analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

obj2.bin

Full analysis: https://app.any.run/tasks/9e2b610b-6ffc-463d-aac3-73d3d7cc3df9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 22, 2019, 04:29:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
imminent
trojan
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

C5BB8094CDCF5F6318C7EF77ACC10EF5

SHA1:

68DA6A744911069FF041E996D41F058AB68C8C83

SHA256:

074B2D663A6B014B856995DA46381482C4367F5813706888384D07DF995225CB

SSDEEP:

6144:HFaFl1bu923YEdtjhY6GMEyf6DcMymo6zN7AQBQqe9NFug5aglOUWCUYBD:H6ldu923YEvsRYY1ymo6N7BFe/FuYagC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2520)
    • Detected Imminent RAT

      • obj2.bin.exe (PID: 2148)
    • Connects to CnC server

      • obj2.bin.exe (PID: 2148)
    • Application was dropped or rewritten from another process

      • 85641.exe (PID: 3584)
      • 85641.exe (PID: 2208)
      • SpoolColorLV.exe (PID: 2652)
      • SpoolColorLV.exe (PID: 1920)
      • SpoolColorLV.exe (PID: 3792)
      • SpoolColorLV.exe (PID: 516)
    • Downloads executable files from the Internet

      • obj2.bin.exe (PID: 2148)
    • Changes settings of System certificates

      • obj2.bin.exe (PID: 2148)
    • Changes the autorun value in the registry

      • 85641.exe (PID: 2208)
      • obj2.bin.exe (PID: 2148)
      • SpoolColorLV.exe (PID: 1920)
    • Loads the Task Scheduler COM API

      • 85641.exe (PID: 2208)
      • SpoolColorLV.exe (PID: 1920)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • obj2.bin.exe (PID: 396)
      • obj2.bin.exe (PID: 2148)
      • 85641.exe (PID: 2208)
    • Starts CMD.EXE for commands execution

      • obj2.bin.exe (PID: 396)
    • Starts itself from another location

      • obj2.bin.exe (PID: 396)
    • Creates files in the user directory

      • obj2.bin.exe (PID: 2148)
      • 85641.exe (PID: 2208)
      • SpoolColorLV.exe (PID: 1920)
    • Connects to unusual port

      • obj2.bin.exe (PID: 2148)
      • SpoolColorLV.exe (PID: 1920)
    • Adds / modifies Windows certificates

      • obj2.bin.exe (PID: 2148)
    • Application launched itself

      • 85641.exe (PID: 3584)
      • SpoolColorLV.exe (PID: 2652)
      • SpoolColorLV.exe (PID: 516)
    • Reads internet explorer settings

      • 85641.exe (PID: 2208)
      • SpoolColorLV.exe (PID: 1920)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:20 14:04:44+01:00
PEType: PE32
LinkerVersion: 8
CodeSize: 327680
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x51e1e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments:
FileDescription: dian.exe
FileVersion: 1.0.0.0
InternalName: dian.exe
LegalCopyright:
OriginalFileName: dian.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 20-Feb-2019 13:04:44
Comments: -
FileDescription: dian.exe
FileVersion: 1.0.0.0
InternalName: dian.exe
LegalCopyright: -
OriginalFilename: dian.exe
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 20-Feb-2019 13:04:44
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x0004FE24
0x00050000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.98981
.rsrc
0x00052000
0x000002C0
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.25676
.reloc
0x00054000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.16944
616
UNKNOWN
UNKNOWN
RT_VERSION

