File name:

acer.exe

Full analysis: https://app.any.run/tasks/e7a712f5-961a-45b4-a7e5-a0f7196113a5
Verdict: Malicious activity
Threats:

DarkSide ransomware is a novel ransomware strain involved in high-profile incidents. Its attacks lead to data theft and encryption, causing significant damage to victims.

Analysis date: May 12, 2021, 14:52:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
ransomware
darkside
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

979692CD7FC638BEEA6E9D68C752F360

SHA1:

C511AE4D80AAA281C610190AA13630DE61CA714C

SHA256:

0A0C225F0E5EE941A79F2B7701F1285E4975A2859EB4D025D96D9E366E81ABB9

SSDEEP:

768:piN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/Afy8fIaJ/ZB49j9xOOLd9kvAx0:g4HHerjZX7pLjJKjSO5i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • DllHost.exe (PID: 2108)
    • Renames files like Ransomware

      • acer.exe (PID: 2856)
  • SUSPICIOUS

    • Drops a file with a compile date too recent

      • acer.exe (PID: 2856)
    • Application launched itself

      • acer.exe (PID: 2424)
      • acer.exe (PID: 3628)
    • Creates files in the program directory

      • acer.exe (PID: 3628)
    • Executed as Windows Service

      • acer.exe (PID: 2424)
    • Changes the desktop background image

      • acer.exe (PID: 3628)
    • Creates files like Ransomware instruction

      • acer.exe (PID: 2856)
    • Executed via COM

      • DllHost.exe (PID: 2108)
  • INFO

    • Dropped object may contain TOR URL's

      • acer.exe (PID: 2856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:04:06 00:09:09+02:00
PEType: PE32
LinkerVersion: 14.12
CodeSize: 38912
InitializedDataSize: 81920
UninitializedDataSize: -
EntryPoint: 0xb2bd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 05-Apr-2021 22:09:09

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 05-Apr-2021 22:09:09
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000093AB
0x00009400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.09567
.text1
0x0000B000
0x000002E0
0x00000400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.90376
.rdata
0x0000C000
0x000001C0
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.43189
.data
0x0000D000
0x00013A28
0x00003200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.59261
.ndata
0x00021000
0x000011E3
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.95371

Imports

KERNEL32.dll
ntdll.dll
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start acer.exe no specs CMSTPLUA no specs acer.exe no specs acer.exe no specs acer.exe acer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1476"C:\Users\admin\AppData\Local\Temp\acer.exe" C:\Users\admin\AppData\Local\Temp\acer.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\acer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2108C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2856"C:\Users\admin\AppData\Local\Temp\acer.exe" C:\Users\admin\AppData\Local\Temp\acer.exeDllHost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\acer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2424"C:\Users\admin\AppData\Local\Temp\acer.exe" C:\Users\admin\AppData\Local\Temp\acer.exeservices.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\acer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3628"C:\Users\admin\AppData\Local\Temp\acer.exe" C:\Users\admin\AppData\Local\Temp\acer.exe
acer.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Modules
Images
c:\users\admin\appdata\local\temp\acer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2856C:\Users\admin\AppData\Local\Temp\acer.exe -work worker0 job0-3628C:\Users\admin\AppData\Local\Temp\acer.exeacer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\bcrypt.dll
c:\windows\system32\rstrtmgr.dll
c:\windows\system32\atl.dll
c:\windows\system32\adsldpc.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\netutils.dll
c:\windows\system32\profapi.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\normaliz.dll
Total events
466
Read events
394
Write events
48
Delete events
24

Modification events

(PID) Process:(2108) DllHost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2108) DllHost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:DefaultConnectionSettings
Value:
4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:DefaultConnectionSettings
Value:
460000000300000009000000000000000000000000000000040000000000000000000000000000000000000000000000000000000100000002000000C0A8642F000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3628) acer.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
0
Suspicious files
101
Text files
46
Unknown types
2

Dropped files

PID
Process
Filename
Type
2856acer.exeC:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\Winre.wim.425b93ba
MD5:
SHA256:
2856acer.exeC:\Users\admin\Desktop\callsfun.rtf.425b93babinary
MD5:DEFC13992F3CA44E6B3A80970898E856
SHA256:DFFED13E83293E0D361E96A22C2FD1CC88A6783E508A721F808EB08EE31D5226
2856acer.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp.425b93babinary
MD5:136D4457463999678C443CD1D9491F40
SHA256:8A2ABE2AC5791E1F42E052CBECC5BF0EDF09215790149DF0744A0F975B09CC5B
2856acer.exeC:\Users\admin\Contacts\admin.contact.425b93baini
MD5:8C5D7561090D5C4BFD1E3D0ED9564A16
SHA256:CA62525B6AA3B8E0E0002253D1CDFD899AD2608B63A5BD14769470B9CC17CF48
2856acer.exeC:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\boot.sdi.425b93babinary
MD5:17AE1E48A5CA3A6F89FE4EE871835BDB
SHA256:FE276868B98C74DABD55007CB260303A8107DD7E854316C587E1649074F6E5DE
2856acer.exeC:\Users\admin\Desktop\columbiaplus.png.425b93babinary
MD5:EC2C7BA87493D6FF8FD4A2E48393E9EE
SHA256:D7F769E9B01D280F0EEA55732A6E726DABA7E6E11D12DA6AF698AAC08ADBCFCF
2856acer.exeC:\Users\admin\Desktop\netjune.jpg.425b93babinary
MD5:B31258DDDCDCB0D4D8557142BE9FE512
SHA256:0EEBD36E5C5651971A6CF7B32F3376E044C5905E375426EF6B97D71DE73223D8
2856acer.exeC:\Users\admin\Desktop\manyfootball.jpg.425b93babinary
MD5:03C269E04FAA6EFE324C641B80015B6B
SHA256:48C6F3AA4C712BA53A91A645B78CDCEE4C8AFE549B2DF504323AB4BCD2588B11
2856acer.exeC:\Users\admin\Desktop\placescreen.png.425b93babinary
MD5:CA3587EA468F928DE3D0A40439FEA5E2
SHA256:74A93E86FD725E00632F98D07487CD2D4DCFDACFCBDFBAF4B87BB93CAA533124
3628acer.exeC:\ProgramData\425b93ba.icoimage
MD5:4F57D54D01CCBDAF3EBFAC3EC0AC3FD7
SHA256:28B6841AA125225CD01BE09FBD2F1D7B3C2102D9FFC7DC8546700E67C2A6E3BC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
3
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3628
acer.exe
176.103.62.217:443
baroquetees.com
ITL Company
UA
malicious

DNS requests

Domain
IP
Reputation
baroquetees.com
  • 176.103.62.217
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO TLS Handshake Failure
A Network Trojan was detected
ET TROJAN Observed DarkSide Ransomware Domain (baroquetees .com in TLS SNI)
A Network Trojan was detected
ET TROJAN Observed DarkSide Ransomware Domain (baroquetees .com in TLS SNI)
Potentially Bad Traffic
ET INFO TLS Handshake Failure
A Network Trojan was detected
ET TROJAN Observed DarkSide Ransomware Domain (baroquetees .com in TLS SNI)
No debug info