| download: | setup.exe |
| Full analysis: | https://app.any.run/tasks/0b5e8b50-0eb4-4ed3-a435-e058e8b67ea3 |
| Verdict: | Malicious activity |
| Analysis date: | April 13, 2020, 22:15:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | E96DD956BC2159FF1D073876EF5D4E58 |
| SHA1: | A0DA0D7C8394D646EB5A0F64BE14397235F22704 |
| SHA256: | 14636B7FC900E2BE3FEE5ABB409E3B7A3CDF5A99107BF6D7DCBCCE4B26EE0D34 |
| SSDEEP: | 196608:Mem6/gb2N3s9m35DylYLan8CmD5zpX9o38vR/dnG0sb9iMly9ssSGz8EQgCPhtv:MelYyVYm3RLaQ5zpNq8NdnExiMw+P4QD |
| .exe | | | Win32 Executable Delphi generic (57.2) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (18.2) |
| .exe | | | Win16/32 Executable Delphi generic (8.3) |
| .exe | | | Generic Win/DOS Executable (8) |
| .exe | | | DOS Executable Generic (8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:04:08 14:51:37+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 69120 |
| InitializedDataSize: | 104960 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x117e4 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.1.6.50 |
| ProductVersionNumber: | 2.1.6.50 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | ASCII |
| Comments: | 此安装程序由 Inno Setup 构建。 |
| CompanyName: | EagleGet |
| FileDescription: | EagleGet Setup |
| FileVersion: | 2.1.6.50 |
| LegalCopyright: | |
| ProductName: | EagleGet |
| ProductVersion: | 2.1.6.50 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 08-Apr-2016 12:51:37 |
| Detected languages: |
|
| Comments: | 此安装程序由 Inno Setup 构建。 |
| CompanyName: | EagleGet |
| FileDescription: | EagleGet Setup |
| FileVersion: | 2.1.6.50 |
| LegalCopyright: | - |
| ProductName: | EagleGet |
| ProductVersion: | 2.1.6.50 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0050 |
| Pages in file: | 0x0002 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x000F |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x001A |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000100 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 9 |
| Time date stamp: | 08-Apr-2016 12:51:37 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0000FD10 | 0x0000FE00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.38464 |
.itext | 0x00011000 | 0x00000F6C | 0x00001000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.74547 |
.data | 0x00012000 | 0x00000CB4 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.35781 |
.bss | 0x00013000 | 0x000056C0 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00019000 | 0x00000E04 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.59781 |
.tls | 0x0001A000 | 0x00000008 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0001B000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.204488 |
.reloc | 0x0001C000 | 0x0000137C | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0 |
.rsrc | 0x0001E000 | 0x00017988 | 0x00017A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.50148 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.08452 | 1444 | Latin 1 / Western European | Chinese - PRC | RT_MANIFEST |
2 | 5.68272 | 9640 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
3 | 5.71503 | 4264 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
4 | 5.90552 | 2440 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
5 | 5.84275 | 1128 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
4091 | 2.56031 | 104 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4092 | 3.25287 | 212 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4093 | 3.26919 | 164 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4094 | 3.33268 | 684 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4095 | 3.34579 | 844 | Latin 1 / Western European | UNKNOWN | RT_STRING |
advapi32.dll |
comctl32.dll |
kernel32.dll |
oleaut32.dll |
user32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1016 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3128 CREDAT:275457 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 1252 | "C:\Users\admin\AppData\Local\Temp\is-6DMNO.tmp\setup.tmp" /SL5="$A0204,9993427,175104,C:\Users\admin\AppData\Local\Temp\setup.exe" /SPAWNWND=$701CA /NOTIFYWND=$C0202 | C:\Users\admin\AppData\Local\Temp\is-6DMNO.tmp\setup.tmp | setup.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 安装/卸载 Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 1492 | C:\Program Files\EagleGet\test_wpf.exe | C:\Program Files\EagleGet\test_wpf.exe | — | net_updater32.exe | |||||||||||
