File name:

Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan

Full analysis: https://app.any.run/tasks/32ad70e0-8529-45bd-ae77-730432d2e1ff
Verdict: Malicious activity
Analysis date: January 22, 2025, 19:40:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

AC120137D7317DB137C91EA11AD3AF90

SHA1:

CD82C2DAEB59F1DDCB88513D73FCB7EFF1239749

SHA256:

F88DF0EBE5E2935450897750DC727D3A711D4829F0085D52CBAA3C62106C8511

SSDEEP:

98304:F3gYMReFcnGeg0ELiO2Vidq+yy9nn6WZuKv+aArH/JQv7VYWuJ66M7GC2OeiokmY:lTc1u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
      • HostChecker.exe (PID: 6508)
    • Executable content was dropped or overwritten

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
      • HostChecker.exe (PID: 6508)
    • Starts CMD.EXE for commands execution

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
    • Executing commands from a ".bat" file

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
    • The executable file from the user directory is run by the CMD process

      • pskill.exe (PID: 3952)
      • pskill.exe (PID: 5872)
      • pskill.exe (PID: 3732)
      • pskill.exe (PID: 1448)
      • pskill.exe (PID: 5920)
      • pskill.exe (PID: 3612)
      • pskill.exe (PID: 3364)
      • pskill.exe (PID: 6136)
      • pskill.exe (PID: 5340)
      • pskill.exe (PID: 1944)
      • pskill.exe (PID: 1228)
      • CCleaner.exe (PID: 5720)
      • devcon.exe (PID: 6344)
      • devcon.exe (PID: 6412)
      • devcon.exe (PID: 6364)
      • HostChecker.exe (PID: 6508)
    • Starts a Microsoft application from unusual location

      • devcon.exe (PID: 6344)
      • devcon.exe (PID: 6364)
      • devcon.exe (PID: 6412)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5488)
    • The process creates files with name similar to system file names

      • HostChecker.exe (PID: 6508)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • HostChecker.exe (PID: 6508)
    • Creates a software uninstall entry

      • HostChecker.exe (PID: 6508)
    • The process drops C-runtime libraries

      • HostChecker.exe (PID: 6508)
  • INFO

    • Create files in a temporary directory

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
      • HostChecker.exe (PID: 6508)
    • Checks supported languages

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
      • pskill.exe (PID: 3952)
      • pskill.exe (PID: 5872)
      • pskill.exe (PID: 3732)
      • pskill.exe (PID: 1448)
      • pskill.exe (PID: 5920)
      • pskill.exe (PID: 3612)
      • pskill.exe (PID: 6136)
      • pskill.exe (PID: 3364)
      • pskill.exe (PID: 5340)
      • pskill.exe (PID: 1944)
      • pskill.exe (PID: 1228)
      • devcon.exe (PID: 6412)
      • HostChecker.exe (PID: 6508)
    • The sample compiled with english language support

      • Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe (PID: 1760)
      • HostChecker.exe (PID: 6508)
    • Reads the computer name

      • pskill.exe (PID: 3952)
      • pskill.exe (PID: 5872)
      • pskill.exe (PID: 3732)
      • pskill.exe (PID: 1448)
      • pskill.exe (PID: 3612)
      • pskill.exe (PID: 5340)
      • pskill.exe (PID: 3364)
      • pskill.exe (PID: 6136)
      • pskill.exe (PID: 1944)
      • pskill.exe (PID: 1228)
      • pskill.exe (PID: 5920)
      • HostChecker.exe (PID: 6508)
    • The process uses the downloaded file

      • cmd.exe (PID: 5488)
    • Creates files or folders in the user directory

      • HostChecker.exe (PID: 6508)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:08 13:12:00+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 3260416
InitializedDataSize: 372736
UninitializedDataSize: 2670592
EntryPoint: 0x5a7750
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
25
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wacatac.b!ml' in file 'junipernfix.exe' during a scheduled scan.exe conhost.exe no specs cmd.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs pskill.exe no specs ccleaner.exe no specs pcaui.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe devcon.exe no specs devcon.exe no specs devcon.exe conhost.exe no specs hostchecker.exe junipersetupclientocx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228pskill.exe -t dsAccessService.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
1412"C:\WINDOWS\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {22bfeed6-cb41-4fe3-9e7b-fab443ef9e19} -a "CCleaner" -v "Piriform Ltd" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 2 -f 2021048 -k 0 -e "C:\Users\admin\AppData\Local\Temp\6A65.tmp\CCleaner.exe"C:\Windows\System32\pcaui.exeCCleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Program Compatibility Assistant User Interface
Version:
10.0.19041.3636 (WinBuild.160101.0800)
1448pskill.exe -t JuniperSetupClient.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
1760"C:\Users\admin\AppData\Local\Temp\Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe" C:\Users\admin\AppData\Local\Temp\Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\wacatac.b!ml' in file 'junipernfix.exe' during a scheduled scan.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
1944pskill.exe -t dsHostChecker.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
3364pskill.exe -t dsNcService.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
3612pskill.exe -t dsHostChecker.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
3688\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3732pskill.exe -t dsNcService.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
3952pskill.exe -t iexplore.exe -accepteulaC:\Users\admin\AppData\Local\Temp\6A65.tmp\pskill.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Terminates processes on local or remote systems
Exit code:
4294967295
Version:
1.13
Modules
Images
c:\users\admin\appdata\local\temp\6a65.tmp\pskill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
810
Read events
786
Write events
24
Delete events
0

Modification events

(PID) Process:(3952) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(3732) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(3612) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(6136) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(1944) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(5872) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(1448) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(5920) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(3364) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(5340) pskill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsKill
Operation:writeName:EulaAccepted
Value:
1
Executable files
39
Suspicious files
1
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
1760Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exeC:\Users\admin\AppData\Local\Temp\6A65.tmp\ccleaner.initext
MD5:4273B31895EE6A12038A6B8B62932A6D
SHA256:A8ABC524BD2435538EBE81E187FDAF15934ECB9C5502487E0730320AA9799ED4
1760Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exeC:\Users\admin\AppData\Local\Temp\6A65.tmp\devcon.exeexecutable
MD5:C4B470269324517EE838789C7CF5E606
SHA256:5F9B898315AD8192E87E21A499FD87D31B886513BB39D368476174AAA89A2BF9
6508HostChecker.exeC:\Users\admin\AppData\Roaming\Juniper Networks\Host Checker\dsWinClientResource_ES.dllexecutable
MD5:4BCEBF4F3F97FA172F15E166B9D487C4
SHA256:DC3BAE94D8DDD9DE63E167B73938784EB2C0A2151302291825A8FA2E472A7BCD
1760Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exeC:\Users\admin\AppData\Local\Temp\6A65.tmp\CCleaner.exeexecutable
MD5:EF51CE8AC2E356EA6D8ED609259F17F6
SHA256:20B8982DFD3A0A26318C51B7CBDEA903301CB0A860076A2C4BC87CD96D281AB1
1760Wacatac.B!ml' in file 'junipernfix.exe' during a scheduled scan.exeC:\Users\admin\AppData\Local\Temp\6A65.tmp\junipernuke.regtext
MD5:B3124A27261D17022B8448961EA40E5C
SHA256:81446E7A3510E33C54A06BAD99DEA9A4213D42D60B7EC2962C7F4A0B673D6551
6508HostChecker.exeC:\Users\admin\AppData\Local\Temp\nss7709.tmp\System.dllexecutable
MD5:D6A1DC60C505105DC5D3812694B06539
SHA256:F5E7A6981A1CDBE0B8E451088EA89012FCABDC1D0DF3F7C65A54CF73A62AE462
6508HostChecker.exeC:\Users\admin\AppData\Roaming\Juniper Networks\Host Checker\dsWinClientResource_DE.dllexecutable
MD5:82048D12E59C31A6CA9ECA26691021ED
SHA256:7E707673F002B081C25DEDE6A734E723ED0E62B2F6446A121A3D750D26CAC2A2
6508HostChecker.exeC:\Users\admin\AppData\Roaming\Juniper Networks\Host Checker\dsWinClientResource_FR.dllexecutable
MD5:39556EEEF68E4319FA861DCE9A37512A
SHA256:93D018E45BAB2AB336C547F1EA639A2EEACC18432EF6E98937F6B53F27D1F7B1
6508HostChecker.exeC:\Users\admin\AppData\Roaming\Juniper Networks\Host Checker\dsWinClientResource_EN.dllexecutable
MD5:A878377E2F591ACC3C51A9DD8F0E2B58
SHA256:6F02C6038F12297550042FB3FEBF2A45D3EA36759059055D6F8EE26E45E29B4A
6508HostChecker.exeC:\Users\admin\AppData\Roaming\Juniper Networks\Host Checker\dsWinClient.dllexecutable
MD5:C7AAAD2608903FD9F9CD08E3F31970DD
SHA256:A3DE427F632254B7F63803A93FD76ED79F9489B18C09E9F98AF577EF1A31EE8D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
116
DNS requests
133
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.21.65.154:443
www.bing.com
Akamai International B.V.
NL
whitelisted
5564
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
  • 2.21.65.154
  • 2.21.65.132
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.4
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
bzib.nelreports.net
  • 2.22.242.11
  • 2.22.242.105
whitelisted

Threats

No threats detected
Process
Message
regedit.exe
REGEDIT: CreateFile failed, GetLastError() = 2