| File name: | file |
| Full analysis: | https://app.any.run/tasks/08f9de9c-0452-4837-9def-fb8ce07534a3 |
| Verdict: | Malicious activity |
| Threats: | A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet. |
| Analysis date: | November 11, 2023, 07:16:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | F01168E4B610509F528BCA4D244FA0A1 |
| SHA1: | B617E4328AF65E81135B77DA92D6829F4DBC305F |
| SHA256: | 0D10D157A9B1346C1F5C737E4912CE3738FACDA1E74FDD0A4A1FB2C36A6374EC |
| SSDEEP: | 3072:N9ksIUovdgSsy7mfeYqLez+wkNAf875or0FUzI6JrWPbB6jM4:Q2Ssy7m1qKz+w4/7+RWzEP |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:09 15:03:31+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 119808 |
| InitializedDataSize: | 24296448 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x589f |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 100.0.0.0 |
| ProductVersionNumber: | 2.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (0291) |
| CharacterSet: | Unknown (85B1) |
| CompanyName: | History |
| FileDescriptions: | Blast |
| FileVersion: | 88.53.80.23 |
| InternalName: | HondaForza.exe |
| LegalCopyrights: | Challengers mazambik inc. |
| LegalTrademarks2: | unobservable |
| ProductName: | FreewayTrip |
| ProductVersion: | 57.71.45.5 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3020 | svchost.exe -o fastpool.xyz:10060 -u 9mLwUkiK8Yp89zQQYodWKN29jVVVz1cWDFZctWxge16Zi3TpHnSBnnVcCDhSRXdesnMBdVjtDwh1N71KD9z37EzgKSM1tmS.200000 -p x -k -a cn/half --cpu-priority 1 | C:\Windows\System32\svchost.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3128 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3372 | "C:\Windows\System32\wusa.exe" | C:\Windows\System32\wusa.exe | — | file.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Update Standalone Installer Exit code: 3221226540 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3400 | cmd /C mkdir C:\Windows\system32\dfnlopav\ | C:\Windows\System32\cmd.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3576 | "C:\Windows\System32\wusa.exe" | C:\Windows\System32\wusa.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Update Standalone Installer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3596 | cmd /C move /Y "C:\Users\admin\AppData\Local\Temp\hormlffz.exe" C:\Windows\system32\dfnlopav\ | C:\Windows\System32\cmd.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3688 | sc create dfnlopav binPath= "C:\Windows\system32\dfnlopav\hormlffz.exe /d\"C:\Users\admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support" | C:\Windows\System32\sc.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3828 | sc start dfnlopav | C:\Windows\System32\sc.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3844 | sc description dfnlopav "wifi internet conection" | C:\Windows\System32\sc.exe | file.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3924 | svchost.exe | C:\Windows\System32\svchost.exe | hormlffz.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Tofsee(PID) Process(3924) svchost.exe C2 (2)vanaheim.cn jotunheim.name Encrypted Strings (59)c:\Windows \system32\ ImagePath .exe SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run MSConfig /r .exe cmd /C move /Y "%s" %s
sc config %s binPath= "%s%s /d\"%s\""
sc start %s svchost.exe SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ConsentPromptBehaviorAdmin PromptOnSecureDesktop MSConfig :.repos USERPROFILE \Local Settings:.repos USERPROFILE \Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos USERPROFILE \wincookie.repos TMP Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses SYSTEM\CurrentControlSet\services ImagePath SYSTEM\CurrentControlSet\services SYSTEM\CurrentControlSet\services SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run .exe qazwsxed %s%i%i%i%i.bat @echo off
:next_try
del "%s">nul
if exist "%s" (
ping 127.0.0.1 >nul
goto next_try
)
del %%0 svchost.exe .exe /u USERPROFILE SOFTWARE\Microsoft\Windows\CurrentVersion\Run /d /e /d /e .exe "%s" /u"%s" USERPROFILE .exe USERPROFILE USERPROFILE ver=%d lid=%d
win=%X/%d sid=%s
rep=%s | |||||||||||||||
| (PID) Process: | (3128) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3128) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3128) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3128) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3952) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3924) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\dfnlopav |
| Operation: | write | Name: | ImagePath |
Value: C:\Windows\system32\dfnlopav\hormlffz.exe /d"C:\Users\admin\AppData\Local\Temp\file.exe" | |||
| (PID) Process: | (4064) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{2D3E9894-4FF0-4F3C-BA28-8E0A8BB49C10}\{4A50C6D2-65FD-444C-A871-0E8187CBB1AD} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4064) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{2D3E9894-4FF0-4F3C-BA28-8E0A8BB49C10} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4064) wmpnscfg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{036E587C-0B64-4AEE-BAFB-D39544BCDFFF} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3924) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Control Panel\Buses |
| Operation: | write | Name: | Config0 |
Value: 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 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3596 | cmd.exe | C:\Windows\System32\dfnlopav\hormlffz.exe | executable | |
MD5:941F74A378DE7BB7381FC3760CE3ECA4 | SHA256:B15CC090D1CD9AE4C1C51E14BC5F572C9344946255A904E3FFE277EFAD70F8E0 | |||
| 3924 | svchost.exe | C:\Windows\system32\config\systemprofile:.repos | binary | |
MD5:69B19896595375A2817F91B46C651520 | SHA256:3261181AC7C2D13C171AEE8CA380A60559E25AE8CC6EBFF03AAFAF0DA76A9F89 | |||
| 3128 | file.exe | C:\Users\admin\AppData\Local\Temp\hormlffz.exe | executable | |
MD5:941F74A378DE7BB7381FC3760CE3ECA4 | SHA256:B15CC090D1CD9AE4C1C51E14BC5F572C9344946255A904E3FFE277EFAD70F8E0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 216.58.206.36:80 | http://www.google.com/ | unknown | html | 2.15 Kb | unknown |
3924 | svchost.exe | GET | 200 | 93.115.25.10:80 | http://93.115.25.10/internals/api/ip?1699687075817356571 | unknown | text | 14 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3924 | svchost.exe | 20.112.250.133:80 | microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
3924 | svchost.exe | 52.101.42.0:25 | microsoft-com.mail.protection.outlook.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
3924 | svchost.exe | 158.160.73.47:443 | vanaheim.cn | Yandex.Cloud LLC | RU | unknown |
3924 | svchost.exe | 80.66.75.77:487 | — | Kakharov Orinbassar Maratuly | RU | unknown |
3924 | svchost.exe | 62.122.184.92:423 | — | LLC Baxet | RU | unknown |
3924 | svchost.exe | 45.143.201.238:423 | — | Tov E-rishennya | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
microsoft.com |
| whitelisted |
microsoft-com.mail.protection.outlook.com |
| whitelisted |
vanaheim.cn |
| malicious |
226.36.199.138.dnsbl.sorbs.net |
| unknown |
226.36.199.138.bl.spamcop.net |
| unknown |
226.36.199.138.zen.spamhaus.org |
| unknown |
226.36.199.138.sbl-xbl.spamhaus.org |
| unknown |
226.36.199.138.cbl.abuseat.org |
| unknown |
www.google.com |
| whitelisted |
226.36.199.138.in-addr.arpa |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3924 | svchost.exe | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Tofsee Successful Connection |
3020 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3924 | svchost.exe | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] Received IP address from server as result of HTTP request |
3924 | svchost.exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
3924 | svchost.exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |