File name:

neoTermServSetup.exe

Full analysis: https://app.any.run/tasks/b3baec1f-64b4-4f48-a9f8-75e2568b072d
Verdict: Malicious activity
Analysis date: January 22, 2025, 12:34:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

9980AFA1FCADABC96312DA46AA8B0AC6

SHA1:

12D4E9D858CD260CC81314BC61DA985364C49643

SHA256:

F3E9E9497ABD12AB005362B21C41D8C9852970050B8CC62ABBABC215896B9FC3

SSDEEP:

98304:byR5i6CSDsR++nGBYoYB/3jKaMNM4B0Tgqz0ZuZ8ftXbmcl8cKGYg4FbG6EJE1Ma:Xnh8U5x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • neoTermServSetup.exe (PID: 2996)
    • Process drops legitimate windows executable

      • neoTermServSetup.exe (PID: 2996)
    • Executable content was dropped or overwritten

      • neoTermServSetup.exe (PID: 2996)
    • Creates a software uninstall entry

      • neoTermServSetup.exe (PID: 2996)
  • INFO

    • Reads the computer name

      • neoTermServSetup.exe (PID: 2996)
    • Creates files or folders in the user directory

      • neoTermServSetup.exe (PID: 2996)
    • The sample compiled with english language support

      • neoTermServSetup.exe (PID: 2996)
    • Checks supported languages

      • neoTermServSetup.exe (PID: 2996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 22:27:36+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 123904
UninitializedDataSize: 1024
EntryPoint: 0x366e
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start neotermservsetup.exe

Process information

PID
CMD
Path
Indicators
Parent process
2996"C:\Users\admin\AppData\Local\Temp\neoTermServSetup.exe" C:\Users\admin\AppData\Local\Temp\neoTermServSetup.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\neotermservsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
220
Read events
201
Write events
19
Delete events
0

Modification events

(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Pulse Secure\Pulse Terminal Services Client
Operation:writeName:Language
Value:
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:DisplayName
Value:
Pulse Secure Terminal Services Client
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\uninstall.exe"
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\uninstall.exe" /S
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:StartupApp
Value:
"C:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServ.exe"
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:StopApp
Value:
"C:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServ.exe" -stop
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:DisplayVersion
Value:
9.1.18.25581
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:Publisher
Value:
Pulse Secure, LLC
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services
Operation:writeName:URLInfoAbout
Value:
http://www.pulsesecure.net
(PID) Process:(2996) neoTermServSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pulse_Term_Services\Commands
Operation:writeName:RegisterOCX
Value:
"C:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\msrdp.ocx",DllRegisterServer
Executable files
28
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServDt.dllexecutable
MD5:51FF3F93D06324494D8BFFAAE4EB8936
SHA256:6571C142ADB76E3AD72B9C7F108AA0099CECF493A47ABD56697FBE115FEB3101
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_DE.dllexecutable
MD5:14EF04E874454EBAF9D8BCEF8201B49B
SHA256:790A4F20613A79E65FD59EB31EA82C87A7FCCDDBE6536E0FB68E3A3F46741C73
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_en.dllexecutable
MD5:022846F5FF77C8FC73D09896A2A8407F
SHA256:72A98F7DFA9D6E50223982B894F27BDD3FDA5CF3BEF1E6E69DDFDE22AC2F9A3B
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_ZH_CN.dllexecutable
MD5:E76CFCFB72B80BDC371DFC380ED9A842
SHA256:7180BDC8F732C5C20A70D24BEB00A185F8E5DAB2DB56459F8C99B4CD911DE704
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_JA.dllexecutable
MD5:F82B394805599B6AC4C98BBF5C1C300F
SHA256:5C35F0F9877254E578520955D7825677FBF8B39528E6FD4E2D30F3BAFBB1F1F6
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_KO.dllexecutable
MD5:FB098E1EB92DED169252493CBD312CD6
SHA256:A203BBC10BBA4F067B3AE19EC2861F1B506823DCF932E72F898ED5409E947E1C
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsTermServResource_ZH.dllexecutable
MD5:B613E8F226103095DA73ABA33A2CC08C
SHA256:52AA9316BEFD2B899FBC414B353AC060293B88643434E3A9356BD0A9DABC0463
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\libcrypto-1_1.dllexecutable
MD5:973932FDFD0E0B58870CB93CC9F35212
SHA256:DB9FD3C18EB5C47624EF1192AA1F29DF39E3FB039109865906E36D5AF712E300
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsOpenSSL.dllexecutable
MD5:FF5D08FAEC1579078A6670D0E85A2397
SHA256:06039470A2BB31C35844BD6C66006C04240B167AFD1A13F36A1A00905481D777
2996neoTermServSetup.exeC:\Users\admin\AppData\Roaming\Pulse Secure\Pulse Terminal Services Client\dsWinClient.dllexecutable
MD5:B6D96032A6BD8E5FC0407C17EEE76C2B
SHA256:E70CC980C5609BD9D102384840CE8B5C65CE525F8B60F5C5F2A10D05D381883D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
26
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6972
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6972
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6292
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
876
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
1176
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4536
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
login.live.com
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.72
  • 40.126.32.134
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.140
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info