| File name: | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8 |
| Full analysis: | https://app.any.run/tasks/5b7b9e26-2ade-430a-a636-5a7e5b56bfbf |
| Verdict: | Malicious activity |
| Threats: | Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions. |
| Analysis date: | November 30, 2024, 07:52:05 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections |
| MD5: | 2091A92ABF5013A9B59DD3294F824659 |
| SHA1: | 3272D9884AED8A81BDDA8A1D8CB57F3B10DEE4E9 |
| SHA256: | 1C8CF5275A67700379266BC7435B3C0E0EE8CB6447F7A233FB30A841E90F2FA8 |
| SSDEEP: | 98304:Qrd4tZGzlyTNr4Imlx5/nZ1DcpZW4tiAKPmbYBckssN7xDnymDoYvmJLYmkPV5vx:XW |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:09:30 08:54:22+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 3163136 |
| InitializedDataSize: | 1903104 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2850a7 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.10.3287.80 |
| ProductVersionNumber: | 3.10.3287.80 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Tencent |
| FileDescription: | 腾讯手游助手 - 卸载程序 |
| FileVersion: | 3.10.3287.80 |
| InternalName: | UnInstall |
| LegalCopyright: | Copyright © 2020 Tencent. All Rights Reserved. |
| OriginalFileName: | UnInstall.exe |
| ProductName: | UnInstall.exe |
| ProductVersion: | 3,10,3287,80 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6408 | "C:\Users\admin\Desktop\1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe" | C:\Users\admin\Desktop\1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 6572 | "C:\Users\admin\Desktop\1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe" | C:\Users\admin\Desktop\1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 6720 | "C:\Users\admin\AppData\Local\Temp\65F1.tmp.exe" -u -product_regkey MobileGamePC | C:\Users\admin\AppData\Local\Temp\65F1.tmp.exe | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 6764 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6720) 65F1.tmp.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC\DeviceInfo |
| Operation: | write | Name: | glVendor |
Value: Unknown | |||
| (PID) Process: | (6720) 65F1.tmp.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC\DeviceInfo |
| Operation: | write | Name: | glRender |
Value: GDI Generic | |||
| (PID) Process: | (6720) 65F1.tmp.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC\Beacon |
| Operation: | write | Name: | Last_Sid_65F1.tmp.exe |
Value: 5932B1F9-913A-431E-AC13-FF7C6C428C07 | |||
| (PID) Process: | (6720) 65F1.tmp.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC |
| Operation: | write | Name: | UserLanguage |
Value: zh_CN | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusOverride |
Value: 1 | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusDisableNotify |
Value: 1 | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallDisableNotify |
Value: 1 | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallOverride |
Value: 1 | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UpdatesDisableNotify |
Value: 1 | |||
| (PID) Process: | (6572) 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UacDisableNotify |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6720 | 65F1.tmp.exe | — | ||
MD5:— | SHA256:— | |||
| 6572 | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | C:\test.tmp | binary | |
MD5:44576FF153418370AFB9C2FF9576E852 | SHA256:3E3563EBA2C5733F0EA02621262222F39CDD2C214A6E7F62C01D5D5EAF3A57DF | |||
| 6720 | 65F1.tmp.exe | C:\Users\admin\AppData\Local\Temp\6787.tmp | executable | |
MD5:E58C7D21A08F8038F2D69CBBAE4E7484 | SHA256:7083BBA256B59C5E9BA62F700B858E0968169653CEC8284E5E0C6E0098E9E191 | |||
| 6572 | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | C:\Windows\system.ini | binary | |
MD5:D3620ADAB7A84EB7F705184D29F49FA5 | SHA256:AC8248EBF536DC1FF94B7A7A190A61AC0F6D2380D11963FFBD5F2F7CCA3DCABB | |||
| 6572 | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | C:\Users\admin\AppData\Local\Temp\rroa.exe | executable | |
MD5:B360FA63134A63F9ACFE046D2DFE10D9 | SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E | |||
| 6720 | 65F1.tmp.exe | C:\Users\admin\AppData\Local\Temp\winrxxcg.exe | executable | |
MD5:B360FA63134A63F9ACFE046D2DFE10D9 | SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E | |||
| 6720 | 65F1.tmp.exe | C:\Users\admin\AppData\Local\Temp\winesehc.exe | executable | |
MD5:B360FA63134A63F9ACFE046D2DFE10D9 | SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E | |||
| 6720 | 65F1.tmp.exe | C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe | executable | |
MD5:A381F316544549B9927AC43300477CA9 | SHA256:29E9BBA3BB07825630993EFFFDE61BE5545587F2CD01D2B753F7BEFAF2316018 | |||
| 6572 | 1c8cf5275a67700379266bc7435b3c0e0ee8cb6447f7a233fb30a841e90f2fa8.exe | C:\Users\admin\AppData\Local\Temp\65F1.tmp.exe | executable | |
MD5:2091A92ABF5013A9B59DD3294F824659 | SHA256:1C8CF5275A67700379266BC7435B3C0E0EE8CB6447F7A233FB30A841E90F2FA8 | |||
| 6720 | 65F1.tmp.exe | C:\pcjtx.pif | executable | |
MD5:6DED3C657CF2B5A4710E6F2FD3873ED2 | SHA256:6AEDCCB2BA08D9F99AFAC4D96AA41272B4D7CBE0DA89274DD34C34B017CCCEFC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
716 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
716 | svchost.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
716 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.212.110.201:443 | www.bing.com | Akamai International B.V. | CZ | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
716 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6720 | 65F1.tmp.exe | 157.255.4.39:443 | master.etl.desktop.qq.com | China Unicom Guangdong IP network | CN | whitelisted |
6720 | 65F1.tmp.exe | 101.33.47.206:8081 | oth.eve.mdt.qq.com | Tencent Building, Kejizhongyi Avenue | SG | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
oth.eve.mdt.qq.com |
| whitelisted |
master.etl.desktop.qq.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |