File name: | hardware.exe |
Full analysis: | https://app.any.run/tasks/3e73ebee-123a-47a9-8ba6-56054d77dc53 |
Verdict: | Malicious activity |
Analysis date: | December 06, 2022, 01:32:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 28260A35DEADF16EB01FA64EB7901F38 |
SHA1: | 014D9FF8BB00F65D5B81E4F38951D447578CBA13 |
SHA256: | 13BD765E29280E0DA7F6F4CB6498ADCB777A28266A513DEB4998B2E0C3AB3461 |
SSDEEP: | 98304:S4GqXn/oOWMvX++y8GHEvsiWyERiS7I4qaF9fOgx:SeX/oOWMvXxCGPYRiS7IzaF9fOg |
.exe | | | Win64 Executable (generic) (76.4) |
.exe | | | Win32 Executable (generic) (12.4) |
.exe | | | Generic Win/DOS Executable (5.5) |
.exe | | | DOS Executable Generic (5.5) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2022-Oct-13 06:40:39 |
Detected languages: |
|
CompanyName: | virtualhardwares |
FileDescription: | virtualhardwares |
FileVersion: | 1, 0, 0, 0 |
InternalName: | virtualhardwares.exe |
LegalCopyright: | (C) virtualhardwares All Rights Reserved |
OriginalFilename: | virtualhardwares |
ProductName: | virtualhardwares |
ProductVersion: | 1, 0, 0, 0 |
e_magic: | MZ |
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | 0 |
e_cparhdr: | 4 |
e_minalloc: | 0 |
e_maxalloc: | 65535 |
e_ss: | 0 |
e_sp: | 184 |
e_csum: | 0 |
e_ip: | 0 |
e_cs: | 0 |
e_ovno: | 0 |
e_oemid: | 0 |
e_oeminfo: | 0 |
e_lfanew: | 256 |
Signature: | PE |
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 7 |
TimeDateStamp: | 2022-Oct-13 06:40:39 |
PointerToSymbolTable: | 0 |
NumberOfSymbols: | 0 |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 4096 | 681294 | 0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
.rdata | 688128 | 108054 | 0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
.data | 798720 | 112900 | 0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.vmp0 | 913408 | 2095117 | 0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.vmp1 | 3010560 | 4383661 | 4383744 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.88718 |
.reloc | 7397376 | 288 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.65815 |
.rsrc | 7401472 | 1685093 | 20992 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.21773 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.34507 | 16936 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
5 | 1.91924 | 20 | Latin 1 / Western European | Chinese - PRC | RT_GROUP_ICON |
10 | 0 | 21895 | Latin 1 / Western European | Chinese - PRC | XML |
11 | 0 | 463 | Latin 1 / Western European | Chinese - PRC | XML |
13 | 0 | 1302 | Latin 1 / Western European | Chinese - PRC | XML |
14 | 0 | 772 | Latin 1 / Western European | Chinese - PRC | XML |
15 | 0 | 8361 | Latin 1 / Western European | Chinese - PRC | XML |
100 | 0 | 17212 | Latin 1 / Western European | Chinese - PRC | PNG |
106 | 0 | 225280 | Latin 1 / Western European | Chinese - PRC | RC_DATA |
107 | 0 | 238592 | Latin 1 / Western European | Chinese - PRC | RC_DATA |
ADVAPI32.dll |
COMCTL32.dll |
COMDLG32.dll |
GDI32.dll |
IMM32.dll |
IPHLPAPI.DLL |
KERNEL32.dll |
KERNEL32.dll (#2) |
KERNEL32.dll (#3) |
OLEAUT32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1756 | "C:\Users\admin\AppData\Local\Temp\hardware.exe" | C:\Users\admin\AppData\Local\Temp\hardware.exe | — | Explorer.EXE | |||||||||||
User: admin Company: virtualhardwares Integrity Level: MEDIUM Description: virtualhardwares Exit code: 3221226540 Version: 1, 0, 0, 0 Modules
| |||||||||||||||
2988 | "C:\Users\admin\AppData\Local\Temp\hardware.exe" | C:\Users\admin\AppData\Local\Temp\hardware.exe | Explorer.EXE | ||||||||||||
User: admin Company: virtualhardwares Integrity Level: HIGH Description: virtualhardwares Version: 1, 0, 0, 0 Modules
|
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000003D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2988) hardware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47} |
Operation: | write | Name: | WpadDecisionReason |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2988 | hardware.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\hardware[1].htm | html | |
MD5:B051EA1ABE78EE1412AB0C947F988D0E | SHA256:9071A900A210DF090C36EF05B1286EFA04ACC3FA34E9CFE8A2F50C4EA1998B25 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B | der | |
