analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

edu.exe

Full analysis: https://app.any.run/tasks/e78ce229-2ae7-43ee-8ff2-63323415ab08
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 14, 2018, 10:59:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gozi
ursnif
evasion
dreambot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

61B52DB4E99A40C3666FCFA60A3C1F69

SHA1:

E97D93381B8D67CFF950FC66152C686840BB2A71

SHA256:

0207C06879FB4A2DDAFFECC3A6713F2605CBDD90FC238DA9845E88FF6AEF3F85

SSDEEP:

12288:hb72Sc8KqjNBb+6O8sOQC2CSPxVaeZ6apx7asUj4ZD+qmfko6v2KtYMGJ:hbaANBbbO8svsizB6KZVZaqgkNe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • explorer.exe (PID: 116)
    • Runs injected code in another process

      • edu.exe (PID: 2980)
    • Detected URSNIF Trojan

      • edu.exe (PID: 2980)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 116)
    • URSNIF Shellcode was detected

      • explorer.exe (PID: 116)
    • Connects to CnC server

      • explorer.exe (PID: 116)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • edu.exe (PID: 2980)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 116)
    • Creates files in the user directory

      • edu.exe (PID: 2980)
    • Checks for external IP

      • nslookup.exe (PID: 2288)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (56.1)
.scr | Windows screen saver (26.6)
.exe | Win32 Executable (generic) (9.1)
.exe | Generic Win/DOS Executable (4)
.exe | DOS Executable Generic (4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:12 14:25:14+01:00
PEType: PE32
LinkerVersion: 9
CodeSize: 206336
InitializedDataSize: 431616
UninitializedDataSize: -
EntryPoint: 0x18358
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 4.2.8.2
ProductVersionNumber: 4.2.8.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Ecological Located Run
FileVersion: 4.2.8.2
LegalCopyright: Copyright (c) 2006-2014 Dropbox
LegalTrademarks: Copyright (c) 2006-2014 Dropbox
Languages: English
Comments: Ecological Located Run
PrivateBuild: 4.2.8.2
OriginalFileName: Goal
InternalName: Goal
ProductName: Goal
CompanyName: Dropbox
ProductVersion: 4.2.8.2

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 12-Dec-2018 13:25:14
Detected languages:
  • English - United States
FileDescription: Ecological Located Run
FileVersion: 4.2.8.2
LegalCopyright: Copyright (c) 2006-2014 Dropbox
LegalTrademarks: Copyright (c) 2006-2014 Dropbox
Languages: English
Comments: Ecological Located Run
PrivateBuild: 4.2.8.2
OriginalFilename: Goal
InternalName: Goal
ProductName: Goal
CompanyName: Dropbox
ProductVersion: 4.2.8.2

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 12-Dec-2018 13:25:14
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00032443
0x00032600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.63803
.rdata
0x00034000
0x0000F596
0x0000F600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.05634
.data
0x00044000
0x00006204
0x00002800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.00989
.rsrc
0x0004B000
0x000577F0
0x00057800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.66161

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.98153
502
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.1035
1128
Latin 1 / Western European
English - United States
RT_ICON
3
2.11443
9640
Latin 1 / Western European
English - United States
RT_ICON
4
2.7534
4264
Latin 1 / Western European
English - United States
RT_ICON
5
1.99909
10344
Latin 1 / Western European
English - United States
RT_ICON
6
2.35781
16936
Latin 1 / Western European
English - United States
RT_ICON
101
2.80883
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
191
7.99822
108064
Latin 1 / Western European
English - United States
WAVE
231
7.99442
36441
Latin 1 / Western European
English - United States
WAVE
348
3.30965
408
Latin 1 / Western European
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
AUTHZ.dll
COMCTL32.dll
COMDLG32.dll
CRYPT32.dll
GDI32.dll
KERNEL32.dll
MPR.dll
NETAPI32.dll
OLEACC.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
inject start #URSNIF edu.exe #URSNIF explorer.exe cmd.exe no specs nslookup.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2980"C:\Users\admin\AppData\Local\Temp\edu.exe" C:\Users\admin\AppData\Local\Temp\edu.exe
explorer.exe
User:
admin
Company:
Dropbox
Integrity Level:
MEDIUM
Description:
Ecological Located Run
Exit code:
0
Version:
4.2.8.2
116C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3876cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\admin\AppData\Local\Temp\7D30.bi1"C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2288nslookup myip.opendns.com resolver1.opendns.com C:\Windows\system32\nslookup.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
nslookup
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3124cmd /C "echo -------- >> C:\Users\admin\AppData\Local\Temp\7D30.bi1"C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
68
Read events
41
Write events
27
Delete events
0

