analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

最新非法滞留境外劝返名单.exe

Full analysis: https://app.any.run/tasks/f6c03a0a-199b-467d-a7fa-3ff79883af13
Verdict: Malicious activity
Analysis date: October 05, 2022, 05:04:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

EDF09F0C5DD060C50671F60C0FFABC23

SHA1:

7A46A9AB6C3729498CE18E3E033A4D9CA9170EFA

SHA256:

09AB5D260BDE3B863B7705EC40C210B0E91BD49C10B04D6DD753EEF35C0B5782

SSDEEP:

24576:f4nXubIQGyxbPV0db26gL3Jl99iXH5TK9SRKpWu07TXu/icZTEwLbDKKl33C/9lG:fqe3f6ofiXH5TBiYfXyXo8PVUHlum0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 4016)
      • NNN_chrome.exe (PID: 3528)
    • Application was dropped or rewritten from another process

      • UnRAR.exe (PID: 2336)
      • FF_chrome.exe (PID: 3368)
      • NNN_chrome.exe (PID: 3528)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application was dropped or rewritten from another process

      • 最新非法滞留境外劝返名单.tmp (PID: 2516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2020-Sep-13 09:00:51
Detected languages:
  • English - United States
Comments: This installation was built with Inno Setup.
CompanyName: https://www.a464ne6ae4b6a4.cc/
FileDescription: a464ne6ae4b6a4 Setup
FileVersion: -
LegalCopyright: a464ne6ae4b6a4
OriginalFileName: -
ProductName: a464ne6ae4b6a4
ProductVersion: a464ne6ae4b6a4

DOS Header

e_magic: MZ
e_cblp: 80
e_cp: 2
e_crlc: -
e_cparhdr: 4
e_minalloc: 15
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: 26
e_oemid: -
e_oeminfo: -
e_lfanew: 256

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 10
TimeDateStamp: 2020-Sep-13 09:00:51
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
734748
735232
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.35606
.itext
741376
5768
6144
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.97275
.data
749568
14244
14336
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.0444
.bss
765952
28136
0
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata
794624
3894
4096
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.8987
.didata
798720
420
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.75636
.edata
802816
154
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.87222
.tls
806912
24
0
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata
811008
93
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.38389
.rsrc
815104
30088
30208
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.41996

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.6421
16936
Latin 1 / Western European
English - United States
RT_ICON
4086
3.16547
864
Latin 1 / Western European
UNKNOWN
RT_STRING
4087
3.40938
608
Latin 1 / Western European
UNKNOWN
RT_STRING
4088
3.31153
1116
Latin 1 / Western European
UNKNOWN
RT_STRING
4089
3.33977
1036
Latin 1 / Western European
UNKNOWN
RT_STRING
4090
3.36723
724
Latin 1 / Western European
UNKNOWN
RT_STRING
4091
3.33978
184
Latin 1 / Western European
UNKNOWN
RT_STRING
4092
3.15425
156
Latin 1 / Western European
UNKNOWN
RT_STRING
4093
3.31895
884
Latin 1 / Western European
UNKNOWN
RT_STRING
4094
3.28786
920
Latin 1 / Western European
UNKNOWN
RT_STRING

Imports

advapi32.dll
comctl32.dll
kernel32.dll
kernel32.dll (delay-loaded)
netapi32.dll
oleaut32.dll
user32.dll
version.dll

Exports

Title
Ordinal
Address
dbkFCallWrapperAddr
1
779836
__dbk_fcall_wrapper
2
53408
TMethodImplementationIntercept
3
344160
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
13
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start 最新非法滞留境外劝返名单.exe no specs 最新非法滞留境外劝返名单.tmp no specs cmd.exe no specs unrar.exe no specs ff_chrome.exe nnn_chrome.exe no specs taskkill.exe no specs searchprotocolhost.exe no specs runas.exe no specs cmd.exe no specs reg.exe no specs runas.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3472"C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exe" C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exeExplorer.EXE
User:
admin
Company:
https://www.a464ne6ae4b6a4.cc/
Integrity Level:
MEDIUM
Description:
a464ne6ae4b6a4 Setup
Exit code:
1
Version:
2516"C:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmp" /SL5="$301AA,1347026,792576,C:\Users\admin\AppData\Local\Temp\最新非法滞留境外劝返名单.exe" C:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmp最新非法滞留境外劝返名单.exe
User:
admin
Company:
https://www.a464ne6ae4b6a4.cc/
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
3936"C:\Windows\System32\cmd.exe" /c ""C:\Users\admin\Desktop\UnRAR.exe" x "C:\Users\Public\Documents\NGLA\bin.rar" "C:\Users\Public\Documents\NGLA\" -inul -y -o+ -pqwe123"C:\Windows\System32\cmd.exe最新非法滞留境外劝返名单.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2336"C:\Users\admin\Desktop\UnRAR.exe" x "C:\Users\Public\Documents\NGLA\bin.rar" "C:\Users\Public\Documents\NGLA\" -inul -y -o+ -pqwe123C:\Users\admin\Desktop\UnRAR.execmd.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
Command line RAR
Exit code:
0
Version:
6.2.0
3368"C:\Users\Public\Documents\NGLA\FF_chrome.exe" C:\Users\Public\Documents\NGLA\FF_chrome.exe
最新非法滞留境外劝返名单.tmp
User:
admin
Integrity Level:
MEDIUM
Description:
46m6n4btaw
Version:
1, 0, 0, 1
3528"C:\Users\Public\Documents\NGLA\NNN_chrome.exe" C:\Users\Public\Documents\NGLA\NNN_chrome.exe最新非法滞留境外劝返名单.tmp
User:
admin
Integrity Level:
MEDIUM
1980"C:\Windows\System32\taskkill.exe" /f /IM 最新非法滞留境外劝返名单.exeC:\Windows\System32\taskkill.exe最新非法滞留境外劝返名单.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4016"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
2192"C:\Windows\System32\runas.exe" /trustlevel:0x20000 "cmd /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NGLA /t REG_SZ /d \"C:\Users\Public\Documents\NGLA\svchongl.exe\" /f"C:\Windows\System32\runas.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2332cmd /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NGLA /t REG_SZ /d "C:\Users\Public\Documents\NGLA\svchongl.exe" /fC:\Windows\System32\cmd.exerunas.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
2 394
Read events
1 491
Write events
0
Delete events
0

Modification events

No data
Executable files
8
Suspicious files
6
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\bin.rarcompressed
MD5:E61EC0CE398968CB9ED47B094D921603
SHA256:C1B62B826F66177568B9960778C38540E6885F0AD99C8B5A7D2E029327200DE4
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\AAAAAA\evqweqwe2.rarcompressed
MD5:554095EDDAAE49E924CF41477263C0AE
SHA256:54BBF82A36EF5A63791EAD7D7476284BA0692612D0625F00A8A637461E14105F
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\app.dattext
MD5:44A86777FD42B7037F30F6E88C320F23
SHA256:8C89104916C1FEA23E66451C386D626270B7A4D8E26BA62C78FB37A3A69A4CEB
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\is-K2T3O.tmpcompressed
MD5:E61EC0CE398968CB9ED47B094D921603
SHA256:C1B62B826F66177568B9960778C38540E6885F0AD99C8B5A7D2E029327200DE4
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\AAAAAA\is-JTRO0.tmpcompressed
MD5:554095EDDAAE49E924CF41477263C0AE
SHA256:54BBF82A36EF5A63791EAD7D7476284BA0692612D0625F00A8A637461E14105F
3600cmd.exeC:\Users\Public\Documents\NGLA\svchongl.exeexecutable
MD5:FFCB0336D59BD63E23E527D823289C8F
SHA256:579B5D8B96F2CB10AEAD288085785F098BD7B7CCE9E1F52DFB50D6655DFDF7B1
3528NNN_chrome.exeC:\Users\Public\Documents\NGLA\write\111111111.lnklnk
MD5:14BE971315F2BD0E69DB0AEE612C35D2
SHA256:F0AF111D99DFED3305BDBAD79FCEA34165C6DB3B66484C2872370822490734A2
3472最新非法滞留境外劝返名单.exeC:\Users\admin\AppData\Local\Temp\is-DRSP4.tmp\最新非法滞留境外劝返名单.tmpexecutable
MD5:5544360E4E3C4FB9E58B03C88F9C5B79
SHA256:5124B3F8E538509721ACB6A94F4F0FBE583245E9E00260B91CDF7A57ED47EC62
2336UnRAR.exeC:\Users\Public\Documents\NGLA\Getinfo.dllexecutable
MD5:54DABD28318E1FBACBFAFCC85A644B65
SHA256:1C98AD28E6F77F247E4175876072B03E2AEE11D58645D87306970C61624AEE6A
2516最新非法滞留境外劝返名单.tmpC:\Users\Public\Documents\NGLA\is-9QESS.tmptext
MD5:44A86777FD42B7037F30F6E88C320F23
SHA256:8C89104916C1FEA23E66451C386D626270B7A4D8E26BA62C78FB37A3A69A4CEB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3368
FF_chrome.exe
156.240.105.139:8001
Hong Kong Communications International Co., Limited
HK
unknown

DNS requests

No data

Threats

No threats detected
Process
Message
FF_chrome.exe
Sleep(1000) main
FF_chrome.exe
156.240.105.139
FF_chrome.exe
156.240.105.139
FF_chrome.exe
Connect
FF_chrome.exe
³õ´Î£¬»ñÈ¡»î¶¯´°¿Ú
FF_chrome.exe
sendLoginInfo
FF_chrome.exe
send COMMAND_REPLAY_HEARTBEAT