File name:

Backdoor.DDoS.Win32.Nitol.exe

Full analysis: https://app.any.run/tasks/8e7e3a9b-beb2-41d3-a31a-28d6c483e31d
Verdict: Malicious activity
Analysis date: July 22, 2024, 16:55:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

304BBE0E401D84EDF63B68588335CEB6

SHA1:

8389FB0466449755C9C33716EF6F9C3E0F4E19C8

SHA256:

1F3E836B4677A6DF2C2D34D3C6413DF2C5E448B5BC1D5702F2A96A7F6CA0D7FB

SSDEEP:

768:QfvoyXXQkZuzQE98Fs+UwMVdPG42EmAjE/yQd07d21a1Xxu0HfqaWF6i5XcojY9S:QfvoyXgkAP2EFjtQd07k1sXPHijmUN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
      • xkzbkq.exe (PID: 2300)
    • Process drops legitimate windows executable

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
    • Executes as Windows Service

      • xkzbkq.exe (PID: 2300)
    • Reads the Internet Settings

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
    • Hides command output

      • cmd.exe (PID: 2076)
      • cmd.exe (PID: 2940)
    • Reads security settings of Internet Explorer

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
    • Starts CMD.EXE for commands execution

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
      • xkzbkq.exe (PID: 2300)
    • Creates or modifies Windows services

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
    • Creates file in the systems drive root

      • xkzbkq.exe (PID: 2300)
  • INFO

    • Checks supported languages

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
      • Rar.exe (PID: 240)
      • Rar.exe (PID: 2500)
      • Rar.exe (PID: 3304)
    • Reads the computer name

      • Backdoor.DDoS.Win32.Nitol.exe (PID: 2748)
      • Rar.exe (PID: 240)
      • Rar.exe (PID: 2500)
      • Rar.exe (PID: 3304)
    • Creates files in the program directory

      • xkzbkq.exe (PID: 2300)
    • Reads the machine GUID from the registry

      • Rar.exe (PID: 240)
      • Rar.exe (PID: 3304)
      • Rar.exe (PID: 2500)
    • Drops the executable file immediately after the start

      • xkzbkq.exe (PID: 2300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:05:18 13:20:13+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: -
InitializedDataSize: 52736
UninitializedDataSize: -
EntryPoint: 0x6aa8
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 7.2.2600.5512
ProductVersionNumber: 7.2.2600.5512
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Microsoft Connection Manager Profile Installer
FileVersion: 7.02.2600.5512 (xpsp.080413-0852)
InternalName: CMSTP
LegalCopyright: (C) Microsoft Corporation. All rights reserved.
OriginalFileName: CMSTP.EXE
ProductName: Microsoft(R) Connection Manager
ProductVersion: 7.02.2600.5512
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
11
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start backdoor.ddos.win32.nitol.exe xkzbkq.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs rar.exe no specs find.exe no specs rar.exe no specs rar.exe no specs cmd.exe no specs backdoor.ddos.win32.nitol.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240C:\PROGRA~1\WinRAR\rar.exe vb "C:\Program Files\Java\jre1.8.0_271\lib\deploy\ffjcext.zip" lpk.dllC:\Program Files\WinRAR\Rar.execmd.exe
User:
SYSTEM
Company:
Alexander Roshal
Integrity Level:
SYSTEM
Description:
Command line RAR
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\rar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2000cmd /c RD /s /q "C:\Windows\TEMP\IRA3AC.tmp"C:\Windows\System32\cmd.exexkzbkq.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2076"C:\Windows\system32\cmd.exe" /c del C:\Users\admin\Desktop\BACKDO~1.EXE > nulC:\Windows\System32\cmd.exeBackdoor.DDoS.Win32.Nitol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2300C:\Windows\xkzbkq.exeC:\Windows\xkzbkq.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Connection Manager Profile Installer
Version:
7.02.2600.5512 (xpsp.080413-0852)
Modules
Images
c:\windows\xkzbkq.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2500"C:\PROGRA~1\WinRAR\rar.exe" x "C:\Program Files\Java\jre1.8.0_271\lib\deploy\ffjcext.zip" *.exe "C:\Windows\TEMP\IRA3AC.tmp\"C:\Program Files\WinRAR\Rar.exexkzbkq.exe
User:
SYSTEM
Company:
Alexander Roshal
Integrity Level:
SYSTEM
Description:
Command line RAR
Exit code:
10
Version:
5.91.0
Modules
Images
c:\program files\winrar\rar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2748"C:\Users\admin\Desktop\Backdoor.DDoS.Win32.Nitol.exe" C:\Users\admin\Desktop\Backdoor.DDoS.Win32.Nitol.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\backdoor.ddos.win32.nitol.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2836find /i "lpk.dll"C:\Windows\System32\find.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2940"C:\Windows\system32\cmd.exe" /c del C:\Users\admin\Desktop\BACKDO~1.EXE > nulC:\Windows\System32\cmd.exeBackdoor.DDoS.Win32.Nitol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3304"C:\PROGRA~1\WinRAR\rar.exe" a -r -ep1"C:\Windows\TEMP\IRA3AC.tmp" "C:\Program Files\Java\jre1.8.0_271\lib\deploy\ffjcext.zip" "C:\Windows\TEMP\IRA3AC.tmp\lpk.dll"C:\Program Files\WinRAR\Rar.exexkzbkq.exe
User:
SYSTEM
Company:
Alexander Roshal
Integrity Level:
SYSTEM
Description:
Command line RAR
Exit code:
2
Version:
5.91.0
Modules
Images
c:\program files\winrar\rar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3432"C:\Users\admin\Desktop\Backdoor.DDoS.Win32.Nitol.exe" C:\Users\admin\Desktop\Backdoor.DDoS.Win32.Nitol.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\backdoor.ddos.win32.nitol.exe
c:\windows\system32\ntdll.dll
Total events
1 982
Read events
1 973
Write events
9
Delete events
0

Modification events

(PID) Process:(2748) Backdoor.DDoS.Win32.Nitol.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy
Operation:writeName:Description
Value:
Ghijklmn Pqrstuvwx Abcdefg Ijklmnop Rst
(PID) Process:(2748) Backdoor.DDoS.Win32.Nitol.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2748) Backdoor.DDoS.Win32.Nitol.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2748) Backdoor.DDoS.Win32.Nitol.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2748) Backdoor.DDoS.Win32.Nitol.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
63
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2300xkzbkq.exeC:\Windows\system32\hra33.dllexecutable
MD5:7147FF24579A477A1A34696926E573F1
SHA256:FD08DCB016611316C849D48312BA6DC7D4DE75D1A81C1D475A13BB5A1BA07267
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-006E-041F-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-0410-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-006E-0C0A-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-0412-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-0411-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\RCXE2AB.tmpexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-0407-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-040C-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
2300xkzbkq.exeC:\MSOCache\All Users\{90140000-0100-0416-0000-0000000FF1CE}-C\lpk.dllexecutable
MD5:BB14E3E646664123AFF15BB86F2C17CD
SHA256:2F8B62FEDD9154C8C5C8EB722757AE35B84F07240B3A31AFC3F684B2FA38BBA9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
37
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
23.50.131.208:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
1060
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?67a3611ec3c0260d
unknown
whitelisted
1372
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1372
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.1:445
unknown
4
System
192.168.100.1:139
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
1372
svchost.exe
23.50.131.208:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
www.520520520.org
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.208
  • 23.50.131.200
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
sbcq.f3322.org
unknown
www.520123.xyz
unknown

Threats

No threats detected
No debug info