analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

pow-setup-7.exe

Full analysis: https://app.any.run/tasks/61ba1131-e4b5-4cce-a343-f3185ab04b47
Verdict: Malicious activity
Analysis date: August 25, 2019, 17:27:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B18CE3F7679F0078C58C3B8DF4A589C1

SHA1:

E418D17D6DD411778ED6529559F75D851C5266CD

SHA256:

0C8FF856F752BA8FF7AE5039A893E854CDB57AAA788A8016C5BEF9A85A30E13A

SSDEEP:

49152:ZgnNYyfqq/0Y4Fu4TCZL1TMigzhojbcUzqj1CvmdZG8qMTmC:qYMyY2u4ODMzzhojblyAMS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • pow-setup-7.exe (PID: 3124)
    • Loads dropped or rewritten executable

      • pow-setup-7.exe (PID: 3124)
      • regsvr32.exe (PID: 2420)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • pow-setup-7.exe (PID: 3124)
    • Creates files in the program directory

      • pow-setup-7.exe (PID: 3124)
    • Creates a software uninstall entry

      • pow-setup-7.exe (PID: 3124)
    • Executable content was dropped or overwritten

      • pow-setup-7.exe (PID: 3124)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 2420)
    • Creates or modifies windows services

      • pow-setup-7.exe (PID: 3124)
    • Creates files in the driver directory

      • pow-setup-7.exe (PID: 3124)
    • Creates files in the Windows directory

      • pow-setup-7.exe (PID: 3124)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • pow-setup-7.exe (PID: 3124)
    • Reads settings of System Certificates

      • explorer.exe (PID: 276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 20:19:54+01:00
PEType: PE32
LinkerVersion: 10
CodeSize: 28160
InitializedDataSize: 445952
UninitializedDataSize: 16896
EntryPoint: 0x3883
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
FileDescription: -
FileVersion: 1.0.0.1
LegalCopyright: -
LegalTrademarks: -
ProductName: Powzip

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Feb-2012 19:19:54
Detected languages:
  • English - United States
Comments: -
FileDescription: -
FileVersion: 1.0.0.1
LegalCopyright: -
LegalTrademarks: -
ProductName: Powzip

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 24-Feb-2012 19:19:54
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006DAE
0x00006E00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.50853
.rdata
0x00008000
0x00002A62
0x00002C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.39054
.data
0x0000B000
0x00067EBC
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.43086
.ndata
0x00073000
0x00115000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00188000
0x0000B828
0x0000BA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.40558
.reloc
0x00194000
0x00000F32
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
5.41468

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.21712
968
UNKNOWN
English - United States
RT_MANIFEST
2
5.32581
9640
UNKNOWN
English - United States
RT_ICON
3
5.36072
4264
UNKNOWN
English - United States
RT_ICON
4
5.54102
3752
UNKNOWN
English - United States
RT_ICON
5
5.5873
2440
UNKNOWN
English - United States
RT_ICON
6
5.91114
2216
UNKNOWN
English - United States
RT_ICON
7
5.72615
1736
UNKNOWN
English - United States
RT_ICON
8
4.071
1384
UNKNOWN
English - United States
RT_ICON
9
5.5217
1128
UNKNOWN
English - United States
RT_ICON
103
2.96193
132
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start pow-setup-7.exe no specs pow-setup-7.exe regsvr32.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2324"C:\Users\admin\Desktop\pow-setup-7.exe" C:\Users\admin\Desktop\pow-setup-7.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.0.0.1
3124"C:\Users\admin\Desktop\pow-setup-7.exe" C:\Users\admin\Desktop\pow-setup-7.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0.0.1
2420regsvr32 /s "C:\Program Files\Powzip\smshellext.dll"C:\Windows\system32\regsvr32.exepow-setup-7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
276C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 817
Read events
2 686
Write events
130
Delete events
1

Modification events

(PID) Process:(276) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(276) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
01000000D08C9DDF0115D1118C7A00C04FC297EB0100000045F907FE9B3AFF49B54F5B2E9331906F000000000200000000001066000000010000200000001B28ECB4CF388E71931CC370049E9EC5B4CFB1471DEC473DC0FAA178D93DF5FB000000000E800000000200002000000092F930ADDF31D67958C6C0DC0B66EE82D3FCC8ADD7E879A353EFC8C212E4903D300000002E0103E8BC57A0C58798F5D7CEEC2DCC51C0D70F54FDF75F3445C7034DE5E02EEE6892B9500F2A3240818A1663EB14C040000000986E7A251E750310039C44DBBD41EA682215CC0232F3E1363F97ACE624CB99ABAC478EA15A05885F9D2DB2671700738B502CD458B760CE732F51C22E1CE3F3B5
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{9CC34070-3A38-4C7A-89CB-EF8177EF07A1}
Operation:writeName:
Value:
SMShellExt
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\SMShellExt.DLL
Operation:writeName:AppID
Value:
{9CC34070-3A38-4C7A-89CB-EF8177EF07A1}
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartMountShell.ContextMenuExt.1
Operation:writeName:
Value:
ContextMenuExt Class
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartMountShell.ContextMenuExt.1\CLSID
Operation:writeName:
Value:
{3871F95B-BF7A-4c17-950B-3ECBCA765A45}
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartMountShell.ContextMenuExt
Operation:writeName:
Value:
ContextMenuExt Class
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartMountShell.ContextMenuExt\CLSID
Operation:writeName:
Value:
{3871F95B-BF7A-4c17-950B-3ECBCA765A45}
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartMountShell.ContextMenuExt\CurVer
Operation:writeName:
Value:
SmartMountShell.ContextMenuExt.1
(PID) Process:(2420) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3871F95B-BF7A-4c17-950B-3ECBCA765A45}
Operation:writeName:
Value:
ContextMenuExt Class
Executable files
12
Suspicious files
0
Text files
21
Unknown types
3

