File name:

Secret.exe

Full analysis: https://app.any.run/tasks/3fb89503-e190-417f-972e-4086eeae45c4
Verdict: Malicious activity
Analysis date: November 06, 2023, 07:41:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

15980FF9A916EB48EC5B1B3DE01078E2

SHA1:

CBE322E90588BF65AF4D2B0A9FC46FC5526617DD

SHA256:

F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D

SSDEEP:

6144:HgiATx6jIfIvKS9hQC7sQOBhgEa8h6dr9AJDAB4vuxmVvTTntKapeTeUpG0uTPMD:Aix6xhu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • seukui.exe (PID: 3164)
    • Drops the executable file immediately after the start

      • Secret.exe (PID: 3372)
      • seukui.exe (PID: 3164)
    • Changes appearance of the Explorer extensions

      • seukui.exe (PID: 3164)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Secret.exe (PID: 3372)
    • Starts itself from another location

      • Secret.exe (PID: 3372)
    • Connects to unusual port

      • Secret.exe (PID: 3372)
  • INFO

    • Reads the computer name

      • Secret.exe (PID: 3372)
      • seukui.exe (PID: 3164)
    • Checks supported languages

      • Secret.exe (PID: 3372)
      • seukui.exe (PID: 3164)
    • Reads the machine GUID from the registry

      • Secret.exe (PID: 3372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (84.4)
.dll | Win32 Dynamic Link Library (generic) (6.7)
.exe | Win32 Executable (generic) (4.6)
.exe | Generic Win/DOS Executable (2)
.exe | DOS Executable Generic (2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:01:14 19:24:19+01:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 221184
InitializedDataSize: 24576
UninitializedDataSize: -
EntryPoint: 0x3cf8
OSVersion: 4
ImageVersion: 8.88
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.88.0.0
ProductVersionNumber: 8.88.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: ktsqhix
LegalCopyright: ktsqhix
ProductName: eznkqzm
FileVersion: 8.88
ProductVersion: 8.88
InternalName: cjrllp
OriginalFileName: cjrllp.exe
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start secret.exe seukui.exe

Process information

PID
CMD
Path
Indicators
Parent process
3164"C:\Users\admin\seukui.exe" C:\Users\admin\seukui.exe
Secret.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\seukui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3372"C:\Users\admin\AppData\Local\Temp\Secret.exe" C:\Users\admin\AppData\Local\Temp\Secret.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225547
Modules
Images
c:\users\admin\appdata\local\temp\secret.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
923
Read events
913
Write events
10
Delete events
0

Modification events

(PID) Process:(3372) Secret.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3372) Secret.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3372) Secret.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3372) Secret.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3164) seukui.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:seukui
Value:
C:\Users\admin\seukui.exe /o
(PID) Process:(3164) seukui.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Operation:writeName:ShowSuperHidden
Value:
0
Executable files
17
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3164seukui.exeC:\Users\admin\RCXAD9C.tmpexecutable
MD5:86293047233BCD557D85A50D46E0E1D7
SHA256:239D07DD7BD1A8DCE5720B72B4534D8C1CCD3459C849D0D8E964589657A1E512
3164seukui.exeC:\Users\admin\Porn.exeexecutable
MD5:15980FF9A916EB48EC5B1B3DE01078E2
SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D
3164seukui.exeC:\Users\admin\RCXAD7B.tmpexecutable
MD5:4AF475E5C61A2A6A01C4D959693ABB5B
SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5
3164seukui.exeC:\Users\admin\RCXADDD.tmpexecutable
MD5:C2DD36CC1E651BBFDE6F6B3167604D0B
SHA256:7CD38B537FF639C2E0B95C8D40A92E2C607E7C35C8D5B5D040D1ED05C526A117
3164seukui.exeC:\Users\admin\Secret.exeexecutable
MD5:15980FF9A916EB48EC5B1B3DE01078E2
SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D
3164seukui.exeC:\Users\admin\Sexy.exeexecutable
MD5:15980FF9A916EB48EC5B1B3DE01078E2
SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D
3164seukui.exeC:\Users\admin\RCXAD8B.tmpexecutable
MD5:4AF475E5C61A2A6A01C4D959693ABB5B
SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5
3372Secret.exeC:\Users\admin\seukui.exeexecutable
MD5:15980FF9A916EB48EC5B1B3DE01078E2
SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D
3164seukui.exeC:\Users\admin\Passwords.exeexecutable
MD5:15980FF9A916EB48EC5B1B3DE01078E2
SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D
3164seukui.exeC:\Users\admin\RCXADBC.tmpexecutable
MD5:4AF475E5C61A2A6A01C4D959693ABB5B
SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
868
svchost.exe
95.101.148.135:80
Akamai International B.V.
NL
unknown
3372
Secret.exe
13.248.169.48:9004
ns1.helpchecks.com
AMAZON-02
US
unknown
4
System
192.168.100.255:138
whitelisted
868
svchost.exe
184.30.20.134:80
armmf.adobe.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
ns1.helpchecks.com
  • 13.248.169.48
  • 76.223.54.146
malicious
armmf.adobe.com
  • 184.30.20.134
whitelisted

Threats

No threats detected
No debug info