File name: | CC Checker -AcTeam-.exe |
Full analysis: | https://app.any.run/tasks/3d2ba1e8-aadc-40a7-aa2b-91a950d4a67e |
Verdict: | Malicious activity |
Analysis date: | December 05, 2022, 18:25:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | F045688821C95892F36B1F1FB81C3DAD |
SHA1: | E4FB3608A2ABAB3A79AE92557C63147ACFC5B195 |
SHA256: | 151CEEA1A97415F8CE6BA897FB80E72B11B1C8BEF9D48968BBEFBD34199859AC |
SSDEEP: | 49152:ABRNlVlypZAz25Vq3pYsq6wZKbbW5Etx6TbxEsPAdZkdqc:a/lgAz25V+qpZKGuX6T9jskdqc |
.exe | | | Win64 Executable (generic) (64.6) |
.dll | | | Win32 Dynamic Link Library (generic) (15.4) |
.exe | | | Win32 Executable (generic) (10.5) |
.exe | | | Generic Win/DOS Executable (4.6) |
.exe | | | DOS Executable Generic (4.6) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2022-Mar-03 13:15:57 |
Debug artifacts: |
|
e_magic: | MZ |
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | 0 |
e_cparhdr: | 4 |
e_minalloc: | 0 |
e_maxalloc: | 65535 |
e_ss: | 0 |
e_sp: | 184 |
e_csum: | 0 |
e_ip: | 0 |
e_cs: | 0 |
e_ovno: | 0 |
e_oemid: | 0 |
e_oeminfo: | 0 |
e_lfanew: | 272 |
Signature: | PE |
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 6 |
TimeDateStamp: | 2022-Mar-03 13:15:57 |
PointerToSymbolTable: | 0 |
NumberOfSymbols: | 0 |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 4096 | 203740 | 203776 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.71296 |
.rdata | 208896 | 44736 | 45056 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.26161 |
.data | 253952 | 149280 | 4096 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.38746 |
.didat | 405504 | 400 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.33273 |
.rsrc | 409600 | 57424 | 57856 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.80217 |
.reloc | 471040 | 9020 | 9216 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.62301 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.97409 | 1384 | Latin 1 / Western European | UNKNOWN | RT_ICON |
2 | 5.10026 | 2216 | Latin 1 / Western European | UNKNOWN | RT_ICON |
3 | 5.25868 | 3752 | Latin 1 / Western European | UNKNOWN | RT_ICON |
4 | 5.02609 | 1128 | Latin 1 / Western European | UNKNOWN | RT_ICON |
5 | 5.18109 | 4264 | Latin 1 / Western European | UNKNOWN | RT_ICON |
6 | 5.04307 | 9640 | Latin 1 / Western European | UNKNOWN | RT_ICON |
7 | 7.94547 | 15729 | Latin 1 / Western European | UNKNOWN | RT_ICON |
8 | 3.71728 | 582 | Latin 1 / Western European | UNKNOWN | RT_STRING |
9 | 3.73856 | 422 | Latin 1 / Western European | UNKNOWN | RT_STRING |
10 | 3.55807 | 220 | Latin 1 / Western European | UNKNOWN | RT_STRING |
KERNEL32.dll |
OLEAUT32.dll |
USER32.dll (delay-loaded) |
gdiplus.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1580 | "C:\Users\admin\Downloads\CC Checker -AcTeam-.exe" | C:\Users\admin\Downloads\CC Checker -AcTeam-.exe | — | Explorer.EXE | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
3172 | "C:\Users\admin\AppData\Local\Temp\RarSFX0\CC Checker -AcTeam-.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX0\CC Checker -AcTeam-.exe | CC Checker -AcTeam-.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Yahoo.com Version: 1.4.1.2 Modules
| |||||||||||||||
2440 | "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All | C:\Windows\system32\cmd.exe | — | CC Checker -AcTeam-.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2368 | chcp 65001 | C:\Windows\system32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