User: admin Company: Luminati Networks Ltd. Integrity Level: HIGH Description: test_wpf Exit code: 0 Version: 1.172.289 Modules
| |||||||||||||||
| 1840 | "C:\Program Files\Opera\Opera.exe" "C:\Program Files\EagleGet\addon\eagleget_cext@eagleget.com.crx" | C:\Program Files\Opera\Opera.exe | setup.tmp | ||||||||||||
User: admin Company: Opera Software Integrity Level: HIGH Description: Opera Internet Browser Exit code: 0 Version: 1748 Modules
| |||||||||||||||
| 1880 | "C:\Program Files\EagleGet\EGMonitor.exe" /svc | C:\Program Files\EagleGet\EGMonitor.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Description: EGMonitor Exit code: 4294967286 Version: 2, 0, 3, 6 Modules
| |||||||||||||||
| 2140 | "C:\Users\admin\AppData\Local\Temp\setup.exe" | C:\Users\admin\AppData\Local\Temp\setup.exe | explorer.exe | ||||||||||||
User: admin Company: EagleGet Integrity Level: MEDIUM Description: EagleGet Setup Exit code: 0 Version: 2.1.6.50 Modules
| |||||||||||||||
| 2252 | "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\EagleGet\eagleSniffer.dll" | C:\Windows\system32\regsvr32.exe | — | setup.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2276 | "C:\Program Files\EagleGet\EagleGet.exe" | C:\Program Files\EagleGet\EagleGet.exe | setup.tmp | ||||||||||||
User: admin Company: EagleGet.com Integrity Level: HIGH Description: EagleGet Free Downloader Exit code: 0 Version: 2.1.6.50 Modules
| |||||||||||||||
| 2660 | "C:\Program Files\EagleGet\EGMonitor.exe" /installnewtab | C:\Program Files\EagleGet\EGMonitor.exe | — | setup.tmp | |||||||||||
User: admin Integrity Level: HIGH Description: EGMonitor Exit code: 0 Version: 2, 0, 3, 6 Modules
| |||||||||||||||
| 2720 | "C:\Program Files\EagleGet\EGMonitor.exe" /install | C:\Program Files\EagleGet\EGMonitor.exe | setup.tmp | ||||||||||||
User: admin Integrity Level: HIGH Description: EGMonitor Exit code: 0 Version: 2, 0, 3, 6 Modules
| |||||||||||||||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: E40400003664C714E111D601 | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: 1D336523094D24CD937F8315E1C212E7E2F47AFF2DC4E3C887375D209A70168E | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | delete value | Name: | Enable Browser Extensions |
Value: yes | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | Enable Browser Extensions |
Value: ye뼀栣Ą | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\NativeMessagingHosts\eagleget |
| Operation: | write | Name: | |
Value: C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\firefox.json | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Mozilla\NativeMessagingHosts\eagleget |
| Operation: | write | Name: | |
Value: C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\firefox.json | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 68.0.1\extensions |
| Operation: | write | Name: | eagleget_ffext@eagleget.com |
Value: C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\addon\eagleget_ffext@eagleget.com.xpi | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFiles0000 |
Value: C:\Program Files\EagleGet\CallbackCtrl.dll | |||
| (PID) Process: | (1252) setup.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFilesHash |
Value: 5F8C230472066AFB2ACC12ED926711060B68270FEA84129F539D755A78D76E50 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3052 | setup.exe | C:\Users\admin\AppData\Local\Temp\is-6DMNO.tmp\setup.tmp | executable | |
MD5:EB42E5720E09CD014694A22C86929F5E | SHA256:4DC2D414277E497490D2009F370051298BCCAA649D0A335B064269A0BB9BBBF3 | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\bg_license.png | image | |
MD5:582FDA5363B76D1D022FFC35DC25D3E7 | SHA256:8D8698834690E763D378E7D4353B3B3353E01047C927AF4E66F829C61DC448B8 | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\sqlite3.dll | executable | |
MD5:EE7E9A4CB1BC952E356145EB6306A6EE | SHA256:50F7C306C28A22CD277DAFFA5D3F28AC7CB4C561B260AA8C4626587F8E82F103 | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\botva2.dll | executable | |
MD5:0177746573EED407F8DCA8A9E441AA49 | SHA256:A4B61626A1626FDABEC794E4F323484AA0644BAA1C905A5DCF785DC34564F008 | |||
| 2140 | setup.exe | C:\Users\admin\AppData\Local\Temp\is-7A0RJ.tmp\setup.tmp | executable | |
