File name:

SusPal Zero_p_.exe

Full analysis: https://app.any.run/tasks/eab0a765-66b2-4b3e-8d74-1ea07802d7dc
Verdict: Malicious activity
Analysis date: September 21, 2024, 10:13:44
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
themida
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

0A248E00D9F3999B03C8353EC80AB8E9

SHA1:

E3A5B0A07CF077BDFFC44FE0C29B8EF32D832126

SHA256:

FE04F4BF0E57120148E49B67E1860F329F3CE5AADE47F05E7C8A1D64E1816DCA

SSDEEP:

98304:zIgjrxmE50lnfo3JeiuIM6+QvCfG9DrrtvElctsFOfy69v5vH1XG6EYTcwtEXvjw:HOtIocRFrZ5i3DuQRI2k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • SusPal Zero_p_.exe (PID: 1076)
    • Executable content was dropped or overwritten

      • SusPal Zero_p_.exe (PID: 1076)
    • Checks for external IP

      • SusPal Zero_p_.exe (PID: 1076)
  • INFO

    • Checks supported languages

      • SusPal Zero_p_.exe (PID: 1076)
    • Create files in a temporary directory

      • SusPal Zero_p_.exe (PID: 1076)
    • Reads the computer name

      • SusPal Zero_p_.exe (PID: 1076)
    • Themida protector has been detected

      • SusPal Zero_p_.exe (PID: 1076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:28 21:23:21+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 4628992
InitializedDataSize: 178688
UninitializedDataSize: -
EntryPoint: 0x46c07e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT suspal zero_p_.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1076"C:\Users\admin\AppData\Local\Temp\SusPal Zero_p_.exe" C:\Users\admin\AppData\Local\Temp\SusPal Zero_p_.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SusPal
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\suspal zero_p_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3784"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5656C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6856C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSusPal Zero_p_.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 854
Read events
4 840
Write events
14
Delete events
0

Modification events

(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1076) SusPal Zero_p_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SusPal Zero_p__RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
1076SusPal Zero_p_.exeC:\Users\admin\AppData\Local\Temp\license.paltext
MD5:C16A5320FA475530D9583C34FD356EF5
SHA256:EB1E33E8A81B697B75855AF6BFCDBCBF7CBBDE9F94962CEAEC1ED8AF21F5A50F
1076SusPal Zero_p_.exeC:\Users\admin\AppData\Local\Temp\TmpF066.tmptext
MD5:2F68114F45582A6C441A1C8FC6CB3353
SHA256:62D6770820E3AE4D9ECDBEB44B4F5F98D7313D3A7F702A7B2700953DC68C5CCF
1076SusPal Zero_p_.exeC:\Users\admin\AppData\Local\Temp\TmpF0A5.tmptext
MD5:2F68114F45582A6C441A1C8FC6CB3353
SHA256:62D6770820E3AE4D9ECDBEB44B4F5F98D7313D3A7F702A7B2700953DC68C5CCF
1076SusPal Zero_p_.exeC:\Users\admin\AppData\Local\Temp\evbB233.tmpexecutable
MD5:C40AE7A442636EEA2C869669C8D819AF
SHA256:541CE6ACBA5C23906C51894F9550235EAF885F96A590FD7943B7DD68DFB73F68
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
28
DNS requests
17
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5172
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6204
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
5172
svchost.exe
20.72.205.209:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4200
RUXIMICS.exe
20.72.205.209:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2120
MoUsoCoreWorker.exe
20.72.205.209:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
20.189.173.23:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
5172
svchost.exe
52.167.249.196:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5172
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1076
SusPal Zero_p_.exe
104.26.12.205:443
api.ipify.org
CLOUDFLARENET
US
shared

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.72.205.209
  • 52.167.249.196
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.78
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 184.30.21.171
whitelisted
api.ipify.org
  • 104.26.12.205
  • 104.26.13.205
  • 172.67.74.152
shared
login.live.com
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
browser.pipe.aria.microsoft.com
  • 20.42.72.131
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
1076
SusPal Zero_p_.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
No debug info