Dropped files

PID
Process
Filename
Type
3124pow-setup-7.exeC:\Users\Public\Documents\XMUpdate\conf.dbtext
MD5:BBB4331E9C133EE6E29B92015DC6FF95
SHA256:6A37456BC17BC658CA929E24B41F830C83648D6C0C415F29A95D5D4ECBE4FB51
3124pow-setup-7.exeC:\Program Files\Powzip\smkernel.dllexecutable
MD5:1A462CDEE23A0B5911162B491914ADF2
SHA256:3F653A77657BA17155659B5FEC2CB58458383E85C1E2E7F26607E8DB488CB13F
3124pow-setup-7.exeC:\Program Files\Powzip\7z.dllexecutable
MD5:1F1CCBE947E9A8CDD88BF616076CD3F5
SHA256:DDBE753AF3C48600910852C185AC21AD1C19765A1799B5478C8AC373FB6BBBA3
3124pow-setup-7.exeC:\Program Files\Powzip\theme\toolbar\delete.icoimage
MD5:0886579012D0AF2BC3D745D99AC96CBA
SHA256:3C5A4981312CF768F28230BF65A25B0D24E113D758315A04F2611F81D8003D07
3124pow-setup-7.exeC:\Program Files\Powzip\smexplorerinternal.exeexecutable
MD5:B16313F75E880990CBDC335EAE5F5327
SHA256:787926B2DC3D87E8E199667C73B5ED6DC24A552C24BEB3860B7B0E68FB237784
3124pow-setup-7.exeC:\Program Files\Powzip\smmount.exeexecutable
MD5:8FC4634D5B5FB458B7E1D15F2A458030
SHA256:38AAFE15BB86FD13F3D0DA630845E17390C24DE9CB393D0DC9A19152667DB392
3124pow-setup-7.exeC:\Program Files\Powzip\theme\toolbar\add.icoimage
MD5:049028A21FCA1208B9AAB9B38135EDE1
SHA256:C8C2774E894ACC489903A7E1616D90BC89AE9911BAEAA56DBED4E65E064E4A10
3124pow-setup-7.exeC:\Program Files\Powzip\locales\04.xmlxml
MD5:9F6AF175962E4D3B2B4DDB70B9E9979D
SHA256:38279E30BB52CD0ACD75F9039399103EDDA93C6AC3EFCFFC9C23C8982358D12C
3124pow-setup-7.exeC:\Program Files\Powzip\smshellext.dllexecutable
MD5:3EB2252A3E1E6C7C1F331F4649E7B6C5
SHA256:71A2BEBF7B5D78DCEA1F871922C6FF34DEF2B687BB11E08A2948849C129A643F
3124pow-setup-7.exeC:\Program Files\Powzip\theme\toolbar\extract.icoimage
MD5:F4D3040CE36752952B362B235EC03DEE
SHA256:8073BEA3E95E29E78785A87A9E90C0C4919F29FF532718C934A704A76B309172
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
70
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/gcse/g2gcse.9062555273.html
US
html
1.45 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/agoda/agkrd.html
US
html
789 b
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/booking/bkjmpv8.php?cid=1231356
US
html
708 b
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/booking/g2bk.js
US
text
6.04 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/Julia/aliexpress/alileiz.php
US
html
2.54 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/gcse/gcse.9196855059.js
US
text
2.44 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/gcse/g2gcse.5229215495.html
US
html
1.45 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/allshua/newswedpxy.hplk.js
US
text
2.52 Kb
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/converterlink/converterlink.html
US
html
840 b
unknown
276
explorer.exe
GET
200
108.61.202.179:80
http://108.61.202.179/statcnt/ylcode/sved/prohb.html
US
html
3.00 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
45.32.153.241:5520
np.powzip.club
Choopa, LLC
DE
malicious
3124
pow-setup-7.exe
45.32.153.241:5519
np.powzip.club
Choopa, LLC
DE
malicious
4
System
45.32.153.241:5518
np.powzip.club
Choopa, LLC
DE
malicious
4
System
66.42.80.230:28562
cfg.inputai.club
US
unknown
4
System
108.61.202.179:23980
Choopa, LLC
US
unknown
45.32.153.241:5518
np.powzip.club
Choopa, LLC
DE
malicious
276
explorer.exe
108.61.202.179:80
Choopa, LLC
US
unknown
276
explorer.exe
66.42.80.230:31703
cfg.inputai.club
US
unknown

DNS requests

Domain
IP
Reputation
np.powzip.club
  • 45.32.153.241
malicious
hnt.powzip.club
  • 45.32.153.241
malicious
www.baidu.com
  • 104.193.88.123
  • 104.193.88.77
whitelisted
cfg.inputai.club
  • 66.42.80.230
suspicious

Threats

No threats detected
No debug info