File name: | wuauclt.exe |
Full analysis: | https://app.any.run/tasks/af49487f-67c4-4a73-a4fc-9ed350b47804 |
Verdict: | Malicious activity |
Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
Analysis date: | April 18, 2019, 14:26:13 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (console) Intel 80386, for MS Windows |
MD5: | A28568479005E93090300DD4C9BE7712 |
SHA1: | 0608F9B9E8F63C2FF193EF93F802BB010011D747 |
SHA256: | 1909363C1C9FD97F8D6FD3423C81F8630E1D40BBC2C4F82F46A6B1312B5ED555 |
SSDEEP: | 98304:ukQmHnoQJkObIO/XP4SyQtML7OigDGyVwu4pgOwN6vyJnZl7RFLI2BmV61DG+kR4:NIQ9v/CQeL7fgzVwu4UN6KB3/0V61S+t |
.exe | | | Win64 Executable (generic) (64.6) |
---|---|---|
.dll | | | Win32 Dynamic Link Library (generic) (15.4) |
.exe | | | Win32 Executable (generic) (10.5) |
.exe | | | Generic Win/DOS Executable (4.6) |
.exe | | | DOS Executable Generic (4.6) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2019:03:26 07:46:58+01:00 |
PEType: | PE32 |
LinkerVersion: | 14 |
CodeSize: | 94720 |
InitializedDataSize: | 49152 |
UninitializedDataSize: | - |
EntryPoint: | 0x7527 |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows command line |
FileVersionNumber: | 6.3.9600.16384 |
ProductVersionNumber: | 6.3.9600.16384 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
CompanyName: | Microsoft Corporation |
FileDescription: | Windows Update |
FileVersion: | 6.3.9600.16384 |
InternalName: | wuauclt.exe |
LegalCopyright: | © Microsoft Corporation. All rights reserved. |
OriginalFileName: | wuauclt.exe |
ProductName: | Microsoft® Windows® Operating System |
ProductVersion: | 6.3.9600.16384 |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_CUI |
Compilation Date: | 26-Mar-2019 06:46:58 |
Detected languages: |
|
CompanyName: | Microsoft Corporation |
FileDescription: | Windows Update |
FileVersion: | 6.3.9600.16384 |
InternalName: | wuauclt.exe |
LegalCopyright: | © Microsoft Corporation. All rights reserved. |
OriginalFilename: | wuauclt.exe |
ProductName: | Microsoft® Windows® Operating System |
ProductVersion: | 6.3.9600.16384 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000108 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 5 |
Time date stamp: | 26-Mar-2019 06:46:58 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x000170E5 | 0x00017200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.67178 |
.rdata | 0x00019000 | 0x000077B8 | 0x00007800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.30213 |
.data | 0x00021000 | 0x00002F4C | 0x00002600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.72375 |
.rsrc | 0x00024000 | 0x000003B8 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.18608 |
.reloc | 0x00025000 | 0x000013BC | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.54446 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.50483 | 856 | UNKNOWN | English - United States | RT_VERSION |
ADVAPI32.dll |
IPHLPAPI.DLL |
KERNEL32.dll |
USER32.dll |
WININET.dll |
WS2_32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1496 | "C:\Program Files\Internet Explorer\iexplore.exe" -nohome | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2172 | "C:\Users\admin\AppData\Local\Temp\wuauclt.exe" | C:\Users\admin\AppData\Local\Temp\wuauclt.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Update Exit code: 3221226540 Version: 6.3.9600.16384 Modules
| |||||||||||||||
2348 | "C:\Windows\system32\dllhostex.exe" | C:\Windows\system32\dllhostex.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: COM Surrogate Exit code: 0 Version: 6.3.9600.16384 Modules
| |||||||||||||||
2436 | "C:\Users\admin\AppData\Local\Temp\wuauclt.exe" | C:\Users\admin\AppData\Local\Temp\wuauclt.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Update Exit code: 0 Version: 6.3.9600.16384 Modules
| |||||||||||||||
2896 | cmd.exe /c ping 127.0.0.1 -n 5 & cmd.exe /c del /a /f "C:\Users\admin\AppData\Local\Temp\wuauclt.exe" | C:\Windows\system32\cmd.exe | — | wuauclt.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3020 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3076 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1496 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | — | iexplore.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3208 | "C:\Windows\system32\WUDHostServices.exe" | C:\Windows\system32\WUDHostServices.exe | — | searchprotocolhost.exe | |||||||||||
User: SYSTEM Company: gentilkiwi (Benjamin DELPY) Integrity Level: SYSTEM Description: mimikatz for Windows Exit code: 0 Version: 2.1.0.0 Modules
| |||||||||||||||
3328 | C:\Windows\System32\svchost.exe -k netsvcs | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3584 | ping 127.0.0.1 -n 5 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkPlatform\Location |
Operation: | write | Name: | LastBackup |
Value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| |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost |
Operation: | write | Name: | netsvcs |
Value: AeLookupSvc | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FunctionProtocolHost |
Operation: | write | Name: | Description |
Value: Provides management services: Function Protocol Host, which confirms the signatures of Windows files and allows new programs to be installed. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start. | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FunctionProtocolHost\Parameters |
Operation: | write | Name: | ServiceDll |
Value: C:\Windows\system32\FunctionProtocolHost.dll | |||
(PID) Process: | (3328) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\FunctionProtocolHost |
Operation: | write | Name: | Type |
Value: 288 | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkPlatform\Location |
Operation: | write | Name: | IPC |
Value: 495043 | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wuauclt_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wuauclt_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wuauclt_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
(PID) Process: | (2436) wuauclt.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wuauclt_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2436 | wuauclt.exe | C:\Windows\system32\msvcjyj.dat | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\Windows\system32\mkz.output | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.1 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.2 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.3 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.4 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.5 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.6 | — | |
MD5:— | SHA256:— | |||
3208 | WUDHostServices.exe | C:\t348.7 | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1496 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2348 | dllhostex.exe | 156.67.216.61:53 | pool.boreye.com | Hostinger International Limited | SG | suspicious |
1496 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
log.boreye.com |
| unknown |
bk.estonine.com |
| malicious |
pool.boreye.com |
| malicious |
back.estonine.com |
| malicious |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
— | — | Misc activity | MINER [PTsecurity] Riskware/CoinMiner JSON_RPC Response |
— | — | Misc activity | MINER [PTsecurity] Risktool.W32.coinminer!c |
— | — | Misc activity | MINER [PTsecurity] CoinMiner CryptoNight algo JSON_RPC server Response |
Process | Message |
---|---|
dllhostex.exe | z -o pool.boreye.com:53 -u IPC_eye2 -p x -t 2 --donate-level=1 --nicehash |