| File name: | kolzuw.exe |
| Full analysis: | https://app.any.run/tasks/af12c526-28b8-4e1b-9037-e9644e843f27 |
| Verdict: | Malicious activity |
| Analysis date: | March 08, 2024, 23:34:38 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | 121EDB3CB4A3279144DD1264861476A7 |
| SHA1: | CB3908BC75F8E7218986B32F9C8A5C0BDE6B8479 |
| SHA256: | 0533DF987B6362D916CDEA059189A5ED2A50005A3E58B2C90F23ADB96E95C78F |
| SSDEEP: | 24576:bBu2wbomtK71NIyNMDMk3N2ydWg83QKVM/UcG6QIDLsVj7aIqYXb1JGQqnapj:bBu2wbomtK71NIyNMDMONbWg83QKVM/S |
| .exe | | | UPX compressed Win32 Executable (39.3) |
|---|---|---|
| .exe | | | Win32 EXE Yoda's Crypter (38.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (9.5) |
| .exe | | | Win32 Executable (generic) (6.5) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:04:16 07:47:33+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 270336 |
| InitializedDataSize: | 139264 |
| UninitializedDataSize: | 589824 |
| EntryPoint: | 0xd2bb0 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 99.8.1.0 |
| ProductVersionNumber: | 3.3.6.1 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | English (Canadian) |
| CharacterSet: | Unicode |
| FileVersion: | 99.8.1.0 |
| Comments: | V!!H|?=~ |
| FileDescription: | >JC&2`EuD |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3304 | "C:\Windows\System32\csrcs.exe" | C:\Windows\System32\csrcs.exe | kolzuw.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: >JC&2`EuD Exit code: 0 Version: 99.8.1.0 Modules
| |||||||||||||||
| 3848 | "C:\Users\admin\AppData\Local\Temp\kolzuw.exe" | C:\Users\admin\AppData\Local\Temp\kolzuw.exe | kolzuw.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: >JC&2`EuD Exit code: 0 Version: 99.8.1.0 Modules
| |||||||||||||||
| 4052 | "C:\Users\admin\AppData\Local\Temp\kolzuw.exe" | C:\Users\admin\AppData\Local\Temp\kolzuw.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: >JC&2`EuD Exit code: 0 Version: 99.8.1.0 Modules
| |||||||||||||||
| (PID) Process: | (4052) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (4052) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (4052) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (4052) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DRM\amty |
| Operation: | write | Name: | ilop |
Value: 1 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3848) kolzuw.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices |
| Operation: | write | Name: | csrcs |
Value: C:\Windows\system32\csrcs.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3304 | csrcs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\n09230945[1].asp | text | |
MD5:FDA44910DEB1A460BE4AC5D56D61D837 | SHA256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9 | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:A84BC421CCD19A439195B827302A0263 | SHA256:5BBEF2C70E435FEA85E0B4DA174BA6105BBDD570D5AC52E6C57DF7BA2797F3AF | |||
| 3848 | kolzuw.exe | C:\Users\admin\AppData\Local\Temp\autFADA.tmp | binary | |
MD5:7B360F41FDFB3FA1A5AD5B0E01E6F4E8 | SHA256:39F47B76628BC4145FAA008EA7DF2041D29F5F153A356D0F57BD95F541EA4A52 | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\Local\Temp\autFCDE.tmp | binary | |
MD5:7B360F41FDFB3FA1A5AD5B0E01E6F4E8 | SHA256:39F47B76628BC4145FAA008EA7DF2041D29F5F153A356D0F57BD95F541EA4A52 | |||
| 3848 | kolzuw.exe | C:\Users\admin\AppData\Local\Temp\qcdsqgf | text | |
MD5:601CDDDB0A74C01EB944F02303EDDF1F | SHA256:06047CD43AB69252CC49B725AD01C5E555CD2487D42ACA18CD685BB5835AC46E | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\Local\Temp\xitydin | text | |
MD5:601CDDDB0A74C01EB944F02303EDDF1F | SHA256:06047CD43AB69252CC49B725AD01C5E555CD2487D42ACA18CD685BB5835AC46E | |||
| 3304 | csrcs.exe | C:\Windows\System32\autorun.in | binary | |
MD5:779820088F831A7670FD58488C4EAA9C | SHA256:CFFC03F9C6A92199A603D08CFC8B53049CB1DA4D78493402C00550C8DD690B98 | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\n09230945[1].asp | text | |
MD5:FDA44910DEB1A460BE4AC5D56D61D837 | SHA256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9 | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:4F2411AAF429FB50BCC0D84B9C87B9F7 | SHA256:9592E3A843D7EE2B2D9B3E3BC56EF79D1A5BF86164623981514B17E71FAB074C | |||
| 3304 | csrcs.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:E4A5F71B2292269BFE8094A324EEC59E | SHA256:4696BA8E50605F19FFA4ECDC8FB94ABEAEFA6B028FF4793BAC32FF4FA3B72F67 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3304 | csrcs.exe | GET | 304 | 23.216.154.130:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fd81cbc265c122d4 | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 301 | 172.67.189.152:80 | http://www.whatismyip.com/automation/n09230945.asp | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | unknown | binary | 1.47 Kb | unknown |
3304 | csrcs.exe | GET | 301 | 172.67.189.152:80 | http://www.whatismyip.com/automation/n09230945.asp | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 301 | 172.67.189.152:80 | http://www.whatismyip.com/automation/n09230945.asp | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 200 | 34.174.61.199:82 | http://www.5eb149c0.com:82/xny.htm | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 200 | 132.226.247.73:80 | http://checkip.dyndns.org/?rnd1=51737.0029023385&rnd2=49768.2278596915 | unknown | html | 107 b | unknown |
3304 | csrcs.exe | GET | 200 | 34.174.61.199:80 | http://www.5eb149c0.com/xny.htm | unknown | — | — | unknown |
3304 | csrcs.exe | GET | 200 | 185.53.177.51:80 | http://kasy.myhome.cx/kny.htm | unknown | html | 7.00 Kb | unknown |
1080 | svchost.exe | GET | 200 | 23.216.154.130:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c503292d7802e201 | unknown | compressed | 67.5 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3304 | csrcs.exe | 172.67.189.152:80 | www.whatismyip.com | CLOUDFLARENET | US | unknown |
3304 | csrcs.exe | 172.67.189.152:443 | www.whatismyip.com | CLOUDFLARENET | US | unknown |
3304 | csrcs.exe | 23.216.154.130:80 | ctldl.windowsupdate.com | Akamai International B.V. | IE | unknown |
3304 | csrcs.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
3304 | csrcs.exe | 132.226.247.73:80 | checkip.dyndns.org | ORACLE-BMC-31898 | BR | unknown |
3304 | csrcs.exe | 34.174.61.199:82 | www.5eb149c0.com | GOOGLE-CLOUD-PLATFORM | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.whatismyip.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
checkip.dyndns.org |
| shared |
www.5eb149c0.com |
| malicious |
suse.extasix.com |
| unknown |
kasy.myhome.cx |
| malicious |
www.5eb149c0.com.cn |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check whatismyip.com Automation Page |
3304 | csrcs.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check Domain (whatismyip in HTTP Host) |
3304 | csrcs.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check whatismyip.com Automation Page |
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check Domain (whatismyip in HTTP Host) |
3304 | csrcs.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check whatismyip.com Automation Page |
3304 | csrcs.exe | Attempted Information Leak | ET POLICY IP Check Domain (whatismyip in HTTP Host) |
1080 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |