File name:

redteam-05.png

Full analysis: https://app.any.run/tasks/e0c9d52d-c184-4733-a1bc-32f0ac44a656
Verdict: Malicious activity
Analysis date: December 21, 2024, 10:18:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: image/png
File info: PNG image data, 3751 x 1526, 8-bit/color RGBA, non-interlaced
MD5:

6B14BE18B519C06E9510F0104B825F0A

SHA1:

AC60967EEF5EC26F7505E65154C19E47ED4B196C

SHA256:

F7002D71CF0C76FF7D0BBC88D23CCB8BF2E36535DE57A68B234D99636B44C993

SSDEEP:

12288:2xc2x9NIO0aU5zVWpFdeXQpblFNkzmSh6BUov:2xc2x9NIO0aU5zVQMXmlXkz7haUq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3620)
    • Checks Windows Trust Settings

      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Reads security settings of Internet Explorer

      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Reads the date of Windows installation

      • x64dbg.exe (PID: 3820)
    • Application launched itself

      • x64dbg.exe (PID: 3820)
    • There is functionality for taking screenshot (YARA)

      • x64dbg.exe (PID: 6236)
  • INFO

    • Reads the machine GUID from the registry

      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Manual execution by a user

      • WinRAR.exe (PID: 3620)
      • x64dbg.exe (PID: 3820)
    • Reads the computer name

      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3620)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 3620)
      • x64dbg.exe (PID: 3820)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 3620)
    • Reads the software policy settings

      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Checks supported languages

      • 2f2dc7ea3bfe40f226357e703448bf25ecb19a206a5ecc3e1767bc7f93947c6b.exe (PID: 6764)
      • x64dbg.exe (PID: 3820)
      • x64dbg.exe (PID: 6236)
    • Process checks computer location settings

      • x64dbg.exe (PID: 3820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.png | Portable Network Graphics (100)

EXIF

PNG

ImageWidth: 3751
ImageHeight: 1526
BitDepth: 8
ColorType: RGB with Alpha
Compression: Deflate/Inflate
Filter: Adaptive
Interlace: Noninterlaced
PixelsPerUnitX: 11811
PixelsPerUnitY: 11811
PixelUnits: meters

Composite

ImageSize: 3751x1526
Megapixels: 5.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe rundll32.exe no specs x64dbg.exe no specs x64dbg.exe 2f2dc7ea3bfe40f226357e703448bf25ecb19a206a5ecc3e1767bc7f93947c6b.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3260C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3620"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\snapshot_2024-12-16_22-16.zip" C:\Users\admin\Desktop\snapshot_2024-12-16_22-16\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3820"C:\Users\admin\Desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exe" C:\Users\admin\Desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
x64dbg
Exit code:
0
Version:
0.0.2.5
Modules
Images
c:\users\admin\desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
6068"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\AppData\Local\Temp\redteam-05.pngC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6236"C:\Users\admin\Desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exe" "" "" ""C:\Users\admin\Desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exe
x64dbg.exe
User:
admin
Integrity Level:
HIGH
Description:
x64dbg
Version:
0.0.2.5
Modules
Images
c:\users\admin\desktop\snapshot_2024-12-16_22-16\release\x64\x64dbg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
6764"C:\Users\admin\Desktop\2f2dc7ea3bfe40f226357e703448bf25ecb19a206a5ecc3e1767bc7f93947c6b.exe"C:\Users\admin\Desktop\2f2dc7ea3bfe40f226357e703448bf25ecb19a206a5ecc3e1767bc7f93947c6b.exex64dbg.exe
User:
admin
Company:
ShinoSec Inc.
Integrity Level:
HIGH
Description:
ShinoLocker
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\2f2dc7ea3bfe40f226357e703448bf25ecb19a206a5ecc3e1767bc7f93947c6b.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
Total events
11 211
Read events
11 077
Write events
127
Delete events
7

Modification events

(PID) Process:(6068) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Photo Viewer\Viewer
Operation:writeName:MainWndPos
Value:
6000000033000000A00400007502000000000000
(PID) Process:(3620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6236) x64dbg.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(6236) x64dbg.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
04000000110000000E0000000300000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(6236) x64dbg.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4
Operation:writeName:MRUListEx
Value:
010000000000000004000000050000000200000003000000FFFFFFFF
(PID) Process:(6236) x64dbg.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\1
Operation:writeName:3
Value:
7C00310000000000955965521000534E415053487E310000640009000400EFBE95596552955965522E000000F96300000000230000000000000000000000000000009C3BF30073006E0061007000730068006F0074005F0032003000320034002D00310032002D00310036005F00320032002D0031003600000018000000
(PID) Process:(6236) x64dbg.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\1\3
Operation:delete valueName:MRUList
Value:
Executable files
87
Suspicious files
61
Text files
85
Unknown types
8

Dropped files

PID
Process
Filename
Type
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\dbghelp\dbghelp_x64.aobj
MD5:9160B8815D608B3F516FF17969B34EED
SHA256:6ADCE5F9FB3F63BF4398F308F9B256B0DEF1B5805DDA8121C849A3C41DD8F542
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\DeviceNameResolver\DeviceNameResolver_x86.libobj
MD5:B3607D5CEEC0DE333DF480FF62F6FA14
SHA256:07069AD1E7F49ABAFF113E3247B17CBBC28BDC4751CFCA60FF117AE9FE989C38
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\DeviceNameResolver\DeviceNameResolver_x86.abinary
MD5:9F96D26D4B3A89CF8EBEB697E4DCA7EF
SHA256:C2900BE9839FD12CCBD08BBD8F4D23FD674C132726FECF7D6680619DFC30A24C
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\bridgegraph.htext
MD5:95E63959AE4DC547059310D0907C167B
SHA256:1366A84F21DCBCACDF3E767E889E1F875F03713F4374CDE7D8CFE6C25DA10A69
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\bridgemain.htext
MD5:764DE6582E2C8D713AD87B7B115503AB
SHA256:97A9EF20468CF5D7124FD29595B843E5AB4E13401F8A8455C15EA1AD071B293E
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\dbghelp\dbghelp_x86.abinary
MD5:F17A963312286F4A03EDDFAA452FA35E
SHA256:E84D5344A816A3323515FBEA1A5613359CEFE616DEA29AE135FADBCFD8209AF1
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\dbghelp\dbghelp.htext
MD5:0B507925699ECCED4ADA1EF8061D7DB7
SHA256:4E556135CC506E2A30D78C24FD2934A832A7C663F6D2BA5A76F16DA9E86E0B85
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\DeviceNameResolver\DeviceNameResolver_x64.libbinary
MD5:E890174F91B95D02E4C831118780DB9D
SHA256:ADFAF3DE1B9A775D5D765F64EF016D3AB92D414C66C2505830EE92F804A55965
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\bridgelist.htext
MD5:76B286ABCE8611B5D03721CA4FB893DF
SHA256:6D8BC206E406FC6981A1D7D92E1BB5EA6E2DF09A3F060A42330093745DEA4571
3620WinRAR.exeC:\Users\admin\Desktop\snapshot_2024-12-16_22-16\pluginsdk\dbghelp\dbghelp_x86.libbinary
MD5:67FA0383BF8271D42F914C7C1EE322E2
SHA256:7654D6830FD537946ABC9F5F63E41C002D8CDFB12345279CE18B0FFFC5031AE9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5780
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6152
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5780
svchost.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7052
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7052
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5780
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5780
svchost.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.21.110.139:443
www.bing.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.38.73.129
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.21.110.139
  • 2.21.110.146
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.72
  • 20.190.160.20
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.68
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info