File name:

UltraVNC_1436_X64_Setup.exe

Full analysis: https://app.any.run/tasks/3fac5096-fa8a-4d69-a686-f920c52d88e0
Verdict: Malicious activity
Analysis date: July 20, 2024, 06:07:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

DBF83D039B96E3F869D9606381B7611B

SHA1:

3B1F7F1A626DB5390529A5EF849D26C38ADA0E43

SHA256:

EC5438589261FDB717EA4AFF892F545E9E2F0A72D43E4386BC80A83976DCC2A0

SSDEEP:

98304:l+cD4dnB4Urewpsgy13GbZioEVgUkxOC/wm+fPX/kjI6jONuUd3SKxc+3BY210Qr:jF7X6BGV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • UltraVNC_1436_X64_Setup.exe (PID: 2768)
      • UltraVNC_1436_X64_Setup.exe (PID: 6240)
      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
      • winvnc.exe (PID: 4368)
      • drvinst.exe (PID: 6260)
    • Creates a writable file in the system directory

      • drvinst.exe (PID: 6260)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • UltraVNC_1436_X64_Setup.tmp (PID: 8088)
    • Executable content was dropped or overwritten

      • UltraVNC_1436_X64_Setup.exe (PID: 6240)
      • UltraVNC_1436_X64_Setup.exe (PID: 2768)
      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
      • winvnc.exe (PID: 4368)
      • drvinst.exe (PID: 6260)
    • Reads security settings of Internet Explorer

      • UltraVNC_1436_X64_Setup.tmp (PID: 8088)
    • Reads the Windows owner or organization settings

      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
    • Adds/modifies Windows certificates

      • certutil.exe (PID: 6028)
    • Creates files in the driver directory

      • drvinst.exe (PID: 6260)
    • Checks Windows Trust Settings

      • drvinst.exe (PID: 6260)
  • INFO

    • Checks supported languages

      • UltraVNC_1436_X64_Setup.exe (PID: 2768)
      • UltraVNC_1436_X64_Setup.exe (PID: 6240)
      • UltraVNC_1436_X64_Setup.tmp (PID: 8088)
      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
      • winvnc.exe (PID: 4368)
      • drvinst.exe (PID: 6260)
    • Create files in a temporary directory

      • UltraVNC_1436_X64_Setup.exe (PID: 6240)
      • UltraVNC_1436_X64_Setup.exe (PID: 2768)
      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
      • winvnc.exe (PID: 4368)
    • Process checks computer location settings

      • UltraVNC_1436_X64_Setup.tmp (PID: 8088)
    • Reads the computer name

      • UltraVNC_1436_X64_Setup.tmp (PID: 8088)
      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
      • winvnc.exe (PID: 4368)
    • Creates files in the program directory

      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
    • Creates a software uninstall entry

      • UltraVNC_1436_X64_Setup.tmp (PID: 6984)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 6260)
    • Reads the software policy settings

      • drvinst.exe (PID: 6260)
    • Adds/modifies Windows certificates

      • drvinst.exe (PID: 6260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 330752
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 1.4.3.6
ProductVersionNumber: 1.4.3.6
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: uvnc bvba
FileDescription: UltraVNC installer
FileVersion: 1.4.3.6
LegalCopyright: UltraVnc Team
OriginalFileName:
ProductName: UltraVNC
ProductVersion: 1.4.3.6
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
10
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start ultravnc_1436_x64_setup.exe ultravnc_1436_x64_setup.tmp no specs ultravnc_1436_x64_setup.exe ultravnc_1436_x64_setup.tmp slui.exe no specs certutil.exe no specs conhost.exe no specs winvnc.exe conhost.exe no specs drvinst.exe

