File name:

Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222

Full analysis: https://app.any.run/tasks/c6c7a2f6-4ef6-4ac4-aa2e-485c4734e921
Verdict: Malicious activity
Analysis date: May 02, 2024, 12:25:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1AC7D6AB2647B09963852458B5C8D222

SHA1:

93E23C203B35CFDB7E7BA16787CED993AAF281A6

SHA256:

F764F7D6642E5CCDC3C27479CE533464586E9DD219E1C67B5523382CF2F6CC63

SSDEEP:

24576:OYlxNAzzQuDp2Vv03Ux7O47owr+WJjso:OYlxNAzzQuDp2Vv03Ux7O47owr+WBso

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
    • Reads the Internet Settings

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
    • Reads security settings of Internet Explorer

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
    • Application launched itself

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
  • INFO

    • Checks supported languages

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
      • Win64.exe (PID: 4000)
    • Reads the machine GUID from the registry

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
    • Create files in a temporary directory

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
    • Reads the computer name

      • Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe (PID: 3972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:29 21:48:27+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 438272
InitializedDataSize: 28672
UninitializedDataSize: -
EntryPoint: 0x1448
OSVersion: 4
ImageVersion: 2.4
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.4.0.2
ProductVersionNumber: 2.4.0.2
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: UNI
FileDescription: UNI
LegalCopyright: UNI
LegalTrademarks: UNI
ProductName: UNI
FileVersion: 2.04.0002
ProductVersion: 2.04.0002
InternalName: Mellemmadens6
OriginalFileName: Mellemmadens6.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start trojan.win32.khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe win64.exe no specs trojan.win32.khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3972"C:\Users\admin\AppData\Local\Temp\Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe" C:\Users\admin\AppData\Local\Temp\Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe
explorer.exe
User:
admin
Company:
UNI
Integrity Level:
MEDIUM
Description:
UNI
Exit code:
0
Version:
2.04.0002
Modules
Images
c:\users\admin\appdata\local\temp\trojan.win32.khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
4000"C:\Users\admin\AppData\Local\Temp\Win64.exe" C:\Users\admin\AppData\Local\Temp\Win64.exeTrojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe
User:
admin
Company:
UNI
Integrity Level:
MEDIUM
Description:
UNI
Version:
8.03.0003
Modules
Images
c:\users\admin\appdata\local\temp\win64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
4008"C:\Users\admin\AppData\Local\Temp\Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe" C:\Users\admin\AppData\Local\Temp\Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeTrojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe
User:
admin
Company:
UNI
Integrity Level:
MEDIUM
Description:
UNI
Exit code:
0
Version:
2.04.0002
Modules
Images
c:\users\admin\appdata\local\temp\trojan.win32.khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
Total events
2 453
Read events
2 445
Write events
8
Delete events
0

Modification events

(PID) Process:(3972) Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3972) Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3972) Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3972) Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
1
Suspicious files
0
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3972Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeC:\Users\admin\AppData\Local\Temp\~DF38F34555F76D78B7.TMPbinary
MD5:FAF0590588EC08C0760DB3FA85B28965
SHA256:FA686C3050F1B5B47C79B4DAC2E8F1ABA23B9F9C0AF9C56D288D0FD6A267B802
3972Trojan.Win32.Khalesi.bpu.1ac7d6ab2647b09963852458b5c8d222.exeC:\Users\admin\AppData\Local\Temp\Win64.exeexecutable
MD5:9543D4BE6A07270FE1BEDF2EF602F1BA
SHA256:93AA08D5D308C03950AD72A9B87C4E8DE1C1537147DDB0E06ED96E54A39141E4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info