File name: | 最新非法滞留境外劝返名单.exe |
Full analysis: | https://app.any.run/tasks/f6c03a0a-199b-467d-a7fa-3ff79883af13 |
Verdict: | Malicious activity |
Analysis date: | October 05, 2022, 05:04:00 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | EDF09F0C5DD060C50671F60C0FFABC23 |
SHA1: | 7A46A9AB6C3729498CE18E3E033A4D9CA9170EFA |
SHA256: | 09AB5D260BDE3B863B7705EC40C210B0E91BD49C10B04D6DD753EEF35C0B5782 |
SSDEEP: | 24576:f4nXubIQGyxbPV0db26gL3Jl99iXH5TK9SRKpWu07TXu/icZTEwLbDKKl33C/9lG:fqe3f6ofiXH5TBiYfXyXo8PVUHlum0 |
.exe | | | Inno Setup installer (65.1) |
---|---|---|
.exe | | | Win32 EXE PECompact compressed (generic) (24.6) |
.dll | | | Win32 Dynamic Link Library (generic) (3.9) |
.exe | | | Win32 Executable (generic) (2.6) |
.exe | | | Win16/32 Executable Delphi generic (1.2) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2020-Sep-13 09:00:51 |
Detected languages: |
|
Comments: | This installation was built with Inno Setup. |
CompanyName: | https://www.a464ne6ae4b6a4.cc/ |
FileDescription: | a464ne6ae4b6a4 Setup |
FileVersion: | - |
LegalCopyright: | a464ne6ae4b6a4 |
OriginalFileName: | - |
ProductName: | a464ne6ae4b6a4 |
ProductVersion: | a464ne6ae4b6a4 |
e_magic: | MZ |
---|---|
e_cblp: | 80 |
e_cp: | 2 |
e_crlc: | - |
e_cparhdr: | 4 |
e_minalloc: | 15 |
e_maxalloc: | 65535 |
e_ss: | - |
e_sp: | 184 |
e_csum: | - |
e_ip: | - |
e_cs: | - |
e_ovno: | 26 |
e_oemid: | - |
e_oeminfo: | - |
e_lfanew: | 256 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 10 |
TimeDateStamp: | 2020-Sep-13 09:00:51 |
PointerToSymbolTable: | - |
NumberOfSymbols: | - |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 4096 | 734748 | 735232 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.35606 |
.itext | 741376 | 5768 | 6144 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.97275 |
.data | 749568 | 14244 | 14336 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.0444 |
.bss | 765952 | 28136 | 0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.idata | 794624 | 3894 | 4096 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.8987 |
.didata | 798720 | 420 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.75636 |
.edata | 802816 | 154 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.87222 |
.tls | 806912 | 24 | 0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rdata | 811008 | 93 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.38389 |
.rsrc | 815104 | 30088 | 30208 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.41996 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.6421 | 16936 | Latin 1 / Western European | English - United States | RT_ICON |
4086 | 3.16547 | 864 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4087 | 3.40938 | 608 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4088 | 3.31153 | 1116 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4089 | 3.33977 | 1036 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4090 | 3.36723 | 724 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4091 | 3.33978 | 184 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4092 | 3.15425 | 156 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4093 | 3.31895 | 884 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4094 | 3.28786 | 920 | Latin 1 / Western European | UNKNOWN | RT_STRING |
advapi32.dll |
comctl32.dll |
kernel32.dll |
kernel32.dll (delay-loaded) |
netapi32.dll |
oleaut32.dll |
user32.dll |
version.dll |
Title | Ordinal | Address |
---|---|---|
dbkFCallWrapperAddr | 1 | 779836 |
__dbk_fcall_wrapper | 2 | 53408 |
TMethodImplementationIntercept | 3 | 344160 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3472 | "C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exe" | C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exe | — | Explorer.EXE |
User: admin Company: https://www.a464ne6ae4b6a4.cc/ Integrity Level: MEDIUM Description: a464ne6ae4b6a4 Setup Exit code: 1 Version: | ||||
2516 | "C:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmp" /SL5="$301AA,1347026,792576,C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exe" | C:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmp | — | 最新非法滞留境外劝返名单.exe |
User: admin Company: https://www.a464ne6ae4b6a4.cc/ Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 | ||||
3936 | "C:\Windows\System32\cmd.exe" /c ""C:\Users\admin\Desktop\UnRAR.exe" x "C:\Users\Public\Documents\NGLA\bin.rar" "C:\Users\Public\Documents\NGLA\" -inul -y -o+ -pqwe123" | C:\Windows\System32\cmd.exe | — | 最新非法滞留境外劝返名单.tmp |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2336 | "C:\Users\admin\Desktop\UnRAR.exe" x "C:\Users\Public\Documents\NGLA\bin.rar" "C:\Users\Public\Documents\NGLA\" -inul -y -o+ -pqwe123 | C:\Users\admin\Desktop\UnRAR.exe | — | cmd.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: Command line RAR Exit code: 0 Version: 6.2.0 | ||||
3368 | "C:\Users\Public\Documents\NGLA\FF_chrome.exe" | C:\Users\Public\Documents\NGLA\FF_chrome.exe | 最新非法滞留境外劝返名单.tmp | |
User: admin Integrity Level: MEDIUM Description: 46m6n4btaw Version: 1, 0, 0, 1 | ||||
3528 | "C:\Users\Public\Documents\NGLA\NNN_chrome.exe" | C:\Users\Public\Documents\NGLA\NNN_chrome.exe | — | 最新非法滞留境外劝返名单.tmp |
User: admin Integrity Level: MEDIUM | ||||
1980 | "C:\Windows\System32\taskkill.exe" /f /IM 最新非法滞留境外劝返名单.exe | C:\Windows\System32\taskkill.exe | — | 最新非法滞留境外劝返名单.tmp |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4016 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\system32\SearchProtocolHost.exe | — | SearchIndexer.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211) | ||||
2192 | "C:\Windows\System32\runas.exe" /trustlevel:0x20000 "cmd /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NGLA /t REG_SZ /d \"C:\Users\Public\Documents\NGLA\svchongl.exe\" /f" | C:\Windows\System32\runas.exe | — | Explorer.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Run As Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2332 | cmd /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NGLA /t REG_SZ /d "C:\Users\Public\Documents\NGLA\svchongl.exe" /f | C:\Windows\System32\cmd.exe | — | runas.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\bin.rar | compressed | |
MD5:E61EC0CE398968CB9ED47B094D921603 | SHA256:C1B62B826F66177568B9960778C38540E6885F0AD99C8B5A7D2E029327200DE4 | |||
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\AAAAAA\evqweqwe2.rar | compressed | |
MD5:554095EDDAAE49E924CF41477263C0AE | SHA256:54BBF82A36EF5A63791EAD7D7476284BA0692612D0625F00A8A637461E14105F | |||
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\app.dat | text | |
MD5:44A86777FD42B7037F30F6E88C320F23 | SHA256:8C89104916C1FEA23E66451C386D626270B7A4D8E26BA62C78FB37A3A69A4CEB | |||
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\is-K2T3O.tmp | compressed | |
MD5:E61EC0CE398968CB9ED47B094D921603 | SHA256:C1B62B826F66177568B9960778C38540E6885F0AD99C8B5A7D2E029327200DE4 | |||
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\AAAAAA\is-JTRO0.tmp | compressed | |
MD5:554095EDDAAE49E924CF41477263C0AE | SHA256:54BBF82A36EF5A63791EAD7D7476284BA0692612D0625F00A8A637461E14105F | |||
3600 | cmd.exe | C:\Users\Public\Documents\NGLA\svchongl.exe | executable | |
MD5:FFCB0336D59BD63E23E527D823289C8F | SHA256:579B5D8B96F2CB10AEAD288085785F098BD7B7CCE9E1F52DFB50D6655DFDF7B1 | |||
3528 | NNN_chrome.exe | C:\Users\Public\Documents\NGLA\write\111111111.lnk | lnk | |
MD5:14BE971315F2BD0E69DB0AEE612C35D2 | SHA256:F0AF111D99DFED3305BDBAD79FCEA34165C6DB3B66484C2872370822490734A2 | |||
3472 | 最新非法滞留境外劝返名单.exe | C:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmp | executable | |
MD5:5544360E4E3C4FB9E58B03C88F9C5B79 | SHA256:5124B3F8E538509721ACB6A94F4F0FBE583245E9E00260B91CDF7A57ED47EC62 | |||
2336 | UnRAR.exe | C:\Users\Public\Documents\NGLA\Getinfo.dll | executable | |
MD5:54DABD28318E1FBACBFAFCC85A644B65 | SHA256:1C98AD28E6F77F247E4175876072B03E2AEE11D58645D87306970C61624AEE6A | |||
2516 | 最新非法滞留境外劝返名单.tmp | C:\Users\Public\Documents\NGLA\is-9QESS.tmp | text | |
MD5:44A86777FD42B7037F30F6E88C320F23 | SHA256:8C89104916C1FEA23E66451C386D626270B7A4D8E26BA62C78FB37A3A69A4CEB |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3368 | FF_chrome.exe | 156.240.105.139:8001 | — | Hong Kong Communications International Co., Limited | HK | unknown |
Process | Message |
---|---|
FF_chrome.exe | Sleep(1000) main |
FF_chrome.exe | 156.240.105.139 |
FF_chrome.exe | 156.240.105.139 |
FF_chrome.exe | Connect |
FF_chrome.exe | ³õ´Î£¬»ñÈ¡»î¶¯´°¿Ú |
FF_chrome.exe | sendLoginInfo |
FF_chrome.exe | send COMMAND_REPLAY_HEARTBEAT |