| File name: | wireguard.exe |
| Full analysis: | https://app.any.run/tasks/c9feb9c2-7dce-45ee-a0a3-d62b3adab0ec |
| Verdict: | Malicious activity |
| Threats: | Tycoon 2FA is a phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) protections, particularly targeting Microsoft 365 and Gmail accounts. Its advanced evasion techniques and modular architecture make it a significant threat to organizations relying on MFA for security. |
| Analysis date: | April 29, 2025, 13:03:13 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections |
| MD5: | A9EFC986F53B7808DA07422528B5541F |
| SHA1: | 94EBFE425F164C08041C256896BA4482171A1024 |
| SHA256: | 1CEA3D9EFA3A875F105ED4C628D082BC34ABC139FA2EE9C290D77090BCE843B3 |
| SSDEEP: | 98304:o01pRAhKVEI0ZZl8JlLQClUSEJs4T08z/kDRHzPaOhozLWVBmZdsloxUhPtpKXM+:yQytGu7FfZEtH8icxu2Ya |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 2.43 |
| CodeSize: | 6771200 |
| InitializedDataSize: | 10886144 |
| UninitializedDataSize: | 356352 |
| EntryPoint: | 0x13d0 |
| OSVersion: | 6.1 |
| ImageVersion: | - |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.5.3.0 |
| ProductVersionNumber: | 0.5.3.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | Jason A. Donenf |
| FileDescription: | WireGuard: Fast, Modern, Secure VPN |
| FileVersion: | 0.5.3 |
| InternalName: | WireGuard |
| LegalCopyright: | Copyright (c) 2015-2021 Jason A. Donenf |
| LegalTrademarks: | WireGuard |
| OriginalFileName: | wireguard.exe |
| PrivateBuild: | - |
| ProductName: | WireGuard |
| ProductVersion: | 0.5.3 |
| SpecialBuild: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 296 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 296 | WMIC CPU GET ProcessorID | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 296 | WMIC DISKDRIVE GET SERIALNUMBER | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 444 | CMD /C "WMIC CPU GET ProcessorID" | C:\Windows\System32\cmd.exe | — | wireguard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 508 | "C:\Users\admin\Desktop\wireguard.exe" --detached | C:\Users\admin\Desktop\wireguard.exe | wireguard.exe | ||||||||||||
User: admin Company: Jason A. Donenf Integrity Level: MEDIUM Description: WireGuard: Fast, Modern, Secure VPN Exit code: 2 Version: 0.5.3 Modules
| |||||||||||||||
| 600 | CMD /C "WMIC DISKDRIVE GET SERIALNUMBER" | C:\Windows\System32\cmd.exe | — | wireguard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 600 | WMIC DISKDRIVE GET SERIALNUMBER | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | "C:\Users\admin\Desktop\wireguard.exe" --detached | C:\Users\admin\Desktop\wireguard.exe | wireguard.exe | ||||||||||||
User: admin Company: Jason A. Donenf Integrity Level: MEDIUM Description: WireGuard: Fast, Modern, Secure VPN Exit code: 2 Version: 0.5.3 Modules
| |||||||||||||||
| 632 | WMIC DISKDRIVE GET SERIALNUMBER | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 708 | CMD /C "WMIC CPU GET ProcessorID" | C:\Windows\System32\cmd.exe | — | wireguard.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1172) wireguard.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1172) wireguard.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1172) wireguard.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1172) wireguard.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2182 |
Value: Astrakhan Standard Time | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2181 |
Value: Astrakhan Daylight Time | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-452 |
Value: Caucasus Standard Time | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-451 |
Value: Caucasus Daylight Time | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-662 |
Value: Cen. Australia Standard Time | |||
| (PID) Process: | (5672) wireguard.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-661 |
Value: Cen. Australia Daylight Time | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1660 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
5656 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
5088 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
5008 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
3704 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
5116 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
5468 | smartscreen.exe | GET | 200 | 199.232.214.172:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?abe0a5c8c299ffd9 | unknown | — | — | whitelisted |
5468 | smartscreen.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
3640 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1172 | wireguard.exe | GET | 200 | 88.119.165.84:8080 | http://towerbingobongoboom.com:8080/updater?for=D29476568E8640B286A671E377C7C4EB | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1352 | svchost.exe | 184.24.77.4:80 | — | Akamai International B.V. | DE | unknown |
5468 | smartscreen.exe | 48.209.162.134:443 | checkappexec.microsoft.com | — | US | whitelisted |
5468 | smartscreen.exe | 199.232.214.172:80 | ctldl.windowsupdate.com | FASTLY | US | whitelisted |
5468 | smartscreen.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
1172 | wireguard.exe | 88.119.165.84:8080 | towerbingobongoboom.com | Informacines sistemos ir technologijos, UAB | LT | malicious |
5336 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3640 | svchost.exe | 40.126.32.72:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3640 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
2776 | svchost.exe | 20.189.173.8:443 | v10.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1352 | svchost.exe | 184.24.77.24:80 | — | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
checkappexec.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
towerbingobongoboom.com |
| malicious |
settings-win.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
v10.events.data.microsoft.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1172 | wireguard.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
1172 | wireguard.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
1352 | svchost.exe | Misc activity | ET INFO Microsoft Connection Test |
5672 | wireguard.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
5672 | wireguard.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
5104 | wireguard.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
5104 | wireguard.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
508 | wireguard.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
508 | wireguard.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |
1692 | wireguard.exe | Misc activity | ET INFO Go-http-client User-Agent Observed Outbound |