MD5:EB42E5720E09CD014694A22C86929F5E | SHA256:4DC2D414277E497490D2009F370051298BCCAA649D0A335B064269A0BB9BBBF3 | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\btn_complete.png | image | |
MD5:AF03B33CB3B3FCCE4B69E62CD1078DC6 | SHA256:A37B5AF0B4EC0C9598E0FD6570F4B4F60A4D9D9D10E589B93F509A60F04ACE55 | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Roaming\EagleGet\configs\data.db-journal | — | |
MD5:— | SHA256:— | |||
| 1252 | setup.tmp | C:\Program Files\EagleGet\is-7UR3L.tmp | — | |
MD5:— | SHA256:— | |||
| 1252 | setup.tmp | C:\Users\admin\AppData\Local\Temp\is-BP9P5.tmp\btn_newtab.png | image | |
MD5:9C8EF326AFEC7D1E63191BAC72200458 | SHA256:5EFC17C4A24289347B512967A7886E658433C78D7025AA99DCD74E1DDF5BF6A0 | |||
| 1252 | setup.tmp | C:\Program Files\EagleGet\is-Q1UOH.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1016 | iexplore.exe | GET | 301 | 104.28.1.36:80 | http://www.eagleget.com/welcome | US | — | — | malicious |
1016 | iexplore.exe | GET | 200 | 104.28.1.36:80 | http://www.eagleget.com/wp-content/themes/one-page-express/customizer/kirki/assets/css/kirki-styles.css | US | — | — | malicious |
2764 | net_updater32.exe | GET | 200 | 104.28.1.36:80 | http://admin.eagleget.com/latest/EagleGet-Icon.png | US | image | 35.4 Kb | malicious |
1252 | setup.tmp | POST | 200 | 104.28.1.36:80 | http://admin.eagleget.com/analytics/lg.php? | US | — | — | malicious |
2276 | EagleGet.exe | GET | 200 | 167.114.35.160:80 | http://dl.eagleget.com/report/check.php?md5= | CA | text | 141 b | malicious |
1840 | Opera.exe | GET | 200 | 93.184.220.29:80 | http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl | US | der | 564 b | whitelisted |
2276 | EagleGet.exe | GET | 200 | 104.28.1.36:80 | http://admin.eagleget.com/update/autoup.php?version=2.1.6.50 | US | text | 18 b | malicious |
2276 | EagleGet.exe | GET | 200 | 104.28.1.36:80 | http://admin.eagleget.com/update/filehosting.php?md5=643ad317ba9d4a015b89087d701bafac | US | text | 831 b | malicious |
1016 | iexplore.exe | GET | 200 | 104.28.1.36:80 | http://www.eagleget.com/wp-content/themes/one-page-express/style.css?ver=1.2.8 | US | text | 11.5 Kb | malicious |
1016 | iexplore.exe | GET | 200 | 104.28.1.36:80 | http://www.eagleget.com/welcome-to-eagleget/ | US | html | 4.57 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2764 | net_updater32.exe | 162.125.66.1:443 | www.dropbox.com | Dropbox, Inc. | DE | shared |
2764 | net_updater32.exe | 34.206.78.88:443 | perr.lum-sdk.io | Amazon.com, Inc. | US | suspicious |
2764 | net_updater32.exe | 23.21.154.58:443 | perr.lum-sdk.io | Amazon.com, Inc. | US | suspicious |
2764 | net_updater32.exe | 138.68.222.242:80 | 138-68-222-242.l-cdn.com | Digital Ocean, Inc. | US | unknown |
2764 | net_updater32.exe | 104.28.1.36:80 | admin.eagleget.com | Cloudflare Inc | US | shared |
2764 | net_updater32.exe | 68.183.153.117:80 | 68-183-153-117.l-cdn.com | DSL Extreme | US | unknown |
2844 | net_updater32.exe | 162.125.66.1:443 | www.dropbox.com | Dropbox, Inc. | DE | shared |
2844 | net_updater32.exe | 34.206.78.88:443 | perr.lum-sdk.io | Amazon.com, Inc. | US | suspicious |
2844 | net_updater32.exe | 162.125.66.6:443 | ucb2e8fcf774f4e8904d450befd7.dl.dropboxusercontent.com | Dropbox, Inc. | DE | shared |
1252 | setup.tmp | 104.28.1.36:80 | admin.eagleget.com | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
|---|---|---|
www.dropbox.com |
| shared |
perr.lum-sdk.io |
| suspicious |
perr.l-err.biz |
| suspicious |
perr.l-agent.me |
| suspicious |
138-68-222-242.l-cdn.com |
| unknown |
admin.eagleget.com |
| malicious |
68-183-153-117.l-cdn.com |
| unknown |
ucb2e8fcf774f4e8904d450befd7.dl.dropboxusercontent.com |
| suspicious |
104-248-53-74.l-cdn.com |
| unknown |
certs.opera.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1052 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
2764 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2764 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2764 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2844 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2844 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2844 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2740 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2740 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2740 | net_updater32.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |