analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

40b26eca0785c321532c824f8faaac5e (1)

Full analysis: https://app.any.run/tasks/f6245a24-730b-4047-8703-d0c99d2af88f
Verdict: Malicious activity
Analysis date: April 15, 2019, 08:45:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

40B26ECA0785C321532C824F8FAAAC5E

SHA1:

F59E1A29BB6721C471010823389C0309405B1EC2

SHA256:

1EA6EE959BC2180A48BAA7CB35A57334A192962328B5F268C78BA0E6FBEA892E

SSDEEP:

24576:3RZhdXREg5DuqvbQSQeHFDRPhk5TPU9QmZCHt7q3ckLRW:hZh/EgV5BHFt5k5TM9QlH1QRW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • DllHost.exe (PID: 3360)
      • AUDIODG.EXE (PID: 2332)
      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2932)
      • consent.exe (PID: 3536)
      • DllHost.exe (PID: 2624)
      • conhost.exe (PID: 3916)
      • cmd.exe (PID: 3844)
      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2248)
      • csrss.exe (PID: 348)
      • LogonUI.exe (PID: 3704)
    • Changes the autorun value in the registry

      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2248)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2932)
      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2248)
    • Starts CMD.EXE for commands execution

      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2932)
    • Creates files in the user directory

      • 40b26eca0785c321532c824f8faaac5e (1).exe (PID: 2248)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

ProductVersion: 6.5.62.506
ProductName: Savvy
FileDescription: Lawler Methddescriptin Weighting Unlck Afahmasp
OriginalFileName: Savvy
LegalCopyright: Copyright © 1999 - 2014 Connectify
CompanyName: Connectify
LegalTrademarks: Copyright © 1999 - 2014 Connectify
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 6.5.62.506
FileVersionNumber: 6.5.62.506
Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x3501e
UninitializedDataSize: -
InitializedDataSize: 471552
CodeSize: 336384
LinkerVersion: 14.2
PEType: PE32
TimeStamp: 2019:04:11 20:39:25+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 11-Apr-2019 18:39:25
Detected languages:
  • English - United States
LegalTrademarks: Copyright © 1999 - 2014 Connectify
CompanyName: Connectify
LegalCopyright: Copyright © 1999 - 2014 Connectify
OriginalFilename: Savvy
FileDescription: Lawler Methddescriptin Weighting Unlck Afahmasp
ProductName: Savvy
ProductVersion: 6.5.62.506

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 11-Apr-2019 18:39:25
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x000A9000
0x0000C639
0x0000C800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.97601
.rdata
0x00054000
0x0001B16A
0x0001B200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.11609
.data
0x00070000
0x000381A0
0x00036600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.97381
.rsrc
0x000B6000
0x00011AD8
0x00011C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.03889
.reloc
0x000C8000
0x00003460
0x00003600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.59083

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.98906
773
Latin 1 / Western European
English - United States
RT_MANIFEST
2
1.45742
1128
Latin 1 / Western European
English - United States
RT_ICON
3
1.01529
9640
Latin 1 / Western European
English - United States
RT_ICON
4
1.19371
4264
Latin 1 / Western European
English - United States
RT_ICON
5
1.67904
10344
Latin 1 / Western European
English - United States
RT_ICON
6
0.936352
16936
Latin 1 / Western European
English - United States
RT_ICON
101
2.80883
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
518
3.92298
440
Latin 1 / Western European
English - United States
UNKNOWN
898
2.01924
20
Latin 1 / Western European
English - United States
RT_GROUP_CURSOR
1186
3.40306
40
Latin 1 / Western European
English - United States
UNKNOWN

