analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://wcdownloadercdn.lavasoft.com/4.9.2159.4024/WcInstaller.exe

Full analysis: https://app.any.run/tasks/e17f3ecb-fa9d-40fc-b116-50f52dfeb124
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 30, 2020, 02:57:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

226F71D1944DA1A22CC76C90F83A672B

SHA1:

C1141A2D2E9AEB6BF939F8553CA76A3F27E22EFB

SHA256:

1442D011BB030FB852CF9DC1BC0CB1FF9561B9C003EF602D9CCC7986454AB621

SSDEEP:

3:N1KJGDodXGpJEraRRojSJKVtiJOXLNn:CIAQujSJKnqOXLN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • WcInstaller.exe (PID: 3096)
      • WcInstaller.exe (PID: 2120)
      • WebCompanionInstaller.exe (PID: 3240)
    • Changes settings of System certificates

      • WebCompanionInstaller.exe (PID: 3240)
    • Drops executable file immediately after starts

      • WcInstaller.exe (PID: 2120)
    • Loads dropped or rewritten executable

      • WebCompanionInstaller.exe (PID: 3240)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 576)
      • iexplore.exe (PID: 1248)
      • WcInstaller.exe (PID: 2120)
    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 576)
      • iexplore.exe (PID: 1248)
      • WcInstaller.exe (PID: 2120)
    • Drops a file that was compiled in debug mode

      • WcInstaller.exe (PID: 2120)
    • Creates files in the program directory

      • WebCompanionInstaller.exe (PID: 3240)
    • Executed as Windows Service

      • PresentationFontCache.exe (PID: 2884)
    • Adds / modifies Windows certificates

      • WebCompanionInstaller.exe (PID: 3240)
    • Creates files in the user directory

      • WebCompanionInstaller.exe (PID: 3240)
    • Reads internet explorer settings

      • WebCompanionInstaller.exe (PID: 3240)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 1248)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1248)
    • Creates files in the user directory

      • iexplore.exe (PID: 576)
      • iexplore.exe (PID: 1248)
    • Application launched itself

      • iexplore.exe (PID: 1248)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1248)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1248)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1248)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start iexplore.exe iexplore.exe wcinstaller.exe no specs wcinstaller.exe webcompanioninstaller.exe presentationfontcache.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1248"C:\Program Files\Internet Explorer\iexplore.exe" "http://wcdownloadercdn.lavasoft.com/4.9.2159.4024/WcInstaller.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
576"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1248 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3096"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exeiexplore.exe
User:
admin
Company:
Lavasoft
Integrity Level:
MEDIUM
Description:
Web Companion Installer
Exit code:
3221226540
Version:
4.9.2159.4024
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\6z2bcoul\wcinstaller.exe
c:\systemroot\system32\ntdll.dll
2120"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exe
iexplore.exe
User:
admin
Company:
Lavasoft
Integrity Level:
HIGH
Description:
Web Companion Installer
Version:
4.9.2159.4024
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\6z2bcoul\wcinstaller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3240.\WebCompanionInstaller.exe --prodC:\Users\admin\AppData\Local\Temp\7zSEBD1.tmp\WebCompanionInstaller.exe
WcInstaller.exe
User:
admin
Company:
Lavasoft
Integrity Level:
HIGH
Description:
Web Companion
Version:
4.9.2159.4024
Modules
Images
c:\users\admin\appdata\local\temp\7zsebd1.tmp\webcompanioninstaller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2884C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exeservices.exe
User:
LOCAL SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
PresentationFontCache.exe
Version:
3.0.6920.4902 built by: NetFXw7
Modules
Images
c:\windows\microsoft.net\framework\v3.0\wpf\presentationfontcache.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
822
Read events
710
Write events
109
Delete events
3

Modification events

(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
2767834516
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30852804
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1248) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
16
Suspicious files
14
Text files
10
Unknown types
5

Dropped files

PID
Process
Filename
Type
1248iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFB6B044192FB03451.TMP
MD5:
SHA256:
1248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exe.jx2xhq9.partial:Zone.Identifier
MD5:
SHA256:
2120WcInstaller.exeC:\Users\admin\AppData\Local\Temp\7zSEBD1.tmp\ICSharpCode.SharpZipLib.dllexecutable
MD5:68DF4335C11F46996D44B3F3D5826EC0
SHA256:E221BB1D2AED232FEF5ABFE0DED4F746AAD56386864B7ADF7ACC2E8C2513067B
576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exe.jx2xhq9.partialexecutable
MD5:01786F165265356CC6DC225E2F8A66A8
SHA256:929A98388ABC0337AD9E5288D376206ACE4895E17A8849A6FB9A77766E5B6CEE
2120WcInstaller.exeC:\Users\admin\AppData\Local\Temp\7zSEBD1.tmp\en-US\WebCompanionInstaller.resources.dllexecutable
MD5:2B6282D1DAA31BAF43F363DC7E4DF952
SHA256:A92C8A1C496338959C172B8EFD7526E9BD3B298CA2A3DB8A73B9D1FEEB9429DE
2120WcInstaller.exeC:\Users\admin\AppData\Local\Temp\7zSEBD1.tmp\Newtonsoft.Json.dllexecutable
MD5:76FD63804600DCB527B40519E39AB492
SHA256:82BFCF11C544046B811FC0FB0FA44D3FD6C84E230776E9BFE1770EF44018582E
1248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\WcInstaller.exeexecutable
MD5:01786F165265356CC6DC225E2F8A66A8
SHA256:929A98388ABC0337AD9E5288D376206ACE4895E17A8849A6FB9A77766E5B6CEE
576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\WcInstaller[1].exeexecutable
MD5:01786F165265356CC6DC225E2F8A66A8
SHA256:929A98388ABC0337AD9E5288D376206ACE4895E17A8849A6FB9A77766E5B6CEE
2120WcInstaller.exeC:\Users\admin\AppData\Local\Temp\7zSEBD1.tmp\ru-RU\WebCompanionInstaller.resources.dllexecutable
MD5:36A209FCFC974DC7C1A6EE9BB4B4DEAF
SHA256:21D2F53CBCCFFB126E3B23DD7A3E64B5A1E19B1C5F54CF797A9AAC2C0548A1C5
1248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{D0B8CAAF-32B7-11EB-9CF6-12A9866C77DE}.datbinary
MD5:51B5F843D53782A60F645761D803DB99
SHA256:920A79B982DB66418D67B33C388488118AA8BD6098F161A858548865700AEEDA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
15
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
576
iexplore.exe
GET
200
104.18.87.101:80
http://wcdownloadercdn.lavasoft.com/4.9.2159.4024/WcInstaller.exe
US
executable
501 Kb
whitelisted
3240
WebCompanionInstaller.exe
GET
200
104.17.177.102:80
http://www.webcompanion.com/installer/consent_2?culture=en&hp=1&se=1
US
html
1.33 Kb
malicious
3240
WebCompanionInstaller.exe
POST
200
64.18.87.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
1248
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1248
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1248
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1248
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
471 b
whitelisted
3240
WebCompanionInstaller.exe
GET
200
209.197.3.24:80
http://code.jquery.com/jquery-1.11.2.min.js
US
text
32.4 Kb
whitelisted
3240
WebCompanionInstaller.exe
POST
200
64.18.87.81:80
http://wc-update-service.lavasoft.com/update.asmx
CA
xml
1.45 Kb
whitelisted
3240
WebCompanionInstaller.exe
GET
200
104.17.178.102:80
http://webcompanion.com/installer/css/styles.css?1606705096
US
text
928 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1248
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1248
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3240
WebCompanionInstaller.exe
64.18.87.81:80
wc-tracking.lavasoft.com
COGECODATA
CA
unknown
576
iexplore.exe
104.18.87.101:80
wcdownloadercdn.lavasoft.com
Cloudflare Inc
US
shared
64.18.87.82:80
wc-tracking.lavasoft.com
COGECODATA
CA
unknown
3240
WebCompanionInstaller.exe
104.17.177.102:80
www.webcompanion.com
Cloudflare Inc
US
shared
1248
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted
3240
WebCompanionInstaller.exe
104.17.178.102:80
www.webcompanion.com
Cloudflare Inc
US
shared
3240
WebCompanionInstaller.exe
209.197.3.24:80
code.jquery.com
Highwinds Network Group, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
wcdownloadercdn.lavasoft.com
  • 104.18.87.101
  • 104.18.88.101
whitelisted
wc-tracking.lavasoft.com
  • 64.18.87.82
  • 64.18.87.81
whitelisted
wc-update-service.lavasoft.com
  • 64.18.87.81
  • 64.18.87.82
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.webcompanion.com
  • 104.17.177.102
  • 104.17.178.102
malicious
webcompanion.com
  • 104.17.178.102
  • 104.17.177.102
malicious
code.jquery.com
  • 209.197.3.24
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

PID
Process
Class
Message
576
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
WebCompanionInstaller.exe
Detecting windows culture
WebCompanionInstaller.exe
11/30/2020 2:58:04 AM :-> Starting installer 4.9.2159.4024 with: .\WebCompanionInstaller.exe --prod, Run as admin: True