analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b

Full analysis: https://app.any.run/tasks/d07f0802-ee39-4db8-ba82-2be0b038bc9f
Verdict: Malicious activity
Analysis date: November 29, 2020, 22:19:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

101BD293DD37FA5AE26FA0CD75DB7076

SHA1:

33E6886A446580B260953700541DF4CE3B3E95DD

SHA256:

164E261442E9CEDC63679DE82034596BEAAD707B8B2E1F00822DAC3AC3FD340B

SSDEEP:

12288:1q5YHICTpgdFGJfHWMTlOQmly/LmnBdWzkiwe:1qcNlIkJfHx+lCm6we

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe (PID: 2676)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe (PID: 2676)
    • Executable content was dropped or overwritten

      • 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe (PID: 2676)
    • Drops a file with too old compile date

      • 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe (PID: 2676)
    • Creates files in the user directory

      • 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe (PID: 2676)
  • INFO

    • Manual execution by user

      • explorer.exe (PID: 2956)
      • firefox.exe (PID: 3224)
    • Application launched itself

      • firefox.exe (PID: 3224)
      • firefox.exe (PID: 1480)
    • Creates files in the program directory

      • firefox.exe (PID: 1480)
    • Reads CPU info

      • firefox.exe (PID: 1480)
    • Creates files in the user directory

      • firefox.exe (PID: 1480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x338f
UninitializedDataSize: 2048
InitializedDataSize: 186368
CodeSize: 26624
LinkerVersion: 6
PEType: PE32
TimeStamp: 2018:12:15 23:24:46+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 15-Dec-2018 22:24:46
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 15-Dec-2018 22:24:46
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006627
0x00006800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.45178
.rdata
0x00008000
0x000014A2
0x00001600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.02518
.data
0x0000A000
0x0002AFF8
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.03532
.ndata
0x00035000
0x00010000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00045000
0x00000A50
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.18149

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.2992
830
UNKNOWN
English - United States
RT_MANIFEST
103
2.16096
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.66174
256
UNKNOWN
English - United States
RT_DIALOG
106
2.88094
284
UNKNOWN
English - United States
RT_DIALOG
111
2.48825
96
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe explorer.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
2676"C:\Users\admin\AppData\Local\Temp\164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe" C:\Users\admin\AppData\Local\Temp\164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
2956"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3224"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
1480"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
2748"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1480.0.1588812937\2117240290" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1480 "\\.\pipe\gecko-crash-server-pipe.1480" 1172 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
1152"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1480.3.985560041\801267525" -childID 1 -isForBrowser -prefsHandle 1724 -prefMapHandle 1720 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1480 "\\.\pipe\gecko-crash-server-pipe.1480" 1744 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
3280"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1480.13.1859524097\692297408" -childID 2 -isForBrowser -prefsHandle 2720 -prefMapHandle 2968 -prefsLen 5997 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1480 "\\.\pipe\gecko-crash-server-pipe.1480" 2980 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
2880"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1480.20.2110911679\1030151452" -childID 3 -isForBrowser -prefsHandle 3536 -prefMapHandle 3548 -prefsLen 6719 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1480 "\\.\pipe\gecko-crash-server-pipe.1480" 3552 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Total events
821
Read events
815
Write events
6
Delete events
0

Modification events

(PID) Process:(2676) 164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeKey:HKEY_CURRENT_USER\shakingSidney
Operation:writeName:DisplayName
Value:
(PID) Process:(3224) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
853D330300000000
(PID) Process:(1480) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
873D330300000000
(PID) Process:(1480) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(1480) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1480) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
3
Suspicious files
66
Text files
37
Unknown types
59

Dropped files

PID
Process
Filename
Type
1480firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
1480firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
1480firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Roaming\promote\maxwidth\dbprefix\51.opends60.dllbinary
MD5:81D2E779DAF6490730F4AD8A4BAA6647
SHA256:15D85F4938B80699821F491E4A98695F8ACA58BCE9C5868ECC392A2BD48BC408
1480firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Roaming\promote\maxwidth\dbprefix\deavision5.gifimage
MD5:CC6E423F649C8067ECEB539E26CABC5E
SHA256:E0BFFF0FE8F2A532641FEC4BC30A333E2202B630965FD7DA3B6D457ACF0D9D66
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Local\Temp\selections.dllexecutable
MD5:98974091A7FFEB43C3DEE8B8719A4FBA
SHA256:EF4B3157678EBE1755B0402D996FF13FBB95F351D83A21E2F65446E6C3651FE1
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Roaming\promote\maxwidth\dbprefix\msobtsHIPAAArchGuide20.gifimage
MD5:D7D961F8EEA086493847C9ED7C08BD6E
SHA256:BEB8091E9D4A49D417740467ECFCAAA20D9248269A7AA7C9EF8772F726A432B5
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Roaming\promote\maxwidth\dbprefix\setreg.exeexecutable
MD5:0891595642BA8A52069BDE80744137DC
SHA256:2C018FF3678C8FA761AD5F5267EC82400DB9A240C54ADB6D85F9D94E2584BCCD
2676164e261442e9cedc63679de82034596beaad707b8b2e1f00822dac3ac3fd340b.exeC:\Users\admin\AppData\Local\Temp\Griffonbinary
MD5:9FE91BBD83D381775F17A02EE66AC561
SHA256:0B6B57835BC349C89914AFA15188722C7DBA297FB443AC6314FF8EED0E88B75A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
27
DNS requests
68
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1480
firefox.exe
GET
200.76.36.117:80
http://www.bb.com.mx/
MX
whitelisted
1480
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1480
firefox.exe
GET
200.76.36.117:80
http://www.bb.com.mx/
MX
whitelisted
1480
firefox.exe
GET
200.76.36.117:80
http://www.bb.com.mx/
MX
whitelisted
1480
firefox.exe
POST
200
216.58.212.163:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
1480
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1480
firefox.exe
POST
200
216.58.212.163:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
1480
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1480
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1480
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1480
firefox.exe
65.9.68.94:443
snippets.cdn.mozilla.net
AT&T Services, Inc.
US
unknown
1480
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1480
firefox.exe
172.217.21.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
1480
firefox.exe
65.9.68.119:443
firefox.settings.services.mozilla.com
AT&T Services, Inc.
US
unknown
1480
firefox.exe
216.58.212.163:80
ocsp.pki.goog
Google Inc.
US
whitelisted
1480
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
1480
firefox.exe
34.218.9.172:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
1480
firefox.exe
65.9.68.75:443
content-signature-2.cdn.mozilla.net
AT&T Services, Inc.
US
suspicious
1480
firefox.exe
172.217.22.4:443
www.google.com
Google Inc.
US
whitelisted
1480
firefox.exe
200.76.36.117:80
www.bb.com.mx
Alestra, S. de R.L. de C.V.
MX
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
whitelisted
search.services.mozilla.com
  • 34.218.9.172
  • 44.238.74.153
  • 52.41.230.109
whitelisted
search.r53-2.services.mozilla.com
  • 52.41.230.109
  • 44.238.74.153
  • 34.218.9.172
whitelisted
push.services.mozilla.com
  • 35.155.194.246
whitelisted
autopush.prod.mozaws.net
  • 35.155.194.246
whitelisted
snippets.cdn.mozilla.net
  • 65.9.68.94
  • 65.9.68.17
  • 65.9.68.82
  • 65.9.68.124
whitelisted
d228z91au11ukj.cloudfront.net
  • 65.9.68.124
  • 65.9.68.82
  • 65.9.68.17
  • 65.9.68.94
whitelisted
tiles.services.mozilla.com
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
No debug info