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
12
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start obj2.bin.exe #IMMINENT obj2.bin.exe cmd.exe no specs ping.exe no specs wmiapsrv.exe no specs 85641.exe no specs 85641.exe spoolcolorlv.exe no specs wmiapsrv.exe no specs spoolcolorlv.exe spoolcolorlv.exe no specs spoolcolorlv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396"C:\Users\admin\AppData\Local\Temp\obj2.bin.exe" C:\Users\admin\AppData\Local\Temp\obj2.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
dian.exe
Exit code:
0
Version:
1.0.0.0
2148"C:\Users\admin\AppData\Local\Temp\obj2.bin\obj2.bin.exe" C:\Users\admin\AppData\Local\Temp\obj2.bin\obj2.bin.exe
obj2.bin.exe
User:
admin
Integrity Level:
MEDIUM
Description:
dian.exe
Version:
1.0.0.0
2520"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\admin\AppData\Local\Temp\obj2.bin.exe"C:\Windows\System32\cmd.exeobj2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3960ping 1.1.1.1 -n 1 -w 1000 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1500C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3584"C:\Users\admin\AppData\Local\Temp\85641.exe" C:\Users\admin\AppData\Local\Temp\85641.exeobj2.bin.exe
User:
admin
Integrity Level:
MEDIUM
Description:
retries
Exit code:
0
Version:
1.0.0.0
2208"C:\Users\admin\AppData\Local\Temp\85641.exe"C:\Users\admin\AppData\Local\Temp\85641.exe
85641.exe
User:
admin
Integrity Level:
MEDIUM
Description:
retries
Exit code:
0
Version:
1.0.0.0
2652C:\Users\admin\AppData\Roaming\LocalOffice\SpoolColorLV.exe C:\Users\admin\AppData\Roaming\LocalOffice\SpoolColorLV.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
retries
Exit code:
0
Version:
1.0.0.0
660C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1920"C:\Users\admin\AppData\Roaming\LocalOffice\SpoolColorLV.exe"C:\Users\admin\AppData\Roaming\LocalOffice\SpoolColorLV.exe
SpoolColorLV.exe
User:
admin
Integrity Level:
MEDIUM
Description:
retries
Version:
1.0.0.0
Total events
1 424
Read events
1 047
Write events
374
Delete events
3

Modification events

(PID) Process:(396) obj2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(396) obj2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2148) obj2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:winstartedt
Value:
C:\Users\admin\AppData\Roaming\windlogomnt\wimdowslogt.exe
(PID) Process:Key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\PROVIDERS\Performance
Operation:writeName:Performance Refreshed
Value:
0
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2148) obj2.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obj2_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
4
Suspicious files
12
Text files
14
Unknown types
0

Dropped files

PID
Process
Filename
Type
220885641.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@yopmail[2].txt
MD5:
SHA256:
220885641.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\inbox[1].htm
MD5:
SHA256:
220885641.exeC:\Users\admin\AppData\Local\Temp\~DF5F72C56E345A19DF.TMP
MD5:
SHA256:
1920SpoolColorLV.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\inbox[1].htm
MD5:
SHA256:
396obj2.bin.exeC:\Users\admin\AppData\Local\Temp\obj2.bin\obj2.bin.exeexecutable
MD5:C5BB8094CDCF5F6318C7EF77ACC10EF5
SHA256:074B2D663A6B014B856995DA46381482C4367F5813706888384D07DF995225CB
2148obj2.bin.exeC:\Users\admin\AppData\Roaming\Imminent\Geo.datbinary
MD5:1B59011674270B56B0B3B121D8F8EB18
SHA256:EE0B46B5C8BF8A66AC5B4789E08E52A13B8E9653BDB17185E4F066A8D0D367B7
220885641.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\style[1].csstext
MD5:BDD362582929657A486B303CFE019B5D
SHA256:E2647D7592C55E8C9416645D3C70A27689380030CC230E49D79C6595B60F960A
2148obj2.bin.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\system.datbinary
MD5:67E229D08BEC3494AC69223B1F151EFA
SHA256:CB7B46CD71180C1AE1EF5ACF40B37214CBE9DC351235BA8228308D7267A7935A
2148obj2.bin.exeC:\Users\admin\AppData\Roaming\windlogomnt\wimdowslogt.exeexecutable
MD5:C5BB8094CDCF5F6318C7EF77ACC10EF5
SHA256:074B2D663A6B014B856995DA46381482C4367F5813706888384D07DF995225CB
220885641.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@yopmail[1].txttext
MD5:142DDC1EA06A67104644BB95EFA7F753
SHA256:3F13A6504EE10FD80933D75CAD5F787F9A80DD13CE6763904D5DE4134BBDE4D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
45
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2148
obj2.bin.exe
GET
200
198.187.29.21:80
http://eltiempocomco.com/pf.exe
US
executable
393 Kb
malicious
1920
SpoolColorLV.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/es/inbox.php?login=perfectfull&p=1&d=&ctrl=&scrl=&spam=true&yf=005&yp=IBQL0ZQN2ZGpjAwp5AQL2Zj&yj=KAQN1Amp0ZQt5ZmtjAmtjAwN&v=2.9&r_c=&id=
GB
html
1.87 Kb
shared
2208
85641.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/pic/inbox.png
GB
image
3.89 Kb
shared
1920
SpoolColorLV.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/2.9/style.css
GB
text
4.62 Kb
shared
2208
85641.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/2.9/style.css
GB
text
4.62 Kb
shared
1920
SpoolColorLV.exe
GET
304
87.98.250.141:80
http://www.yopmail.com/style/pic/inbox.png
GB
shared
2208
85641.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/es/inbox.php?login=perfectfull&p=1&d=&ctrl=&scrl=&spam=true&yf=005&yp=IBQL0ZQN2ZGpjAwp5AQL2Zj&yj=KAQN1Amp0ZQt5ZmtjAmtjAwN&v=2.9&r_c=&id=
GB
html
1.87 Kb
shared
2208
85641.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/r/collect?v=1&_v=j73&a=147521094&t=pageview&_s=1&dl=http%3A%2F%2Fwww.yopmail.com%2Fes%2Finbox.php%3Flogin%3Dperfectfull%26p%3D1%26d%3D%26ctrl%3D%26scrl%3D%26spam%3Dtrue%26yf%3D005%26yp%3DIBQL0ZQN2ZGpjAwp5AQL2Zj%26yj%3DKAQN1Amp0ZQt5ZmtjAmtjAwN%26v%3D2.9%26r_c%3D%26id%3D&ul=en-us&de=utf-8&dt=Caja%20de%20recepci%C3%B3n&sd=32-bit&sr=1280x720&vp=157x77&je=0&fl=26.0%20r0&_u=IEBAAE~&jid=443303762&gjid=2072143123&cid=582021757.1553229102&tid=UA-6167074-2&_gid=1406545422.1553229102&_r=1&z=702783124
US
image
35 b
whitelisted
2208
85641.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/analytics.js
US
text
17.1 Kb
whitelisted
1920
SpoolColorLV.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/r/collect?v=1&_v=j73&a=315906114&t=pageview&_s=1&dl=http%3A%2F%2Fwww.yopmail.com%2Fes%2Finbox.php%3Flogin%3Dperfectfull%26p%3D1%26d%3D%26ctrl%3D%26scrl%3D%26spam%3Dtrue%26yf%3D005%26yp%3DIBQL0ZQN2ZGpjAwp5AQL2Zj%26yj%3DKAQN1Amp0ZQt5ZmtjAmtjAwN%26v%3D2.9%26r_c%3D%26id%3D&ul=en-us&de=utf-8&dt=Caja%20de%20recepci%C3%B3n&sd=32-bit&sr=1280x720&vp=157x77&je=0&fl=26.0%20r0&_u=AACAAE~&jid=1253926987&gjid=1774934352&cid=582021757.1553229102&tid=UA-6167074-2&_gid=1406545422.1553229102&_r=1&z=818397874
US
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2148
obj2.bin.exe
45.55.57.244:443
www.iptrackeronline.com
Digital Ocean, Inc.
US
malicious
2148
obj2.bin.exe
128.90.108.187:1060
medicosco.publicvm.com
Powerhouse Management, Inc.
CO
malicious
2148
obj2.bin.exe
198.187.29.21:80
eltiempocomco.com
Namecheap, Inc.
US
malicious
2208
85641.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
2208
85641.exe
172.217.18.14:80
www.google-analytics.com
Google Inc.
US
whitelisted
1920
SpoolColorLV.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
1920
SpoolColorLV.exe
172.217.18.14:80
www.google-analytics.com
Google Inc.
US
whitelisted
1920
SpoolColorLV.exe
128.90.112.179:4444
confe.linkpc.net
Powerhouse Management, Inc.
PA
unknown

DNS requests

Domain
IP
Reputation
medicosco.publicvm.com
  • 128.90.108.187
malicious
www.iptrackeronline.com
  • 45.55.57.244
shared
eltiempocomco.com
  • 198.187.29.21
malicious
www.yopmail.com
  • 87.98.250.141
shared
www.google-analytics.com
  • 172.217.18.14
whitelisted
confe.linkpc.net
  • 128.90.112.179
malicious

Threats

PID
Process
Class
Message
2148
obj2.bin.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
2148
obj2.bin.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
2148
obj2.bin.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2148
obj2.bin.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3 ETPRO signatures available at the full report
No debug info