File name:

1. HYPERMILL 2023 - USE THIS FIRST©.exe

Full analysis: https://app.any.run/tasks/4594b1d4-0c58-4d8a-99c3-ea82b7d0e85f
Verdict: Malicious activity
Analysis date: January 29, 2025, 21:27:23
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

A282509BBF6D577D08B4D9BCE5389C7A

SHA1:

4D43014F195B08DE8F69D6BEB394BB791AC8781C

SHA256:

ECF95263457070E5886EA370D9D1688CCE5A940BC22A9865611701BC3C4ECC0B

SSDEEP:

98304:v+fg1p2yRxkcDNgSSbu75Ygbpb1WmqACuE3t8hpjfY26V+5HAJ0lg0rQsLywEv4n:CYMvwBEwWSCUHHx576d+L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
    • Creates a software uninstall entry

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
  • INFO

    • Creates files in the program directory

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
    • Checks supported languages

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
    • The sample compiled with english language support

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
    • Reads the computer name

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
    • Create files in a temporary directory

      • 1. HYPERMILL 2023 - USE THIS FIRST©.exe (PID: 6692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 148992
InitializedDataSize: 397312
UninitializedDataSize: -
EntryPoint: 0x25468
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2023.2.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: -
CompanyName: SOLIDSQUAD SSQ
FileDescription: HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2 Installation
FileVersion: 2023.2
LegalCopyright: SOLIDSQUAD SSQ
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 1. hypermill 2023  - use this first©.exe 1. hypermill 2023  - use this first©.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6524"C:\Users\admin\AppData\Local\Temp\1. HYPERMILL 2023 - USE THIS FIRST©.exe" C:\Users\admin\AppData\Local\Temp\1. HYPERMILL 2023 - USE THIS FIRST©.exeexplorer.exe
User:
admin
Company:
SOLIDSQUAD SSQ
Integrity Level:
MEDIUM
Description:
HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2 Installation
Exit code:
3221226540
Version:
2023.2
Modules
Images
c:\users\admin\appdata\local\temp\1. hypermill 2023 - use this first©.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6692"C:\Users\admin\AppData\Local\Temp\1. HYPERMILL 2023 - USE THIS FIRST©.exe" C:\Users\admin\AppData\Local\Temp\1. HYPERMILL 2023 - USE THIS FIRST©.exe
explorer.exe
User:
admin
Company:
SOLIDSQUAD SSQ
Integrity Level:
HIGH
Description:
HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2 Installation
Exit code:
0
Version:
2023.2
Modules
Images
c:\users\admin\appdata\local\temp\1. hypermill 2023 - use this first©.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
44
Read events
28
Write events
16
Delete events
0

Modification events

(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:DisplayName
Value:
HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:DisplayVersion
Value:
2023.2
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:VersionMajor
Value:
2023
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:VersionMinor
Value:
2
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:Publisher
Value:
SOLIDSQUAD SSQ
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:DisplayIcon
Value:
C:\Program Files\OPEN MIND\hyperMILL\Uninstall.exe
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:UninstallString
Value:
C:\Program Files\OPEN MIND\hyperMILL\Uninstall.exe
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:URLInfoAbout
Value:
https://www.ssqcodex.xyz
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:HelpLink
Value:
mailto:ssqcodex@protonmail.com
(PID) Process:(6692) 1. HYPERMILL 2023 - USE THIS FIRST©.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\HYPERMILL 2023.2 UNIVERSAL PACTCHER 2023.2
Operation:writeName:InstallLocation
Value:
C:\Program Files\OPEN MIND\hyperMILL\
Executable files
4
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmp
MD5:
SHA256:
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Users\admin\AppData\Local\Temp\$inst\2.tmpcompressed
MD5:8708699D2C73BED30A0A08D80F96D6D7
SHA256:A32E0A83001D2C5D41649063217923DAC167809CAB50EC5784078E41C9EC0F0F
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Program Files\OPEN MIND\hyperMILL\Uninstall.exeexecutable
MD5:DC0C8C6C9F70C33FD239C0C68DFD29CD
SHA256:C5112257FF22D6F2F9D8706453A0286AD45C1C7115E5BB6B41D3B0C677E92F5C
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Program Files\OPEN MIND\hyperMILL\32.0\cycwin\cycrunx64.exeexecutable
MD5:49AB69058F23877258C17B5255F79E7B
SHA256:00D496EB68FE283DB699601BCC95EF80690E7E18797585D1A8A198FA271789F0
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Program Files\OPEN MIND\hyperMILL\Uninstall.initext
MD5:69FE4381BA1814DCE460557C8B1F5D71
SHA256:B586B99BD59D78F2A37A0453E2BD8A2D6AC70909B4AA2BBC20EE0A6E525A8791
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Users\admin\AppData\Local\Temp\$inst\0001.tmpcompressed
MD5:A01B7665AF43C313000E0BB68C273A2B
SHA256:B8C80FD0F03A268B8200F2983515B59B5E41BB7BDD81BA4A61B2383CCBB813FD
66921. HYPERMILL 2023 - USE THIS FIRST©.exeC:\Program Files\OPEN MIND\hyperMILL\32.0\win64\hm90Appx64.dllexecutable
MD5:277CACF8DBEED8E1CA5CCD30BD2D1D73
SHA256:7BFBD9F65F201D40EAC91F3CBC7D90CFFA069F2D260D58393294412364AA9C0C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
29
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5460
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2076
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2076
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.209.214.100:80
www.microsoft.com
PT. Telekomunikasi Selular
ID
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
2.18.97.227:443
go.microsoft.com
Akamai International B.V.
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2144
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
www.microsoft.com
  • 23.209.214.100
whitelisted
login.live.com
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted

Threats

No threats detected
No debug info