File name:

TEST-VM.exe

Full analysis: https://app.any.run/tasks/042651a1-49ed-48c8-b250-5d8edb2c31bd
Verdict: Malicious activity
Analysis date: February 19, 2024, 16:56:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

7C2548FED87679E59D0FB6D9814F6CBA

SHA1:

BFFE3DE5B3F90488D1946355FE204A38B06E423D

SHA256:

F0FDAB41C101A9F2C3937E0E51AEF83DC606BF38A49E1D9FD7CC49A198FAAB90

SSDEEP:

192:X10/VxRSSFl8Hww7HoaIiTQfOJV3YpK2:X1+xRFl8H1lI4QoVIpK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • TEST-VM.exe (PID: 3672)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Reads the Internet Settings

      • TEST-VM.exe (PID: 3672)
      • WMIC.exe (PID: 3716)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
      • WMIC.exe (PID: 1860)
      • WMIC.exe (PID: 2792)
    • Uses WMIC.EXE to obtain Windows Installer data

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 3716)
      • WMIC.exe (PID: 2792)
      • WMIC.exe (PID: 1860)
  • INFO

    • Checks supported languages

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Reads the computer name

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Reads the machine GUID from the registry

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Reads the software policy settings

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Reads Environment values

      • TEST-VM.exe (PID: 3672)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
    • Manual execution by a user

      • verclsid.exe (PID: 4060)
      • rundll32.exe (PID: 2572)
      • TEST-VM.exe (PID: 4004)
      • TEST-VM.exe (PID: 2072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2078:05:18 00:01:10+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 10240
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x4616
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: TEST-VM
FileVersion: 1.0.0.0
InternalName: TEST-VM.exe
LegalCopyright: Copyright © 2024
LegalTrademarks: -
OriginalFileName: TEST-VM.exe
ProductName: TEST-VM
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start test-vm.exe wmic.exe no specs verclsid.exe no specs rundll32.exe no specs test-vm.exe wmic.exe no specs test-vm.exe wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1860"wmic" csproduct get uuidC:\Windows\System32\wbem\WMIC.exeTEST-VM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2072"C:\Users\admin\AppData\Local\Temp\TEST-VM.exe" C:\Users\admin\AppData\Local\Temp\TEST-VM.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TEST-VM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\test-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2572"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\uxg4cf0w.f3xC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2792"wmic" csproduct get uuidC:\Windows\System32\wbem\WMIC.exeTEST-VM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3672"C:\Users\admin\AppData\Local\Temp\TEST-VM.exe" C:\Users\admin\AppData\Local\Temp\TEST-VM.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TEST-VM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\test-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3716"wmic" csproduct get uuidC:\Windows\System32\wbem\WMIC.exeTEST-VM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
4004"C:\Users\admin\AppData\Local\Temp\TEST-VM.exe" C:\Users\admin\AppData\Local\Temp\TEST-VM.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TEST-VM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\test-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
4060"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401C:\Windows\System32\verclsid.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extension CLSID Verification Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\verclsid.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
13 945
Read events
13 891
Write events
54
Delete events
0

Modification events

(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3672) TEST-VM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TEST-VM_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3672
TEST-VM.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4004
TEST-VM.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
unknown
2072
TEST-VM.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.108.133
shared

Threats

No threats detected
No debug info