File name:

GB.exe

Full analysis: https://app.any.run/tasks/15e16048-b697-4462-8146-799b09fcb087
Verdict: Malicious activity
Analysis date: April 29, 2025, 18:32:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

C8C2AF0EFA1C9510AE9BFDF5B25D1098

SHA1:

1F111E3CC203DB4FE51179881662F71BA2A88103

SHA256:

FEA7E7A1230FD2D57848E9148D876E9A0C42C0DE1E5E5EE198A80CC8A6996FD3

SSDEEP:

98304:EaeKX+VtcE2zDRrSe1UfTepMk/80vMck+rhIC79IcktIf9Ds8phCGLNy6ukMJdzM:UYvkDZK7Y6jzPmr/cz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • reg.exe (PID: 1052)
      • reg.exe (PID: 5892)
      • reg.exe (PID: 5720)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 1188)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1188)
    • Uses TASKKILL.EXE to kill antiviruses

      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 7728)
      • cmd.exe (PID: 6028)
      • cmd.exe (PID: 7240)
      • cmd.exe (PID: 8184)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • xcopy.exe (PID: 7036)
      • cmd.exe (PID: 1188)
    • Reads security settings of Internet Explorer

      • GB.exe (PID: 2340)
    • The process executes VB scripts

      • GB.exe (PID: 2340)
      • cmd.exe (PID: 1188)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 1764)
      • wscript.exe (PID: 1324)
      • Microsoft0leSystemmcas.exe (PID: 6040)
      • Winlog0nUser.exe (PID: 2320)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 1764)
      • wscript.exe (PID: 1324)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 1188)
      • cmd.exe (PID: 4488)
    • Process drops legitimate windows executable

      • Rar.exe (PID: 5332)
      • cmd.exe (PID: 1188)
    • Process copies executable file

      • cmd.exe (PID: 1188)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 900)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1188)
    • Uses WMIC.EXE to obtain information about the network interface controller

      • cmd.exe (PID: 1052)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1324)
      • wscript.exe (PID: 1764)
    • Connects to unusual port

      • Winlog0nUser.exe (PID: 2320)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1188)
    • There is functionality for taking screenshot (YARA)

      • Winlog0nUser.exe (PID: 2320)
  • INFO

    • The sample compiled with english language support

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • cmd.exe (PID: 1188)
      • xcopy.exe (PID: 7036)
    • Checks supported languages

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • Winlog0nUser.exe (PID: 2320)
      • Microsoft0leSystemmcas.exe (PID: 6040)
      • zl.exe (PID: 4944)
      • SndCab.exe (PID: 5504)
    • Reads the computer name

      • GB.exe (PID: 2340)
      • SndCab.exe (PID: 5504)
      • Winlog0nUser.exe (PID: 2320)
    • Process checks computer location settings

      • GB.exe (PID: 2340)
    • Reads the machine GUID from the registry

      • Rar.exe (PID: 5332)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 5552)
    • Creates a new folder

      • cmd.exe (PID: 2096)
      • cmd.exe (PID: 904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:27 20:03:27+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 190976
InitializedDataSize: 326656
UninitializedDataSize: -
EntryPoint: 0x1d759
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
195
Monitored processes
64
Malicious processes
3
Suspicious processes
12