Modification events

(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:Client
Value:
521403001C800000BCA451664B95D761A6CDC887DDC78EA900000000000000000000000000000000
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:bderplua
Value:
C:\Users\admin\AppData\Roaming\Microsoft\Devivmgr\crypptsp.exe
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:{1B42BE8A-BE10-0581-A07F-D209D423264D}
Value:
0C6073339C93D401
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:EnableSPDY3_0
Value:
0
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:{48B27AF1-07B1-BABA-D1FC-2B8E95F08FA2}
Value:
0CC83795A493D401
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:Client
Value:
521403003C800000BCA451664B95D761A6CDC887DDC78EA900000000000000000000000000000000
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\IAM
Operation:writeName:Server ID
Value:
2
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:Client
Value:
521403003C800100BCA451664B95D761A6CDC887DDC78EA900000000000000000000000000000000
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB\Files
Operation:writeName:5C1056F26B346A450E
Value:
D44BFD74F60120013C4981764E0538059C45917DCE1758121C68D1514E7F58641CD4D1F04F8F59001E64D37C48EF5FC81644DBDC5F4F4AA82704EDDC184F01A8F20468DC6C4F3DA826067CDD544B15ABC60DBCD25252
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\89726C36-545A-A301-A6CD-C8873A517CAB
Operation:writeName:Client
Value:
521403003C800200BCA451664B95D761A6CDC887DDC78EA900000000000000000000000000000000
Executable files
1
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3876cmd.exeC:\Users\admin\AppData\Local\Temp\7D30.bi1
MD5:
SHA256:
3124cmd.exeC:\Users\admin\AppData\Local\Temp\7D30.bi1
MD5:
SHA256:
116explorer.exeC:\Users\admin\AppData\Local\Temp\5DF3.bin
MD5:
SHA256:
2980edu.exeC:\Users\admin\AppData\Roaming\Microsoft\Devivmgr\crypptsp.exeexecutable
MD5:61B52DB4E99A40C3666FCFA60A3C1F69
SHA256:0207C06879FB4A2DDAFFECC3A6713F2605CBDD90FC238DA9845E88FF6AEF3F85
116explorer.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:C418ECAEE3A7731442380893E3675D07
SHA256:AB862BFD4952BE4D0ADA13400166D10E72BA1C72E8793D0A35BA1F8A3A009E12
116explorer.exeC:\Users\admin\AppData\Local\Temp\739C.bincompressed
MD5:CF1F1A7AD2792AE0666A0E6DB95F25A2
SHA256:1F34CF1323FC9D30377C2C3F403B967B0C75E9DF166F8BF17FEF483713420A2C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
19
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
116
explorer.exe
GET
185.82.216.62:80
http://185.82.216.62/images/1.png
BG
malicious
116
explorer.exe
GET
404
58.158.177.102:80
http://losssuwhichhaveimplied.online/images/5ybEjBEX2knEzKQd/jTucv_2ByaAD9km/qXY55LNKOYJNuAkKc_/2BtznrwpX/WlsDZsjSahNoUk6aaOC_/2Be41CrVL92a6Rmefmn/t8AnB5EWwRLCCLte7zhunD/ki5u2nuGI_2Fi/NTu2YZ6U/FIdQr1_2FnLvxPNqTN_2BjU/DD7oI_2FTm/UZuEIuPCcmaHJJuQW/A7A7vlXhZS/_2BM3w2P.gif
JP
html
430 b
malicious
116
explorer.exe
GET
404
185.246.153.199:80
http://grantingcopyrighttheca.online/images/_2BH77Ly0bOl_2FafJ/kDzs4jmrN/5XGne1XJCyRNoENdib4s/HSDgh3zExJo_2BJjbqM/WtzNLrHfo0b5zoBnjLQ62e/mh6YfMQxuMEfl/jDfrxc6t/GZJEdKoghN9vjb5utsqptkR/pqqBZT_2Fa/F5HaUXPAfC_2F30IU/RmifKMII9bN_/2B2jb1Rw2vn/e5srIqwsuzXii8e2/wTGYeV.gif
unknown
malicious
116
explorer.exe
GET
58.158.177.102:80
http://aanyyouderivative.online/images/Kciz0XIgkAfmRC7L2/NpKsPk73Qsmv/waQL42ft4wY/mrVKxE6j6J3McV/lAR9tZ9xK1J9Cx29LuBP_/2Fnn1LOCsOTO1qaW/YJAmPYfYUDS0NNV/OJ_2FDYvdAqH6qjZ25/wPf6c4fM4/V_2B10dQGlu91HQO9qXk/5ek6G36kfKBoVDXWWuq/oCtGDlTtJB_2FNfBo_2BOd/_2B7LWuDI/r.jpeg
JP
malicious
116
explorer.exe
GET
404
58.158.177.102:80
http://aanyyouderivative.online/images/DlFi55AKT1gbFZR8/jDRfGEEaZPO_2Fs/MnIsj5IYY27fj7hdpn/m5VhGMcJZ/Gke80S8j2adYiY4UR7LP/9jUUkYPfRzsaJ8sImWy/Jva3KRgP1AjR8rstlXzipt/IHCE9q0_2FzP7/zHFNBsuA/mQXeQtXC_2BXqwpGrmuDEkr/wwt_2BOeyp/a48GcGoEcxJNAdJ5g/DMVT1koB/DF.jpeg
JP
html
423 b
malicious
116
explorer.exe
GET
404
58.158.177.102:80
http://attachfiftythtowndamages.online/images/7d7aqtqJ_2BZ_2FJri/Wx0LGgeOg/n2dHGki40BTcgLf232Gi/lWlgBdwguu2pxVIYvcR/YAVN3ODybgLfGZCLQPfbGO/cwLb2K2A3k_2F/IgRVvuWq/234WP9S2_2B99H3moZMlx3L/rya5gMo_2F/q_2FVtK4KrJ6ri5UO/bNo9F5eKrEWB/RmVQzyJOenH/ZbpUVURhem5G/8ZQDgz4jd/L.jpeg
JP
html
428 b
malicious
116
explorer.exe
GET
404
58.158.177.102:80
http://yformfilefromsubma.online/images/4_2FVQlAJU/f_2BnzJ9lVkvFD2gh/8b1plzH4moFA/O_2FPKQnEth/jbsJ91_2FoYD68/zGUXNArKb3xjQRFy5Bwkh/orqM_2BT8osn9swd/090pYHJA8w9dzie/V2gTZN7QYk4HjLNReP/3wllLzAn9/5GAe5jx7OwcDMHoCZR7F/KRZAXiqPJi9QMK9JCTr/w1NY6Mw5pv/MlvWWKVAX/q.gif
JP
html
425 b
malicious
116
explorer.exe
POST
404
58.158.177.102:80
http://attachfiftythtowndamages.online/images/oGjm7mxUDixltih/9EptqIeeBfotOdS1nl/JdHDZbVy2/H59mMt7ZkI71hwgF_2Fe/1k1fJb1o_2Brv5DgL5Y/hVZOxoGlwCbqAl3rOqTOF_/2FVbm7ALMZirL/7rpCb_2B/05_2Bg_2BBvlW_2BbM5n3No/jg_2F_2FTg/ChyUdgnNnnca_2FV7/qHsdeLmshe1d/UYM8STtk_2F/RfsOn84BKYm9UP/MBMdPoKWwYaAafPU4gBCl/sKd1.bmp
JP
html
460 b
malicious
116
explorer.exe
GET
502
185.246.153.199:80
http://grantingcopyrighttheca.online/images/ZdMzUhEAhiQ_2/FNdZmumO/jnkBDTIKEnImH6KFfLX3Foq/7isoVVXZWU/0It_2F2_2F4MPdfo_/2Fw8gbhK6MIe/LhI4f_2FUpW/V_2FV02lBcBzR0/rqMz6qPM1DsGu9aynnDJw/j3_2BXNBJUNw3zp9/tQSjTcrwSaj0Oue/366KgwOkG4KAIUOYuP/iVi41oaGG/IgHN29bb0/dHsRzvmZy/a.jpeg
unknown
html
568 b
malicious
116
explorer.exe
POST
404
58.158.177.102:80
http://losssuwhichhaveimplied.online/images/jNpGmZqYvxVrC/XXvAc52t/O1GcpPPdAA1QxV5iZ570Uw5/Lnb2FAPjnJ/KXd5OLCK7lIoHZyVW/SPMosoKi54WK/Ol4_2BD6PmD/cgn_2BrfvNscsr/GnfzX44jRT_2BBoA84JzJ/FthFN1Dpddv9UNs9/0qUnf_2FOSLIIJ7/uELXri4Z2SAhtYo7pm/NhSsxeNt5/dh9xARqZ5oskjTRduUQs/alS42OomKxN/pCdt.bmp
JP
html
446 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
116
explorer.exe
185.82.216.62:80
ITL Company
BG
malicious
116
explorer.exe
95.216.24.32:80
www.apache.org
Hetzner Online GmbH
DE
unknown
2288
nslookup.exe
208.67.222.222:53
resolver1.opendns.com
OpenDNS, LLC
US
malicious
116
explorer.exe
185.246.153.199:80
grantingcopyrighttheca.online
malicious
116
explorer.exe
58.158.177.102:80
losssuwhichhaveimplied.online
UCOM Corp.
JP
malicious

DNS requests

Domain
IP
Reputation
www.apache.org
  • 95.216.24.32
  • 40.79.78.1
whitelisted
resolver1.opendns.com
  • 208.67.222.222
shared
myip.opendns.com
  • 185.217.117.28
shared
grantingcopyrighttheca.online
  • 185.246.153.199
  • 193.187.173.37
  • 62.173.138.139
  • 92.63.96.245
malicious
losssuwhichhaveimplied.online
  • 58.158.177.102
malicious
attachfiftythtowndamages.online
  • 58.158.177.102
malicious
aanyyouderivative.online
  • 58.158.177.102
malicious
yformfilefromsubma.online
  • 58.158.177.102
malicious

Threats

PID
Process
Class
Message
2288
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
2288
nslookup.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (myip.opendns .com in DNS lookup)
116
explorer.exe
A Network Trojan was detected
SC SPYWARE Spyware Ursnif Win32
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP
116
explorer.exe
A Network Trojan was detected
ET TROJAN Ursnif Variant CnC Beacon
116
explorer.exe
A Network Trojan was detected
SC SPYWARE Spyware Ursnif Win32
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP GET Check-in
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] W32.Dreambot HTTP
116
explorer.exe
A Network Trojan was detected
ET TROJAN Ursnif Variant CnC Data Exfil
29 ETPRO signatures available at the full report
No debug info