MD5:D15110B33BB15BD994203CCF22BB7F8D | SHA256:C08D2396DEF02D5BF1858B2117602F0E8E56B93C02B4E8B649DDCCFE70989765 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B | binary | |
MD5:506A1BEF3D9E99155B2DB20801FE8B73 | SHA256:75AB9CC3BBB25384BDC1BBF3D4571F12565C0029CBA9E423114453F9D3B0A035 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | compressed | |
MD5:F7DCB24540769805E5BB30D193944DCE | SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA | |||
2988 | hardware.exe | C:\Users\admin\AppData\Local\Temp\GameHardware.ini | text | |
MD5:E9894CBFAD66B985051251997EAA3A6B | SHA256:290CC0A29273C17CC859D6AE0869002CEC0CC403058909FBDDE28FF45F408A09 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 | der | |
MD5:C5C67AFD728049F88AB749B6479E2B1F | SHA256:350135C983E77CFB67362AF15A9965E16CC1CE658AA933558710451A3D1AFB58 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:DC97802BDF5A57C8E7335CD1B4C68D7B | SHA256:5C427AE7D29A1D22192C1348DBAA750FD3F7B9AE59CEA06AD53FF6AE2E0AD70A | |||
2988 | hardware.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\E1C7BUEG.txt | text | |
MD5:24365DC21331E23793E638942D1B19D8 | SHA256:E09B2910B9F4D1E207B37ECEB5331BC995BF4B42F226D6F6D4F6732A1EB0EE60 | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B | der | |
MD5:79A1F6582EE8151A349E16206F1501C7 | SHA256:2FF7E7A2DD453CCA159B021A9087A67EF4704AA4B0A4DF90F7F2125913F493AF | |||
2988 | hardware.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 | binary | |
MD5:6CCD798FB22D219C2F24409675C4F0AD | SHA256:700AE9492C5965B4885C7D096C825084B0A52AD430262F667A81C6A9C60537C5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2988 | hardware.exe | GET | 200 | 43.129.214.10:80 | http://www.virtualhardwares.com/2022/hardware.html | JP | html | 1.44 Kb | malicious |
2988 | hardware.exe | GET | 404 | 43.129.214.10:80 | http://www.virtualhardwares.com/2022/hardware.png | JP | html | 555 b | malicious |
2988 | hardware.exe | HEAD | 301 | 47.74.138.66:80 | http://www.aliyun.com/ | US | — | — | suspicious |
2988 | hardware.exe | GET | 200 | 209.197.3.8:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?19988b11ef01e9e3 | US | compressed | 4.70 Kb | whitelisted |
2988 | hardware.exe | GET | 200 | 104.18.21.226:80 | http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D | US | der | 1.41 Kb | whitelisted |
2988 | hardware.exe | GET | 200 | 104.18.21.226:80 | http://ocsp.globalsign.com/gsrsaovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBRrcGT%2BanRD3C1tW3nsrKeuXC7DPwQU%2BO9%2F8s14Z6jeb48kjYjxhwMCs%2BsCDEQXzobvguxpIcxvaA%3D%3D | US | der | 1.40 Kb | whitelisted |
2988 | hardware.exe | GET | 200 | 104.18.20.226:80 | http://ocsp2.globalsign.com/rootr3/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDQHuXyId%2FGI71DM6hVc%3D | US | der | 1.40 Kb | whitelisted |
2988 | hardware.exe | HEAD | 301 | 47.74.138.66:80 | http://www.aliyun.com/ | US | — | — | suspicious |
2988 | hardware.exe | HEAD | 301 | 47.74.138.66:80 | http://www.aliyun.com/ | US | — | — | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2988 | hardware.exe | 47.74.138.66:80 | www.aliyun.com | Alibaba US Technology Co., Ltd. | SG | unknown |
2988 | hardware.exe | 103.235.46.191:443 | hm.baidu.com | Beijing Baidu Netcom Science and Technology Co., Ltd. | HK | suspicious |
2988 | hardware.exe | 43.129.214.10:80 | www.qqgamegroup.com | Tencent Building, Kejizhongyi Avenue | HK | unknown |
2988 | hardware.exe | 8.210.51.125:80 | www.qqgamegroup.com | Alibaba US Technology Co., Ltd. | HK | malicious |
2988 | hardware.exe | 209.197.3.8:80 | ctldl.windowsupdate.com | STACKPATH-CDN | US | suspicious |
2988 | hardware.exe | 104.18.21.226:80 | ocsp.globalsign.com | CLOUDFLARENET | — | shared |
2988 | hardware.exe | 104.18.20.226:80 | ocsp.globalsign.com | CLOUDFLARENET | — | shared |
Domain | IP | Reputation |
---|---|---|
www.qqgamegroup.com |
| malicious |
www.virtualhardwares.com |
| malicious |
hm.baidu.com |
| whitelisted |
www.aliyun.com |
| suspicious |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.globalsign.com |
| whitelisted |
ocsp2.globalsign.com |
| whitelisted |