
whitelisted
google.com
  • 142.250.185.174
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
unknown
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.140
  • 20.190.160.17
  • 20.190.160.20
  • 40.126.32.136
whitelisted
go.microsoft.com
  • 23.35.238.131
unknown
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info