File name:

ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5

Full analysis: https://app.any.run/tasks/8ee4ca24-51ad-43db-9880-65b2e57c10b0
Verdict: Malicious activity
Analysis date: December 13, 2024, 19:32:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

DA97B9A6CC7C861E640DB3B511D9DF16

SHA1:

65BA2934956272BAF40795ACE3330646F493C725

SHA256:

ED068B9ED39057F84F9A32C07BD1EFB4D9B31473FD348383163B1D50537EA8D5

SSDEEP:

6144:97uFTDhfqfWJUNo5kUe7fOBOql9+3aPq99nQHHV:VuFTDhSfWJUNo5kUe7fOBj/PS6V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
    • The process creates files with name similar to system file names

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
    • Executable content was dropped or overwritten

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
  • INFO

    • Creates files or folders in the user directory

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
    • Checks supported languages

      • ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe (PID: 1144)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:15 04:06:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 8192
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Users\admin\Desktop\ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe" C:\Users\admin\Desktop\ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
11
Read events
11
Write events
0
Delete events
0

Modification events

No data
Executable files
1 231
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exe
MD5:
SHA256:
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exe
MD5:
SHA256:
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmpexecutable
MD5:1CDC1A8E1CBA3E681B6A9459BEADEF88
SHA256:8AFF9DD85F45D99386E8AABD75F10F77502EB315A901F30ADBBF470878E709E9
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:214E7D7E886504CAE738DEB6AD823929
SHA256:E09BB049362BADC55EF1799AD520021CA7863D0B61639ED1E01501C6A6F628DC
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat.tlb.tmpexecutable
MD5:19D41EB9750F1904B43ED8DDB087AD2B
SHA256:C9C53AD87907B5A8BDE8888BD135E4E7D25E7C88F4B1137B015F9DB9C9CD5018
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:ABB2940184D408C8CE0903994449901E
SHA256:BA01EDE3F93A109C7031010590880A19EAF4F401813E94C942D92D3120F47676
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef_extensions.pak.tmpexecutable
MD5:EA45B098D73601F4E3D08F3FF7B5EF6D
SHA256:5119986F8F265CE563878007F7FEEF7EF7EDE08AE578419B1ACC4FB6A8042908
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\ACE.dll.tmpexecutable
MD5:333300A8024445E4DABA1FEFD962F47F
SHA256:0139AE9DD36E811D4AE6AF0B97169DA7EDB77FDD245096828FFD7D7BAF1335C3
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:69D0723E22EA9EEFB1CC7D8AD4D964AD
SHA256:25A10EE49612A05A343C8209BF7EA4734503DF4ACC09A75942AF7FFD2D2AEFF6
1144ed068b9ed39057f84f9a32c07bd1efb4d9b31473fd348383163b1d50537ea8d5.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe.tmpexecutable
MD5:941F3F4F0DE1F3DDFEF69D751039F96B
SHA256:F81500BE691A0C8EB45A34E7689D0084D7FF4E0E142A623E4B5E9CC893AB8F54
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
15
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
488
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5972
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
488
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5972
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
488
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5972
RUXIMICS.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 20.42.73.24
whitelisted

Threats

No threats detected
No debug info