624 | netsh wlan show profile | C:\Windows\system32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2284 | findstr All | C:\Windows\system32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3000 | "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid | C:\Windows\system32\cmd.exe | — | CC Checker -AcTeam-.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3332 | chcp 65001 | C:\Windows\system32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3600 | netsh wlan show networks mode=bssid | C:\Windows\system32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
4032 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (1580) CC Checker -AcTeam-.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (1580) CC Checker -AcTeam-.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (1580) CC Checker -AcTeam-.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (1580) CC Checker -AcTeam-.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (3172) CC Checker -AcTeam-.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CC Checker -AcTeam-_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing |
PID | Process | Filename | Type | |
---|---|---|---|---|
1580 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\CC_Checker -AcTeam-.exe | executable | |
MD5:83C290CB135D0CC07F5C331F346A5E26 | SHA256:1F5BF01A246D4C3FF1A22B7469CF54DFD0BCAB7E48C0BD11FAFDED68280978FC | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Desktop\controlfact.rtf | text | |
MD5:2267C6731CBD619B2914C7A3C8550602 | SHA256:51851F5FC7E7837AF43B223886C7C99581943AB69DAF39DA08AB8F9A9A80748F | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Documents\ownstories.rtf | text | |
MD5:5D544CE58F3F3E1F8A0C4F3453222137 | SHA256:C2099F5DF9D82B4D96270A440E6F123924AF5CA5D6F33FA44D7CD28FA50ED911 | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Messenger\Skype\Local Storage\leveldb\000018.ldb | binary | |
MD5:6BD68FFB23742CE14D3F80B92D3357BB | SHA256:67ABD6BE3C0032A8BE2046BFAB18888FE83556627865B01BCAD2C7EF0AD05169 | |||
1580 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\CC Checker -AcTeam-.exe | executable | |
MD5:E588EC5E8F7A8AD6E933B48ABC1C9FF2 | SHA256:4E2D44D40E6FDE9A7BE650C8B2ABF707F82EA8A536CA0C9C6C53E585C239ABAE | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Documents\hourscolumbia.rtf | text | |
MD5:32DC0182643F90F277269A53A0F0C560 | SHA256:024F49B12D1009362B161614682F073F1FCBE590A1CC099191E8438E6B6782D3 | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Documents\civilconnect.rtf | text | |
MD5:39832A138C8D311572EBFCD6B0EFD85A | SHA256:130EC524A1EA9D877E785D1A5E34C0F33BF8368BC7F9A55104B237D3AAED01BA | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Documents\dealfarm.rtf | text | |
MD5:B67DBC5AD623E8E3806F28C96E46185B | SHA256:D36EC10A8DB6F0DA1F48E90EB483F058C40C45B55875ED2ED6CE773604FB2BDD | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Documents\warningpresented.rtf | text | |
MD5:0642B699BA26DA26E0057147D18ED197 | SHA256:E790FC3F39C0B501C713BACF7BFD1BB804A360F7D9F4DAF5968C33C20C277B8F | |||
3172 | CC Checker -AcTeam-.exe | C:\Users\admin\AppData\Local\dc2815bdebaeab526eaa882516445489\[email protected]_en-US\Grabber\DRIVE-C\Users\admin\Desktop\canadianbegin.rtf | text | |
MD5:1D9ACB04F2313931A4B311205BCEFCBA | SHA256:8E84102E02795CB67062EB2E114B6AD9D3295E3C34C5CC392697BA40B8E92024 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3172 | CC Checker -AcTeam-.exe | 162.159.137.232:443 | discord.com | CLOUDFLARENET | — | suspicious |
3172 | CC Checker -AcTeam-.exe | 104.18.115.97:80 | icanhazip.com | CLOUDFLARENET | — | malicious |
Domain | IP | Reputation |
---|---|---|
discord.com |
| whitelisted |
icanhazip.com |
| shared |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) |
3172 | CC Checker -AcTeam-.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |