| URL: | http://www.nwaha.org |
| Full analysis: | https://app.any.run/tasks/334f1f79-db0c-4bc7-bb1b-16a401ce55a8 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 24, 2019, 14:51:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 409F6045F538BD37AE2C8EA544C88FBD |
| SHA1: | BC7638F12CA49BDF98FF651C36237F61ADC49042 |
| SHA256: | 0618455A0A7E2803EF911E289C7CF20C1F054E5E32B6B792916D99128DE4204F |
| SSDEEP: | 3:N1KJS4m0Sn:Cc4mNn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 304 | cmd /C tasklist /FI "IMAGENAME eq REI_avira.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Windows\system32\cmd.exe | — | ns5DCA.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 344 | "C:\Users\admin\AppData\Local\Temp\nsx46C7.tmp\ns2974.tmp" "C:\Users\admin\AppData\Local\Temp\FF.bat" > C:\Users\admin\AppData\Local\Temp\FF.txt | C:\Users\admin\AppData\Local\Temp\nsx46C7.tmp\ns2974.tmp | — | ReimageRepair[1].exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 356 | C:\Windows\system32\wbem\unsecapp.exe -Embedding | C:\Windows\system32\wbem\unsecapp.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Sink to receive asynchronous callbacks for WMI client application Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 584 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\ReimageRepair[1].exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\ReimageRepair[1].exe | iexplore.exe | ||||||||||||
User: admin Company: Reimage Integrity Level: HIGH Description: Reimage Installer Exit code: 2 Version: 1.551 Modules
| |||||||||||||||
| 692 | cmd /C tasklist /FI "IMAGENAME eq avupdate.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Windows\system32\cmd.exe | — | ns49B2.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 868 | "C:\Users\admin\AppData\Local\Temp\nsx46C7.tmp\ns1D1D.tmp" cmd /C tasklist /FI "IMAGENAME eq HMA! Pro VPN.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Users\admin\AppData\Local\Temp\nsx46C7.tmp\ns1D1D.tmp | — | ReimageRepair[1].exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 992 | tasklist /FI "IMAGENAME eq UniProtectorPackage.exe" | C:\Windows\system32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1012 | cmd /C tasklist /FI "IMAGENAME eq Wireshark.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Windows\system32\cmd.exe | — | ns2B78.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1016 | "C:\Program Files\Reimage\Reimage Repair\REI_AVIRA.exe" "C:\rei\AV" | C:\Program Files\Reimage\Reimage Repair\REI_AVIRA.exe | — | Reimage.exe | |||||||||||
User: admin Company: Reimage Integrity Level: HIGH Description: Reimage Malware Scanner Exit code: 3 Version: 1.3.0.1 Modules
| |||||||||||||||
| 1160 | "C:\Users\admin\AppData\Local\Temp\nsg41F0.tmp\ns5DCA.tmp" cmd /C tasklist /FI "IMAGENAME eq REI_avira.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Users\admin\AppData\Local\Temp\nsg41F0.tmp\ns5DCA.tmp | — | ReimagePackage.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {6E519809-7E33-11E9-A09E-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 1 | |||
| (PID) Process: | (3336) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E3070500050018000E0033002600A002 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3336 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 3336 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UC4O0Z5S\nwaha_org[1].txt | — | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VRTJK86R\css[1].txt | text | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VRTJK86R\index[1].php | — | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UC4O0Z5S\nwame[1].php | text | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UC4O0Z5S\ie[1].css | text | |
MD5:98C8DE81FF554BDFAC4A35DA5FDAE3A9 | SHA256:AFAD11AF34D0A2F8B2627B752A644134FCB0D579BEC76695BEB07BA450A38EB2 | |||
| 3972 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VRTJK86R\desktop.ini | ini | |
MD5:4A3DEB274BB5F0212C2419D3D8D08612 | SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3972 | iexplore.exe | GET | 301 | 206.221.185.92:80 | http://www.nwaha.org/ | US | — | — | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/wp-content/themes/twentytwelve/nwame.php?mvt=-1 | US | text | 281 b | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/support/images/win-old.png | US | image | 694 b | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/support/fonts/segoeuid41d.eot? | US | eot | 504 Kb | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/support/style.css | US | text | 9.48 Kb | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/support/images/win.png | US | image | 4.14 Kb | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/support/index.php?kw=Windows | US | html | 15.6 Kb | unknown |
3972 | iexplore.exe | GET | 200 | 216.58.207.74:80 | http://fonts.googleapis.com/css?family=Open+Sans:400italic,700italic,400,700&subset=latin,latin-ext | US | text | 167 b | whitelisted |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/ | US | html | 23.1 Kb | unknown |
3972 | iexplore.exe | GET | 200 | 206.221.185.92:80 | http://nwaha.org/wp-includes/js/jquery/jquery.js?ver=1.11.2 | US | text | 93.7 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3972 | iexplore.exe | 206.221.185.92:80 | www.nwaha.org | Choopa, LLC | US | unknown |
3336 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3972 | iexplore.exe | 216.58.207.74:80 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3972 | iexplore.exe | 172.217.16.163:80 | fonts.gstatic.com | Google Inc. | US | whitelisted |
3972 | iexplore.exe | 104.20.2.47:80 | www.statcounter.com | Cloudflare Inc | US | shared |
3972 | iexplore.exe | 104.20.3.47:80 | www.statcounter.com | Cloudflare Inc | US | shared |
3972 | iexplore.exe | 161.47.7.14:80 | www.reimageplus.com | Rackspace Ltd. | US | malicious |
3972 | iexplore.exe | 205.185.208.80:80 | cdnrep.reimageplus.com | Highwinds Network Group, Inc. | US | suspicious |
584 | ReimageRepair[1].exe | 161.47.7.14:80 | www.reimageplus.com | Rackspace Ltd. | US | malicious |
584 | ReimageRepair[1].exe | 205.185.208.80:80 | cdnrep.reimageplus.com | Highwinds Network Group, Inc. | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
www.nwaha.org |
| unknown |
www.bing.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
www.statcounter.com |
| whitelisted |
c.statcounter.com |
| whitelisted |
nwaha.org |
| unknown |
www.reimageplus.com |
| suspicious |
cdnrep.reimageplus.com |
| suspicious |
cdnrep.reimage.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3972 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3972 | iexplore.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
584 | ReimageRepair[1].exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
584 | ReimageRepair[1].exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
584 | ReimageRepair[1].exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
584 | ReimageRepair[1].exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
584 | ReimageRepair[1].exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
584 | ReimageRepair[1].exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
584 | ReimageRepair[1].exe | A Network Trojan was detected | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers |
584 | ReimageRepair[1].exe | Misc activity | SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer |
Process | Message |
|---|---|
Reimage.exe | CFtpUpload::CFtpUpload() . |
Reimage.exe | \EXE1.8.9.1\20190524\4c1cf3aa-c9bb-43a9-81e0-8d999dc01d8a\USER-PC\1553\ |
Reimage.exe | CFtpUpload::CFtpUpload() . |