File name:

Install.exe

Full analysis: https://app.any.run/tasks/d56a9797-3ad2-43d4-8eef-2adb6593bbc4
Verdict: Malicious activity
Analysis date: October 04, 2022, 20:38:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

E2462DFF81E09C335DD89F711C7A2FBA

SHA1:

5B9BADC4D85F1CE4912772507523AB062A730D4E

SHA256:

FCD60B5BD3815F1C591ADA33B9A46D4126C216DC32CC7B946352A938844138BD

SSDEEP:

6144:qG1wX8iQS7SP8FRguKgHMQj6WAcZ0te0nhhX/AgdvotX9VRZefVu4F2O971Nd:qgwtFK4Fj/MNhl/d8X9VRZetu40QpNd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • Install.exe (PID: 3792)
    • Runs injected code in another process

      • powershell.EXE (PID: 2588)
    • Application was injected by another process

      • dllhost.exe (PID: 2400)
  • SUSPICIOUS

    • Checks supported languages

      • Install.exe (PID: 3792)
      • powershell.EXE (PID: 2588)
      • dllhost.exe (PID: 2400)
    • Reads the computer name

      • Install.exe (PID: 3792)
      • powershell.EXE (PID: 2588)
      • dllhost.exe (PID: 2400)
    • Executes PowerShell scripts

      • powershell.EXE (PID: 2588)
    • Reads the date of Windows installation

      • powershell.EXE (PID: 2588)
    • Executed via Task Scheduler

      • powershell.EXE (PID: 2588)
    • Creates files in the Windows directory

      • powershell.EXE (PID: 2588)
    • Removes files from Windows directory

      • powershell.EXE (PID: 2588)
  • INFO

    • Checks Windows Trust Settings

      • powershell.EXE (PID: 2588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-Sep-01 17:30:37
Detected languages:
  • English - United States

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 272

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 5
TimeDateStamp: 2022-Sep-01 17:30:37
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
56201
56320
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.57153
.rdata
61440
31340
31744
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.64676
.data
94208
4988
2560
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.27832
.rsrc
102400
263552
263680
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.96442
.reloc
368640
4208
4608
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.25754

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.14944
1741
UNKNOWN
English - United States
RT_MANIFEST
101
7.96765
261632
UNKNOWN
English - United States
EXE

Imports

ADVAPI32.dll
KERNEL32.dll
OLEAUT32.dll
SHLWAPI.dll
ole32.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject install.exe powershell.exe no specs dllhost.exe install.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2400C:\Windows\System32\dllhost.exe /Processid:{b3e962c9-5e9f-40b2-869c-6026d2a7e5b2}C:\Windows\System32\dllhost.exe
winlogon.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2588C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('$77stager')).EntryPoint.Invoke($Null,$Null)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEtaskeng.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3684"C:\Users\admin\AppData\Local\Temp\Install.exe" C:\Users\admin\AppData\Local\Temp\Install.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
3792"C:\Users\admin\AppData\Local\Temp\Install.exe" C:\Users\admin\AppData\Local\Temp\Install.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
788
Read events
787
Write events
1
Delete events
0

Modification events

(PID) Process:(2400) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\$77config\pid
Operation:writeName:svc32
Value:
2400
Executable files
0
Suspicious files
2
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
2588powershell.EXEC:\Windows\TEMP\syq2aqmc.khz.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2588powershell.EXEC:\Windows\TEMP\dll1j0gw.sbt.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
2588powershell.EXEC:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivedbf
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info