File name:

Photo 018.exe

Full analysis: https://app.any.run/tasks/cbf8552f-33c7-41ab-8550-c761b28099d5
Verdict: Malicious activity
Analysis date: March 22, 2024, 09:23:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7254BC46F8C6EF326A56B2B9CE745D7E

SHA1:

6DC2B9DFF4EE9DDAE1A0DE72D8052EF355D8357B

SHA256:

0FE8C87EDCD0880ADB34D1686514FA286D029B4EB87590F86F34C8C3F2DF9FDE

SSDEEP:

12288:HsRC0dvzZjLLZ72OVjbiRIEUdLL1D1l14KAIFJADnRte6U8C0RecxvVGAyrW:MRC0dvzZjnZ7BNbiRIE831D1l1jAgqDD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Photo 018.exe (PID: 3956)
      • InstallFramework.exe (PID: 2672)
    • Changes appearance of the Explorer extensions

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Changes the autorun value in the registry

      • Photo 018.exe (PID: 3956)
  • SUSPICIOUS

    • Connects to FTP

      • Photo 018.exe (PID: 3956)
    • Reads the Internet Settings

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Connects to unusual port

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Reads security settings of Internet Explorer

      • Photo 018.exe (PID: 3956)
    • Executable content was dropped or overwritten

      • InstallFramework.exe (PID: 2672)
      • Photo 018.exe (PID: 3956)
    • Starts itself from another location

      • Photo 018.exe (PID: 3956)
  • INFO

    • Reads the computer name

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Checks supported languages

      • Photo 018.exe (PID: 3956)
      • InstallFramework.exe (PID: 2672)
      • Systeme.exe (PID: 1496)
    • Checks proxy server information

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Create files in a temporary directory

      • Photo 018.exe (PID: 3956)
      • InstallFramework.exe (PID: 2672)
    • Creates files or folders in the user directory

      • Photo 018.exe (PID: 3956)
    • Reads the machine GUID from the registry

      • Photo 018.exe (PID: 3956)
      • Systeme.exe (PID: 1496)
    • Creates files in the program directory

      • Photo 018.exe (PID: 3956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:03:22 08:39:05+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 73728
InitializedDataSize: 188416
UninitializedDataSize: -
EntryPoint: 0x1222e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.16
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: French
CharacterSet: Unicode
CompanyName: -
FileDescription: -
FileVersion: 1.00Qb
Version: 1.00Qb
LegalCopyright: -
WDVersion: 16
ProductName: Acad
ProductVersion: 1.00Qb
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start photo 018.exe installframework.exe systeme.exe

Process information

PID
CMD
Path
Indicators
Parent process
1496C:\ProgramData\Systeme\Systeme.exeC:\ProgramData\Systeme\Systeme.exe
Photo 018.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00Qb
Modules
Images
c:\programdata\systeme\systeme.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
2672"C:\Users\admin\AppData\Local\Temp\InstallFramework.exe" /REP="C:\Users\admin\AppData\Local\Temp\" /SILENTC:\Users\admin\AppData\Local\Temp\InstallFramework.exe
Photo 018.exe
User:
admin
Company:
PC SOFT
Integrity Level:
MEDIUM
Description:
PC SOFT - Executable auto-extractible
Exit code:
0
Version:
15.00Aa
Modules
Images
c:\users\admin\appdata\local\temp\installframework.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3956"C:\Users\admin\AppData\Local\Temp\Photo 018.exe" C:\Users\admin\AppData\Local\Temp\Photo 018.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Version:
1.00Qb
Modules
Images
c:\users\admin\appdata\local\temp\photo 018.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
Total events
3 273
Read events
3 235
Write events
28
Delete events
10

Modification events

(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\PC SOFT\WinDev\16.0\APPLI\Photo 018
Operation:writeName:LAST_FRAMEWORK
Value:
160057k
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47}
Operation:writeName:WpadDecisionReason
Value:
1
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47}
Operation:writeName:WpadDecisionTime
Value:
E2DFC7AB3A7CDA01
(PID) Process:(3956) Photo 018.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47}
Operation:writeName:WpadDecision
Value:
0
Executable files
47
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160action.dllexecutable
MD5:5A8A53BA79C88C593A0C5BF742C1B51A
SHA256:84DB0120A974A4149F3E99A247B65C93C71A2E269B638ED6CBEDED480E28D291
3956Photo 018.exeC:\Users\admin\AppData\Local\Temp\InstallFramework.exeexecutable
MD5:4152937F33475D31249CE919C323AFA3
SHA256:BE986D474F493ED6098760AAA958E86499F495E352242CE022FFF81B434F930F
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160com.dllexecutable
MD5:4D225127B75B51B44B830859560A9EF6
SHA256:8DE8B4FEB26470463F13BFB48AAAD601702B9963DCB36354A056763570E7B9F3
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160db.dllexecutable
MD5:FF71B65D39FCB54CF5BDEC1E38833BC4
SHA256:E22E591167FC5FFC4D5D18C1ADCD08F78B234FE5D906C78FA8583A8C5DADACD7
3956Photo 018.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\InstallFramework_160057k[1].exeexecutable
MD5:4152937F33475D31249CE919C323AFA3
SHA256:BE986D474F493ED6098760AAA958E86499F495E352242CE022FFF81B434F930F
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160barc.dllexecutable
MD5:F7B37B4A7077A65C9C00129F81DB429E
SHA256:917786738AD36FFBC20152EADB75A7702C6213155DBA3AD5DD87DAE10396C6F8
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160html.dllexecutable
MD5:DD30330BDDA28EFD4B04CC8764250F97
SHA256:23172A366F99EDBA0558C1F47CBE773B8A1BAF0C6CF1DE3F58FF77D11FDF2EF5
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160grv.dllexecutable
MD5:CF4FDF94A1432C464C65EEB7D32B0665
SHA256:4C07338833EA1FA0AF8813D70E32E4FF77228D54FFA14A543E309E35884D44CB
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160grf.dllexecutable
MD5:225462D5A1B347E3C66A7B8A59554513
SHA256:A310A5259D371F7EF38BDD97E7CD9F116D0C9FD08F4BC9F2B0FD4CD6E054E5AC
2672InstallFramework.exeC:\Users\admin\AppData\Local\Temp\wd160img.dllexecutable
MD5:313F7F25E83C9B91EAE811AA111731AC
SHA256:A541C2D1D60C974096127E949B11BA67E930D93CB10CC7879EB4222DDF30C675
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
2
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1496
Systeme.exe
GET
200
212.129.20.209:80
http://www.monip.org/
unknown
html
376 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3956
Photo 018.exe
141.94.100.106:21
framework.pcsoft.fr
OVH SAS
FR
unknown
3956
Photo 018.exe
141.94.100.106:50759
framework.pcsoft.fr
OVH SAS
FR
unknown
3956
Photo 018.exe
141.94.100.106:50295
framework.pcsoft.fr
OVH SAS
FR
unknown
1496
Systeme.exe
41.137.2.6:4900
MAROCCONNECT
MA
unknown
1496
Systeme.exe
212.129.20.209:80
www.monip.org
Online S.a.s.
FR
unknown

DNS requests

Domain
IP
Reputation
framework.pcsoft.fr
  • 141.94.100.106
  • 135.125.5.38
  • 51.89.20.151
  • 151.80.29.133
unknown
www.monip.org
  • 212.129.20.209
unknown

Threats

PID
Process
Class
Message
Misc activity
ET INFO .exe File requested over FTP
3956
Photo 018.exe
Misc activity
ET HUNTING PE EXE Download over raw TCP
No debug info