File name: | repos.exe |
Full analysis: | https://app.any.run/tasks/1e3cb3fb-fd53-4625-9bf6-c2bae103529d |
Verdict: | Malicious activity |
Analysis date: | February 19, 2019, 14:10:47 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 703A4279DFEA4A1ECE5DC59C01BEF53F |
SHA1: | 9C1A0DE2F1BA9084F6B0D7861931C82BCC1BE6E6 |
SHA256: | 0ACC3946C857B40B3BBECF361C3F5DC84772BAFBEF6F29BC226A62ACBC4F8BF9 |
SSDEEP: | 6144:QsCwu+mWhJifvtNP/7YXSLB80PqO/PhR3pAqqq+bF/FvuY5IyDGn2tL3wOd:NxmIJQvPkitEqZR3pAJq+7WUJ0S |
.exe | | | Win64 Executable (generic) (64.6) |
---|---|---|
.dll | | | Win32 Dynamic Link Library (generic) (15.4) |
.exe | | | Win32 Executable (generic) (10.5) |
.exe | | | Generic Win/DOS Executable (4.6) |
.exe | | | DOS Executable Generic (4.6) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2017:08:11 15:54:06+02:00 |
PEType: | PE32 |
LinkerVersion: | 14 |
CodeSize: | 188928 |
InitializedDataSize: | 194560 |
UninitializedDataSize: | - |
EntryPoint: | 0x1cec9 |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 11-Aug-2017 13:54:06 |
Detected languages: |
|
Debug artifacts: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000108 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 11-Aug-2017 13:54:06 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0002E1CB | 0x0002E200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.69427 |
.rdata | 0x00030000 | 0x000098A0 | 0x00009A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.12106 |
.data | 0x0003A000 | 0x0001F290 | 0x00000C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.23719 |
.gfids | 0x0005A000 | 0x000000E8 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.05507 |
.rsrc | 0x0005B000 | 0x00004680 | 0x00004800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.6389 |
.reloc | 0x00060000 | 0x00001F58 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.62297 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.25329 | 1875 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.88998 | 1384 | UNKNOWN | English - United States | RT_ICON |
3 | 4.12176 | 744 | UNKNOWN | English - United States | RT_ICON |
4 | 4.68705 | 2216 | UNKNOWN | English - United States | RT_ICON |
7 | 3.1586 | 482 | UNKNOWN | English - United States | RT_STRING |
8 | 3.11685 | 460 | UNKNOWN | English - United States | RT_STRING |
9 | 3.15447 | 494 | UNKNOWN | English - United States | RT_STRING |
10 | 2.99727 | 326 | UNKNOWN | English - United States | RT_STRING |
11 | 3.2036 | 1094 | UNKNOWN | English - United States | RT_STRING |
12 | 3.12889 | 358 | UNKNOWN | English - United States | RT_STRING |
KERNEL32.dll |
USER32.dll (delay-loaded) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3076 | "C:\Users\admin\Desktop\repos.exe" | C:\Users\admin\Desktop\repos.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2976 | cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\guo.bat" " | C:\Windows\system32\cmd.exe | — | repos.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2332 | trema.sfx.exe -p126 -dC:\Users\admin\AppData\Local\Temp | C:\Users\admin\AppData\Local\Temp\RarSFX0\trema.sfx.exe | cmd.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2228 | "C:\Users\admin\AppData\Local\Temp\RarSFX1\trema.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX1\trema.exe | trema.sfx.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3216 | "C:\Users\admin\AppData\Roaming\Install\excels.exe" | C:\Users\admin\AppData\Roaming\Install\excels.exe | trema.exe | |
User: admin Integrity Level: MEDIUM |
(PID) Process: | (3076) repos.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR SFX |
Operation: | write | Name: | C%%Users%admin%AppData%Local%Temp |
Value: C:\Users\admin\AppData\Local\Temp\RarSFX0 | |||
(PID) Process: | (3076) repos.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (3076) repos.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (2332) trema.sfx.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (2332) trema.sfx.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (3216) excels.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Powerpoint |
Value: C:\Users\admin\AppData\Roaming\Install\excels.exe | |||
(PID) Process: | (3216) excels.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{33M2W4HQ-8650-NBDV-YC5U-8315XNCJH78L} |
Operation: | write | Name: | StubPath |
Value: "C:\Users\admin\AppData\Roaming\Install\excels.exe" |
PID | Process | Filename | Type | |
---|---|---|---|---|
3076 | repos.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\guo.bat | text | |
MD5:5F0ECD0B419473FBE26A79CAA989005B | SHA256:ECCECD5C7D76614E8D84320D5311BBE3A629D783A3938E5DF97C726A2EA6DFD6 | |||
2228 | trema.exe | C:\Users\admin\AppData\Roaming\Install\excels.exe | executable | |
MD5:E71659811C3F5F5BFE97F75E93501787 | SHA256:9BEE01875399CC351A70F3FAC87C7C5D65DFD0C9F8FF218178BF29948AA18DEB | |||
2332 | trema.sfx.exe | C:\Users\admin\AppData\Local\Temp\RarSFX1\trema.exe | executable | |
MD5:E71659811C3F5F5BFE97F75E93501787 | SHA256:9BEE01875399CC351A70F3FAC87C7C5D65DFD0C9F8FF218178BF29948AA18DEB | |||
3076 | repos.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\trema.sfx.exe | executable | |
MD5:D85AC2B5D8820D1174674D0E61194A23 | SHA256:C494275652C12F3681C668DC7F1FFE230AA253C8816EC3FD5A1D2966F4C5B745 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3216 | excels.exe | 185.84.181.101:5934 | bossback.camdvr.org | Radore Veri Merkezi Hizmetleri A.S. | TR | malicious |
Domain | IP | Reputation |
---|---|---|
bossback.camdvr.org |
| malicious |