File name:

Flexer.exe

Full analysis: https://app.any.run/tasks/b722667e-0934-4806-9932-a71004da11f7
Verdict: Malicious activity
Analysis date: November 26, 2024, 13:28:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

FC4CD4BE96C610321FFD4702AF38995A

SHA1:

5B108A03642AB855D3CF541F540BD5AE147155A6

SHA256:

FDDBF31C5C1996B42B50C381EA5F284F85D8F69C89C18AA8E2514F7B1FAD8F8B

SSDEEP:

98304:3c8oaYNAg/Yk981g1HUsYkV2R5LYZEHrDz3JhZEfvJGqSPgVNlm2d4ApzGWFR5sK:5gvt7qGXDbfK5HYfF5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Flexer.exe (PID: 6624)
    • The process drops C-runtime libraries

      • Flexer.exe (PID: 6624)
    • Process drops python dynamic module

      • Flexer.exe (PID: 6624)
    • Process drops legitimate windows executable

      • Flexer.exe (PID: 6624)
  • INFO

    • Checks supported languages

      • Flexer.exe (PID: 6624)
    • Create files in a temporary directory

      • Flexer.exe (PID: 6624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:26 06:51:00+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 131072
InitializedDataSize: 11226112
UninitializedDataSize: -
EntryPoint: 0xc88c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start flexer.exe conhost.exe no specs loader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6624"C:\Users\admin\AppData\Local\Temp\Flexer.exe" C:\Users\admin\AppData\Local\Temp\Flexer.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\flexer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
6632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFlexer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6992C:\Users\admin\AppData\Local\Temp\Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\Loader.exeFlexer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\onefile_6624_133771013366053043\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\temp\onefile_6624_133771013366053043\python313.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\bcrypt.dll
Total events
646
Read events
646
Write events
0
Delete events
0

Modification events

No data
Executable files
30
Suspicious files
2
Text files
923
Unknown types
0

Dropped files

PID
Process
Filename
Type
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_ctypes.pydexecutable
MD5:A55E57D7594303C89B5F7A1D1D6F2B67
SHA256:F63C6C7E71C342084D8F1A108786CA6975A52CEFEF8BE32CC2589E6E2FE060C8
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_queue.pydexecutable
MD5:1C03CAA59B5E4A7FB9B998D8C1DA165A
SHA256:B9CF502DADCB124F693BF69ECD7077971E37174104DBDA563022D74961A67E1E
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\Loader.exeexecutable
MD5:4B482ADEA16A69F93E6F562B32D041B0
SHA256:8CF9B87D20DBF123AC018C30D66F02D0082469B964A6458A13BDD2FB35F60FAC
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\libssl-3.dllexecutable
MD5:4FF168AAA6A1D68E7957175C8513F3A2
SHA256:2E4D35B681A172D3298CAF7DC670451BE7A8BA27C26446EFC67470742497A950
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\libffi-8.dllexecutable
MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
SHA256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\libcrypto-3.dllexecutable
MD5:123AD0908C76CCBA4789C084F7A6B8D0
SHA256:4E5D5D20D6D31E72AB341C81E97B89E514326C4C861B48638243BDF0918CFA43
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_lzma.pydexecutable
MD5:1BA022D42024A655CF289544AE461FB8
SHA256:D080EABD015A3569813A220FD4EA74DFF34ED2A8519A10473EB37E22B1118A06
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_decimal.pydexecutable
MD5:F3377F3DE29579140E2BBAEEFD334D4F
SHA256:B715D1C18E9A9C1531F21C02003B4C6726742D1A2441A1893BC3D79D7BB50E91
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_socket.pydexecutable
MD5:FE896371430BD9551717EF12A3E7E818
SHA256:35246B04C6C7001CA448554246445A845CE116814A29B18B617EA38752E4659B
6624Flexer.exeC:\Users\admin\AppData\Local\Temp\onefile_6624_133771013366053043\_wmi.pydexecutable
MD5:1C30CC7DF3BD168D883E93C593890B43
SHA256:6435C679A3A3FF4F16708EBC43F7CA62456C110AC1EA94F617D8052C90C143C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
33
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1468
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1468
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6748
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6748
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5720
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1468
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1468
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2.23.209.177:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.106
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 2.16.253.202
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 2.23.209.177
  • 2.23.209.174
  • 2.23.209.166
  • 2.23.209.173
  • 2.23.209.167
  • 2.23.209.176
  • 2.23.209.171
  • 2.23.209.162
  • 2.23.209.168
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.136
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.74
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info