Behavior graph

Click at the process to see the details
start gb.exe wscript.exe no specs cmd.exe conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs rar.exe xcopy.exe xcopy.exe no specs regsvr32.exe no specs schtasks.exe no specs sppextcomobj.exe no specs slui.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe reg.exe reg.exe winlog0nuser.exe microsoft0lesystemmcas.exe no specs zl.exe no specs sndcab.exe no specs attrib.exe no specs cmd.exe no specs attrib.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs gb.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
812"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
900regsvr32 /s C:\WINDOWS\Syswow64\mswinsck.ocxC:\Windows\SysWOW64\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
904cmd /c mkdir "tmp\tmp"C:\Windows\SysWOW64\cmd.exeWinlog0nUser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1052reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v MicrosoftUptadeTool /d "cmd /c cd C:\Intel\Drv & start C:\Intel\Drv\Microsoft0leSystemmcas.exe"C:\Windows\SysWOW64\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
1052cmd /c wmic NIC LIST BRIEF > "C:\Intel\Drv\tmp\tmp\tmp7055.tmp"C:\Windows\SysWOW64\cmd.exeWinlog0nUser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1188C:\WINDOWS\system32\cmd.exe /c ""C:\TEMP\new.bat" "C:\Windows\SysWOW64\cmd.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1324taskkill /im Winlog0nuser.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1324"C:\WINDOWS\System32\WScript.exe" "C:\TEMP\close.vbs" C:\Windows\SysWOW64\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
1660taskkill /im MsMpEngCPo.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 673
Read events
4 659
Write events
11
Delete events
3

Modification events

(PID) Process:(2340) GB.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:c%%TEMP%
Value:
c:\TEMP\
(PID) Process:(2340) GB.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}
Operation:delete keyName:(default)
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}
Operation:delete keyName:(default)
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
Operation:delete valueName:ThreadingModel
Value:
(PID) Process:(1052) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftUptadeTool
Value:
cmd /c cd C:\Intel\Drv & start C:\Intel\Drv\Microsoft0leSystemmcas.exe
(PID) Process:(1188) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
10
Suspicious files
37
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2340GB.exeC:\TEMP\inst.rar
MD5:
SHA256:
5332Rar.exeC:\Intel\Drv\spss.dat
MD5:
SHA256:
2340GB.exeC:\TEMP\new.battext
MD5:EB3087AAEF467212D33700F21579449D
SHA256:3D0A35B375F2BD0A52D410FAF82ADC5691C9C2B310D42C18A1F824E2C0B997F1
5332Rar.exeC:\Intel\Drv\head.datbinary
MD5:07B635E5550C4423E42778F2A14F19C7
SHA256:8E63D115F2059990B24170BB78FBAA67342103C3F53DC9BCF4F93C7BAFA1DEDB
5332Rar.exeC:\Intel\Drv\Microsoft0leSystemmcas.exeexecutable
MD5:BFB88023C7303225BE332C4BE640E65F
SHA256:2056AA655B4ED125B7637F1BBC6C9CAC0D5144A4467728E3DC0F0A7B86162258
5332Rar.exeC:\Intel\Drv\zl.exeexecutable
MD5:359617BBB8FDF2A68267B8A59C1D11C2
SHA256:BD59C93080E9BE5D458DC2423292203C46289DA8F130C7E9B81AE36D2F2C5935
5332Rar.exeC:\Intel\Drv\LOCAL.txttext
MD5:99A29DC8105FD2FA39D8CDC04733938D
SHA256:9AED541153E3F39CC0B4CFD1D2B1B1D2C99F660742055147505E7E8F5EF08070
5332Rar.exeC:\Intel\Drv\SndCab.exeexecutable
MD5:7B9F06FEA8973689D73058A0AD4A92D7
SHA256:47E1BB2B398FC4DAD29DA690F3F8EDD640A1E90A842F661F7771B2C01C7954D3
5332Rar.exeC:\Intel\Drv\ccfg.datbinary
MD5:F524D4D0060F02ECE91795524482309A
SHA256:7709A6B21808723090A1582523D92B0FA282C35B78D7CC5B453183F9A8C84862
4200xcopy.exeC:\TEMP\Cabs\sndcab.dattext
MD5:11337948F1C939DECA9C8168622822FA
SHA256:440B045C3C078A5E031B13F1A38867F48308FF535B7282CADE6AA57D837EA427
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
24
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.22.98.7:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
5496
MoUsoCoreWorker.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
4
System
192.168.100.255:138
whitelisted
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 172.217.168.206
whitelisted
crl.microsoft.com
  • 2.18.121.139
whitelisted
www.microsoft.com
  • 23.200.189.225
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 2.22.98.7
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
aaba919bhttps.clouddns.ph
  • 45.79.222.138
unknown

Threats

No threats detected
No debug info