Imports

ADVAPI32.dll
AVICAP32.dll
AVIFIL32.dll
COMDLG32.dll
CRYPT32.dll
GDI32.dll
KERNEL32.dll
MSIMG32.dll
MSVFW32.dll
OPENGL32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
10
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 40b26eca0785c321532c824f8faaac5e (1).exe audiodg.exe no specs consent.exe no specs Profile Notification Host no specs Profile Notification Host no specs cmd.exe conhost.exe no specs 40b26eca0785c321532c824f8faaac5e (1).exe csrss.exe no specs logonui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2932"C:\Users\admin\AppData\Local\Temp\40b26eca0785c321532c824f8faaac5e (1).exe" C:\Users\admin\AppData\Local\Temp\40b26eca0785c321532c824f8faaac5e (1).exe
explorer.exe
User:
admin
Company:
Connectify
Integrity Level:
MEDIUM
Description:
Lawler Methddescriptin Weighting Unlck Afahmasp
2332C:\Windows\system32\AUDIODG.EXE 0x6b0C:\Windows\system32\AUDIODG.EXEsvchost.exe
User:
LOCAL SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Audio Device Graph Isolation
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3536consent.exe 848 406 0209FCD8C:\Windows\system32\consent.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Consent UI for administrative applications
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2624C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}C:\Windows\system32\DllHost.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3360C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}C:\Windows\system32\DllHost.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3844"C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\40b26eca0785c321532c824f8faaac5e (1).exe" C:\Windows\System32\cmd.exe
40b26eca0785c321532c824f8faaac5e (1).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3916\??\C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.execsrss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2248"C:\Users\admin\AppData\Local\Temp\40b26eca0785c321532c824f8faaac5e (1).exe" C:\Users\admin\AppData\Local\Temp\40b26eca0785c321532c824f8faaac5e (1).exe
cmd.exe
User:
admin
Company:
Connectify
Integrity Level:
HIGH
Description:
Lawler Methddescriptin Weighting Unlck Afahmasp
Exit code:
1073807364
348%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3704"LogonUI.exe" /flags:0x0C:\Windows\system32\LogonUI.exewinlogon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Logon User Interface Host
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
381
Read events
340
Write events
40
Delete events
1

Modification events

(PID) Process:(2932) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2932) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2932) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3536) consent.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000_CLASSES\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2248) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2248) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:Current
Value:
7
(PID) Process:(2248) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:Default
Value:
7
(PID) Process:(2248) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:LastKnownGood
Value:
7
(PID) Process:(2248) 40b26eca0785c321532c824f8faaac5e (1).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:qVideoLAN
Value:
C:\Users\admin\AppData\Roaming\qVideoLAN\qVideoLAN.exe
(PID) Process:(348) csrss.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\shutdown
Operation:delete valueName:ReasonCode
Value:
327935
Executable files
13
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
224840b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\11CC.tmp
MD5:
SHA256:
224840b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\1CD6.tmp
MD5:
SHA256:
224840b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\4936695A.tmpexecutable
MD5:94BF8C26C5B85C2C490CF4440AB8170B
SHA256:873A2BA4C3BB88B9354EAB47B8E5F8118212A63ABF7CB149696A385EDB57DD63
293240b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\427A3132.tmpexecutable
MD5:94BF8C26C5B85C2C490CF4440AB8170B
SHA256:873A2BA4C3BB88B9354EAB47B8E5F8118212A63ABF7CB149696A385EDB57DD63
293240b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\46467959.tmpexecutable
MD5:16AB4BD2ACC52109F43739BF0E89E18F
SHA256:8BF53004F8A413598B46C2ECFBA1EA581836E0E0839047471622F31A4A065DD7
224840b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\6C52476D.tmpexecutable
MD5:95E2376B3323F062EB562B8586D0F14A
SHA256:BD3FA8750123D00AA0967FBA44372C46EA002681DA9C9B77A4F9261553E26017
224840b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\5075357A.tmpexecutable
MD5:ED60C95C805DBAEE92C90C3AB930085A
SHA256:D35574D2CC42B4EDBF217A86639864422FBE02443250A36EB2CD11B22F165C39
293240b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\3073586C.tmpexecutable
MD5:95E2376B3323F062EB562B8586D0F14A
SHA256:BD3FA8750123D00AA0967FBA44372C46EA002681DA9C9B77A4F9261553E26017
293240b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\7467324C.tmpexecutable
MD5:5553784D774CA845380650E010BBDA2C
SHA256:FF4C354D08C8A6A6554DE195C72E5C940BE0DEF803CE0BE8312161943A0F5821
293240b26eca0785c321532c824f8faaac5e (1).exeC:\Users\admin\AppData\Local\Temp\6C303975.tmpexecutable
MD5:8CC3C111D653E96F3EA1590891491D71
SHA256:1D326D7D116D76876EE2B14A5BFB7B4328E21DB9B5AAAB9CB67F8EFB93924230
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info