| File name: | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895 |
| Full analysis: | https://app.any.run/tasks/f01e94b5-5ac0-4c80-9dee-9b0d2a5d7371 |
| Verdict: | Malicious activity |
| Analysis date: | February 22, 2020, 05:47:00 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | DD289D3F0A60A23541B80FE0D06711D7 |
| SHA1: | 79C11E700217F3FAAD3AB32F16D4BC4F2DF38DEC |
| SHA256: | 14DF1270DA75454C4B10173CD6D201D7B278BAAED38EA6159A18413735BBC895 |
| SSDEEP: | 6144:RrUydQ/CtrSmvSVfM06oOCBi0zN1Vb3dRr2cGPPr0c2+9K:RIyug3K6HuiqN1Vb3dRrLy129 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:09:11 07:56:16+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 12 |
| CodeSize: | 157696 |
| InitializedDataSize: | 8747520 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3b15 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 11-Sep-2018 05:56:16 |
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 8 |
| Time date stamp: | 11-Sep-2018 05:56:16 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00837000 | 0x00042E38 | 0x00043000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.99974 |
.rdata | 0x00028000 | 0x0000A96A | 0x0000AA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.33625 |
.data | 0x00033000 | 0x00803EA0 | 0x00001C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.25681 |
.cetapex | 0x0087A000 | 0x00000400 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.zajoca | 0x0087B000 | 0x00001800 | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x0087D000 | 0x00002ED0 | 0x00003000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.05303 |
.reloc | 0x00880000 | 0x000020EC | 0x00002200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.55766 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.55008 | 2216 | UNKNOWN | UNKNOWN | RT_ICON |
2 | 6.00825 | 1736 | UNKNOWN | UNKNOWN | RT_ICON |
3 | 5.48237 | 4264 | UNKNOWN | UNKNOWN | RT_ICON |
126 | 2.45849 | 48 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
217 | 3.19282 | 112 | UNKNOWN | UNKNOWN | RT_ACCELERATOR |
346 | 2.32193 | 10 | UNKNOWN | UNKNOWN | UNKNOWN |
842 | 4.5717 | 3060 | UNKNOWN | UNKNOWN | WITIXUZULUJIXAJULETELIWIVU |
ADVAPI32.dll |
KERNEL32.dll |
WINHTTP.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3160 | C:\Users\admin\AppData\Local\09e4e902-dcc5-43f9-b514-77ac862b1428\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe --Task | C:\Users\admin\AppData\Local\09e4e902-dcc5-43f9-b514-77ac862b1428\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3212 | "C:\Users\admin\AppData\Local\Temp\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe" --Admin IsNotAutoStart IsNotTask | C:\Users\admin\AppData\Local\Temp\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3448 | "C:\Users\admin\AppData\Local\Temp\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe" | C:\Users\admin\AppData\Local\Temp\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3512 | icacls "C:\Users\admin\AppData\Local\09e4e902-dcc5-43f9-b514-77ac862b1428" /deny *S-1-1-0:(OI)(CI)(DE,DC) | C:\Windows\system32\icacls.exe | — | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDD4EEAE6000AC7F40C3802C171E30148030C072 |
| Operation: | write | Name: | Blob |
Value: 0F0000000100000014000000391BE92883D52509155BFEAE27B9BD340170B76B030000000100000014000000CDD4EEAE6000AC7F40C3802C171E30148030C0720B000000010000004A0000004D006900630072006F0073006F0066007400200052006F006F007400200043006500720074006900660069006300610074006500200041007500740068006F007200690074007900000069000000010000000E000000300C060A2B0601040182373C030220000000010000009D0500003082059930820381A003020102021079AD16A14AA0A5AD4C7358F407132E65300D06092A864886F70D0101050500305F31133011060A0992268993F22C6401191603636F6D31193017060A0992268993F22C64011916096D6963726F736F6674312D302B060355040313244D6963726F736F667420526F6F7420436572746966696361746520417574686F72697479301E170D3031303530393233313932325A170D3231303530393233323831335A305F31133011060A0992268993F22C6401191603636F6D31193017060A0992268993F22C64011916096D6963726F736F6674312D302B060355040313244D6963726F736F667420526F6F7420436572746966696361746520417574686F7269747930820222300D06092A864886F70D01010105000382020F003082020A0282020100F35DFA8067D45AA7A90C2C9020D035083C7584CDB707899C89DADECEC360FA91685A9E94712918767CC2E0C82576940E58FA043436E6DFAFF780BAE9580B2B93E59D05E3772291F734643C22911D5EE10990BC14FEFC755819E179B70792A3AE885908D89F07CA0358FC68296D32D7D2A8CB4BFCE10B48324FE6EBB8AD4FE45C6F139499DB95D575DBA81AB79491B4775BF5480C8F6A797D1470047D6DAF90F5DA70D847B7BF9B2F6CE705B7E11160AC7991147CC5D6A6E4E17ED5C37EE592D23C00B53682DE79E16DF3B56EF89F33C9CB527D739836DB8BA16BA295979BA3DEC24D26FF0696672506C8E7ACE4EE1233953199C835084E34CA7953D5B5BE6332594036C0A54E044D3DDB5B0733E458BFEF3F5364D842593557FD0F457C24044D9ED6387411972290CE684474926FD54B6FB086E3C73642A0D0FCC1C05AF9A361B9304771960A16B091C04295EF107F286AE32A1FB1E4CD033F777104C720FC490F1D4588A4D7CB7E88AD8E2DEC45DBC45104C92AFCEC869E9A11975BDECE5388E6E2B7FDAC95C22840DBEF0490DF813339D9B245A5238706A5558931BB062D600E41187D1F2EB597CB11EB15D524A594EF151489FD4B73FA325BFCD13300F95962700732EA2EAB402D7BCADD21671B30998F16AA23A841D1B06E119B36C4DE40749CE15865C1601E7A5B38C88FBB04267CD41640E5B66B6CAA86FD00BFCEC1350203010001A351304F300B0603551D0F0404030201C6300F0603551D130101FF040530030101FF301D0603551D0E041604140EAC826040562797E52513FC2AE10A539559E4A4301006092B06010401823715010403020100300D06092A864886F70D01010505000382020100C5114D033A60DD5D5211778FB2BB36C8B205BFB4B7A8D8209D5C1303B61C22FA061335B6C863D49A476F2657D255F104B1265FD6A95068A0BCD2B86ECCC3E9ACDF19CD78AC5974AC663436C41B3E6C384C330E30120DA326FE515300FFAF5A4E840D0F1FE46D052E4E854B8D6C336F54D264ABBF50AF7D7A39A037ED63030FFC1306CE1636D4543B951B51623AE54D17D40539929A27A85BAABDECBBBEE3208960716C56B3A513D06D0E237E9503ED683DF2D863B86B4DB6E830B5E1CA944BF7A2AA5D9930B23DA7C2516C28200124272B4B00B79D116B70BEB21082BC0C9B68D08D3B2487AA9928729D335F5990BDF5DE939E3A625A3439E288551DB906B0C1896B2DD769C319123684D0C9A0DAFF2F6978B2E57ADAEBD70CC0F7BD6317B8391338A2365B7BF285566A1D6462C138E2AABF5166A294F5129C6622106BF2B730922DF229F03D3B144368A2F19C2937CBCE3820256D7C67F37E24122403088147ECA59E97F518D7CFBBD5EF7696EFFDCEDB569D95A042F99758E1D73122D35F59E63E6E2200EA4384B625DBD9F3085668C0646B1D7CECB693A262576E2ED8E7588FC4314926DDDE293587F53071705B143C69BD89127DEB2EA3FED87F9E825A520A2BC1432BD930889FC810FB898DE6A18575337E6C9EDB7313646269A52F7DCA966D9FF8044D30923D6E211421C93DE0C3FD8A6B9D4AFDD1A19D9943773FB0DA | |||
| (PID) Process: | (3448) 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDD4EEAE6000AC7F40C3802C171E30148030C072 |
| Operation: | delete key | Name: | |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Temp\CabB03D.tmp | — | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Temp\TarB03E.tmp | — | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\geo[1].json | — | |
MD5:— | SHA256:— | |||
| 3212 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Temp\Cab283C.tmp | — | |
MD5:— | SHA256:— | |||
| 3212 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Temp\Tar283D.tmp | — | |
MD5:— | SHA256:— | |||
| 3212 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\geo[1].json | — | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9B | der | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D | binary | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\Local\09e4e902-dcc5-43f9-b514-77ac862b1428\14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | executable | |
MD5:— | SHA256:— | |||
| 3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D | der | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D | US | der | 727 b | whitelisted |
3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
3448 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | 151.139.128.14:80 | ocsp.usertrust.com | Highwinds Network Group, Inc. | US | suspicious |
3212 | 14df1270da75454c4b10173cd6d201d7b278baaed38ea6159a18413735bbc895.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
Domain | IP | Reputation |
|---|---|---|
api.2ip.ua |
| shared |
ocsp.usertrust.com |
| whitelisted |
texet2.ug |
| unknown |
texet1.ug |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1052 | svchost.exe | A Network Trojan was detected | ET POLICY External IP Address Lookup DNS Query |