File name:

torrent_id194505ids1s.exe

Full analysis: https://app.any.run/tasks/14e33f82-e864-4c2d-b461-f1fe69915d99
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 09, 2019, 17:26:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
hiloti
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

03C3F313163DD82FE49C99B1A7187A01

SHA1:

604BF251BAA175BC324A264A0B6B416A18C46A28

SHA256:

0CAC343AFA214F6B9B00069518B858E2BEA022F84E12A556CA6BA1C812B51030

SSDEEP:

12288:YanarVb44unIU+XApX6X2ABYDWH8ND92DpfrNYCDw1vYUWgTVQuL6HXOx8Iee:9naJ5JU+wpiaGyx2DpfrNYPvYUVToexf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • HILOTI was detected

      • torrent_id194505ids1s.exe (PID: 2924)
    • Application was dropped or rewritten from another process

      • MediaGet.exe (PID: 1008)
      • MediaGet.exe (PID: 1644)
      • mediaget.exe (PID: 2276)
    • Loads dropped or rewritten executable

      • mediaget.exe (PID: 2276)
    • Changes the autorun value in the registry

      • mediaget.exe (PID: 2276)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • torrent_id194505ids1s.exe (PID: 2924)
    • Creates a software uninstall entry

      • torrent_id194505ids1s.exe (PID: 2924)
    • Reads internet explorer settings

      • torrent_id194505ids1s.exe (PID: 2924)
    • Modifies the open verb of a shell class

      • mediaget.exe (PID: 2276)
    • Creates files in the user directory

      • torrent_id194505ids1s.exe (PID: 2924)
    • Connects to unusual port

      • mediaget.exe (PID: 2276)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • torrent_id194505ids1s.exe (PID: 2924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (76)
.exe | Win32 Executable (generic) (12.6)
.exe | Generic Win/DOS Executable (5.6)
.exe | DOS Executable Generic (5.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:09:02 14:08:12+02:00
PEType: PE32
LinkerVersion: 9
CodeSize: 286720
InitializedDataSize: 389120
UninitializedDataSize: 901120
EntryPoint: 0x1220f0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1
InternalName: -
LegalCopyright: -
OriginalFileName: -
ProductName: -
ProductVersion: 1

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 02-Sep-2019 12:08:12
Detected languages:
  • English - United States
  • Russian - Russia
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0
InternalName: -
LegalCopyright: -
OriginalFilename: -
ProductName: -
ProductVersion: 1.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 02-Sep-2019 12:08:12
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x000DC000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x000DD000
0x00046000
0x00045400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.92259
.rsrc
0x00123000
0x0005F000
0x0005EE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.95679

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.19483
585
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.95548
9640
Latin 1 / Western European
English - United States
RT_ICON
3
5.18073
4264
Latin 1 / Western European
English - United States
RT_ICON
4
5.05232
2440
Latin 1 / Western European
English - United States
RT_ICON
5
4.75162
1128
Latin 1 / Western European
English - United States
RT_ICON
128
2.68598
62
Latin 1 / Western European
English - United States
RT_GROUP_ICON
129
6.72681
170
Latin 1 / Western European
English - United States
UNKNOWN
219
4.22193
20
Latin 1 / Western European
Russian - Russia
RT_GROUP_ICON
HTML
7.99941
352963
Latin 1 / Western European
Russian - Russia
ARCHIVE_7Z
PRELOADER
7.98607
15254
Latin 1 / Western European
Russian - Russia
ARCHIVE_7Z

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.DLL
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
USER32.dll
WININET.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start #HILOTI torrent_id194505ids1s.exe mediaget.exe no specs mediaget.exe mediaget.exe

Process information

PID
CMD
Path
Indicators
Parent process
1008"C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\MediaGet.exe" C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\MediaGet.exetorrent_id194505ids1s.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mediaget-installer-tmp\mediaget.exe
c:\systemroot\system32\ntdll.dll
1644"C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\MediaGet.exe" C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\MediaGet.exe
torrent_id194505ids1s.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\mediaget-installer-tmp\mediaget.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2276"C:\Users\admin\AppData\Local\MediaGet2\mediaget.exe" --installerC:\Users\admin\AppData\Local\MediaGet2\mediaget.exe
torrent_id194505ids1s.exe
User:
admin
Company:
MediaGet LLC
Integrity Level:
MEDIUM
Description:
MediaGet torrent client
Exit code:
0
Version:
2, 1, 0, 0
Modules
Images
c:\users\admin\appdata\local\mediaget2\mediaget.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\mediaget2\libvlc.dll
c:\users\admin\appdata\local\mediaget2\libvlccore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2924"C:\Users\admin\AppData\Local\Temp\torrent_id194505ids1s.exe" C:\Users\admin\AppData\Local\Temp\torrent_id194505ids1s.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\torrent_id194505ids1s.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
801
Read events
488
Write events
251
Delete events
62

Modification events

(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_CURRENT_USER\Software\Media Get LLC\MediaGet2-systemScope\mediaget_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2924) torrent_id194505ids1s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\torrent_id194505ids1s_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
45
Suspicious files
3
Text files
111
Unknown types
11

Dropped files

PID
Process
Filename
Type
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\turbom-en.jpgimage
MD5:E69607228482C8DF8AB6644882C6D189
SHA256:A757AE69ADA3E2F683528851763992C84423C2B1A9649A14BFCA41B0233EE02A
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\cancel_page.jpgimage
MD5:C386B5B98661D512688CD776A8D1EDDE
SHA256:F7516910B8E636654E0D37CC3AE8F453E950305EFB10DCA46839552AB8E2BA35
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\cancel_page_en.jpgimage
MD5:50F56163EAF9D936F75E7DE282BF448D
SHA256:7607AB12026D2C1CBB1C688E6E7CD9F7E84B4858FA8CF7A00764A080B1C4CFCE
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\turbom-tr.jpgimage
MD5:2C2062EC29D0795B003D88D400B757F1
SHA256:8E82627256EFCC6C611BB54C86E09FDCC25B6CFA325F98550AD8F3A839D874D8
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\checkbox-white-off.pngimage
MD5:5147E38DAC6CD2240123AE354B2402AB
SHA256:26D47A2A44EF18E337208903FE5EE1EFBC5AFBCF17AD5D8E424C12BA983C0AC0
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\cancel_page_tr.jpgimage
MD5:16B4DC0BB4DED04C6A32636FCEFB1638
SHA256:0131175674FBC4CBB845B4F0B62E467AB4A6125CDCF22DF5B53EB3475312833E
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\opera\opera-mockup.jpgimage
MD5:5FC2F45724B2CD7A6DAEC6F84FAE01CD
SHA256:898C1B5F3ED1F8236D86E46EE617F9FF9FEAF6192EDEDEEEA3FFD9D99F7AB14A
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\cancel-try.pngimage
MD5:0C20E488CB0E79CCD4668387E84F9C1E
SHA256:9BD84EDBDFE0BA75B4D067C335DE6D3DAD90E203EA12915F9A67DBB402437CEA
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\turbom.jpgimage
MD5:22255B8A8AFA5CCF871209EDCD71F9D5
SHA256:E90CFA9044B168E65A7927EA6E202E7DF4CFE248A105ABC2A0B006655F3B7C0D
2924torrent_id194505ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img\cancel-try-tr.pngimage
MD5:7B2A7E4182325D1F6ECF4AB3A804CB9B
SHA256:9AC72796032C936D1C4DF6F3560A6D90E793ABED7166A1A9BA7CB205FF71025F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
640
DNS requests
17
Threats
37

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2924
torrent_id194505ids1s.exe
GET
200
23.111.31.146:80
http://download.mediaget.com/mediaget-installer-2/binaries/download.php?a=mediaget-bin
NL
compressed
15.4 Mb
malicious
2276
mediaget.exe
GET
200
23.111.88.196:80
http://mg.mgshare.com/js/jquery-postmessage.js
NL
text
8.63 Kb
malicious
2276
mediaget.exe
GET
200
193.0.201.62:80
http://www2.bubblesmedia.ru/file/mg_left.php?version=2.01.3805&client_id=
RU
html
305 b
malicious
2276
mediaget.exe
GET
200
23.111.88.196:80
http://mg.mgshare.com/css/main.css?2
NL
text
3.41 Kb
malicious
2276
mediaget.exe
GET
200
23.111.88.196:80
http://mg.mgshare.com/?mediaget=2.01.3805&lang=en&client_id=&check=4a99fca9d621f844ac2ed031b5f0cced
NL
html
1.16 Kb
malicious
2276
mediaget.exe
GET
200
193.0.201.71:80
http://sub2.admitlead.ru/r/get_code/4/?subid=0&version=2.01.3805
RU
html
1.78 Kb
malicious
2276
mediaget.exe
GET
200
23.111.88.196:80
http://mg.mgshare.com/menu.php?query=mediaget%3D2.01.3805%26lang%3Den%26client_id%3D%26check%3D4a99fca9d621f844ac2ed031b5f0cced
NL
html
5.22 Kb
malicious
2276
mediaget.exe
GET
200
193.0.201.68:80
http://games.mgshare.com/?mediaget=2.01.3805&client_id=&check=4a99fca9d621f844ac2ed031b5f0cced&lang=en
RU
html
11.3 Kb
malicious
2276
mediaget.exe
GET
400
193.0.201.71:80
http://sub2.admitlead.ru/r/display/4/0/?a=1&mg_version=2.01.3805&rnd=39372
RU
html
1.56 Kb
malicious
2276
mediaget.exe
GET
200
193.0.201.68:80
http://games.mgshare.com/js/action.js
RU
text
726 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
105.108.213.236:33405
Telecom Algeria
DZ
unknown
2924
torrent_id194505ids1s.exe
185.130.105.34:443
install.mediaget.com
Hosting Solution Ltd.
NL
suspicious
2924
torrent_id194505ids1s.exe
23.111.31.146:80
ld1.mediaget.com
Servers.com, Inc.
NL
malicious
2276
mediaget.exe
67.215.246.10:6881
router.bittorrent.com
QuadraNet, Inc
US
suspicious
186.188.241.98:59288
Cable Onda
PA
unknown
157.158.168.129:8621
Silesian University of Technology, Computer Centre
PL
unknown
194.103.104.147:60146
Peter Lindstrom Elektronik i Boden AB
SE
unknown
78.148.162.240:50321
TalkTalk
GB
unknown
196.75.221.195:24773
MT-MPLS
MA
unknown
69.243.218.68:6881
Comcast Cable Communications, LLC
US
unknown

DNS requests

Domain
IP
Reputation
install.mediaget.com
  • 185.130.105.34
  • 23.111.31.148
whitelisted
ld1.mediaget.com
  • 23.111.31.146
malicious
download.mediaget.com
  • 23.111.31.146
unknown
router.bittorrent.com
  • 67.215.246.10
shared
update.mgtracker.org
  • 77.91.229.218
  • 37.19.5.155
  • 37.19.5.139
  • 92.241.171.245
suspicious
client.mediaget.com
  • 185.130.105.34
  • 23.111.31.148
malicious
fonts.googleapis.com
  • 172.217.23.138
whitelisted
fonts.gstatic.com
  • 172.217.21.195
whitelisted
mg.mgshare.com
  • 23.111.88.196
  • 193.0.201.68
malicious
www2.bubblesmedia.ru
  • 193.0.201.62
  • 23.111.31.135
malicious

Threats

PID
Process
Class
Message
2924
torrent_id194505ids1s.exe
A Network Trojan was detected
ET INFO Hiloti Style GET to PHP with invalid terse MSIE headers
2924
torrent_id194505ids1s.exe
A Network Trojan was detected
ET INFO Hiloti Style GET to PHP with invalid terse MSIE headers
2276
mediaget.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT announce_peers request
33 ETPRO signatures available at the full report
No debug info