Process information

PID
CMD
Path
Indicators
Parent process
2632C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2768"C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe" C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe
explorer.exe
User:
admin
Company:
uvnc bvba
Integrity Level:
MEDIUM
Description:
UltraVNC installer
Version:
1.4.3.6
Modules
Images
c:\users\admin\appdata\local\temp\ultravnc_1436_x64_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
4368"C:\Program Files\uvnc bvba\UltraVNC\winvnc.exe" -installdriverC:\Program Files\uvnc bvba\UltraVNC\winvnc.exe
UltraVNC_1436_X64_Setup.tmp
User:
admin
Company:
UltraVNC
Integrity Level:
HIGH
Description:
VNC server
Version:
1.4.3.6
Modules
Images
c:\program files\uvnc bvba\ultravnc\winvnc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\wtsapi32.dll
6028"certutil.exe" -addstore "TrustedPublisher" "C:\Program Files\uvnc bvba\UltraVNC\ultravnc.cer"C:\Windows\System32\certutil.exeUltraVNC_1436_X64_Setup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CertUtil.exe
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6240"C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe" /SPAWNWND=$30254 /NOTIFYWND=$B0236 C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe
UltraVNC_1436_X64_Setup.tmp
User:
admin
Company:
uvnc bvba
Integrity Level:
HIGH
Description:
UltraVNC installer
Version:
1.4.3.6
Modules
Images
c:\users\admin\appdata\local\temp\ultravnc_1436_x64_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
6260DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{be4dffa7-a1b7-9643-860c-42a8f91ebaa7}\UVncVirtualDisplay.inf" "9" "4b054afff" "00000000000001E0" "WinSta0\Default" "00000000000001E8" "208" "C:\Program Files\uvnc bvba\UltraVNC\UVncVirtualDisplay64"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
6384\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execertutil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6984"C:\Users\admin\AppData\Local\Temp\is-PBKJQ.tmp\UltraVNC_1436_X64_Setup.tmp" /SL5="$502B4,4765869,1073664,C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe" /SPAWNWND=$30254 /NOTIFYWND=$B0236 C:\Users\admin\AppData\Local\Temp\is-PBKJQ.tmp\UltraVNC_1436_X64_Setup.tmp
UltraVNC_1436_X64_Setup.exe
User:
admin
Company:
uvnc bvba
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-pbkjq.tmp\ultravnc_1436_x64_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\mpr.dll
8000\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewinvnc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8088"C:\Users\admin\AppData\Local\Temp\is-18J1B.tmp\UltraVNC_1436_X64_Setup.tmp" /SL5="$B0236,4765869,1073664,C:\Users\admin\AppData\Local\Temp\UltraVNC_1436_X64_Setup.exe" C:\Users\admin\AppData\Local\Temp\is-18J1B.tmp\UltraVNC_1436_X64_Setup.tmpUltraVNC_1436_X64_Setup.exe
User:
admin
Company:
uvnc bvba
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-18j1b.tmp\ultravnc_1436_x64_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
Total events
9 444
Read events
9 399
Write events
43
Delete events
2

Modification events

(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
481B00008F8E2B246BDADA01
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
7A2CEE74670E47BC3D49DB7298ACB637584C00DDA05B33BE4C6470AC8A544899
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Program Files\uvnc bvba\UltraVNC\winvnc.exe
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
2ACA0E8F4CB0D233630A6D02337B6D3B58BEBEDBC2788AE09F61E99C9890EA46
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ultravnc2_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.2.2
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ultravnc2_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files\uvnc bvba\UltraVNC
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ultravnc2_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files\uvnc bvba\UltraVNC\
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ultravnc2_is1
Operation:writeName:Inno Setup: Icon Group
Value:
UltraVNC
(PID) Process:(6984) UltraVNC_1436_X64_Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ultravnc2_is1
Operation:writeName:Inno Setup: User
Value:
admin
Executable files
53
Suspicious files
15
Text files
10
Unknown types
13

Dropped files

PID
Process
Filename
Type
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\is-NLHS2.tmptext
MD5:CBDC78243472C2303526DE8FEADE0883
SHA256:0E1A2BDD813D817CF81D7E76D2C27DDE02986D41370147D785C4617BD9C91080
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\is-B0EKP.tmptext
MD5:93FF192EEAA61CF46D31FC78B91487E7
SHA256:71AB490CD1D4D9809E75432ECFF0661CCCBEF9333204E7FC1B3622378A01CF58
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\Licence.rtftext
MD5:CBDC78243472C2303526DE8FEADE0883
SHA256:0E1A2BDD813D817CF81D7E76D2C27DDE02986D41370147D785C4617BD9C91080
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\unins000.exeexecutable
MD5:CE65489E0C3193D40A7F8640ACAEC275
SHA256:BB0BEAB919DF67852987620C706D0504C3628CEE71D92610E7307DCFF24BD8C9
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\is-VH2O5.tmpexecutable
MD5:CE65489E0C3193D40A7F8640ACAEC275
SHA256:BB0BEAB919DF67852987620C706D0504C3628CEE71D92610E7307DCFF24BD8C9
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\winvnc.exeexecutable
MD5:27C1C264C6FCE4A5F44419F1783DB8E0
SHA256:29379AFD1CA5439C82931D623FDA335174DC416E5B013591457FA1F7BBE564DB
6984UltraVNC_1436_X64_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-V21KM.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\is-UNTCP.tmpder
MD5:8D739886740F8B4042B62E6F52D99FBC
SHA256:EDB06C7AAFAD3567266849F78B86D97258E7E9A792F06B74AEFF095F10732C29
6984UltraVNC_1436_X64_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-V21KM.tmp\isdonate.bmpimage
MD5:6239A3BF88132514BF3D879352639195
SHA256:C925160C8686390A4420FF9C35DED0654E2B7D4B432B0BF18290B843FC2E5B12
6984UltraVNC_1436_X64_Setup.tmpC:\Program Files\uvnc bvba\UltraVNC\is-R8GPQ.tmptext
MD5:978EE2045410822FD5B06109C1EBA856
SHA256:911502502D24192B7C90A2C3391CB7CA91497E4CC9FB316E09D18EABD271C246
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
34
DNS requests
12
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4716
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5620
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7856
svchost.exe
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3400
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7856
svchost.exe
4.209.33.156:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4716
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.0
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
licensing.mp.microsoft.com
  • 4.209.33.156
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
www.bing.com
  • 104.126.37.170
  • 104.126.37.130
  • 104.126.37.171
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.163
  • 104.126.37.160
  • 104.126.37.128
  • 104.126.37.139
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

No threats detected
No debug info