File name:

ComboFix.exe

Full analysis: https://app.any.run/tasks/6857ca16-7ad1-4e21-90db-a7a267221eec
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 13, 2020, 10:51:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, Nullsoft Installer self-extracting archive
MD5:

9CD8D4E8C48497A9CB4CD37E0EF8A785

SHA1:

1C1E86FC10B565FEA673BFCF664A29CA4D5D3F2A

SHA256:

23EA3C510C9B0D48047A4B236A82A7FDBED3BD58C1B3EECF82729EF1C849D421

SSDEEP:

98304:ZiofAgvhWN0WMXmAihL9nXFQ+jSBpemBgiA24PKUPBuGLlNQS1LCGNrbscGQwd:ZiofAgpWiBXmAM9rjStguileC3xGd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ComboFix.exe (PID: 2980)
    • Application was dropped or rewritten from another process

      • iexplore.exe (PID: 3860)
      • iexplore.exe (PID: 1872)
      • iexplore.exe (PID: 2472)
      • iexplore.exe (PID: 2576)
      • iexplore.exe (PID: 3800)
      • iexplore.exe (PID: 2872)
      • iexplore.exe (PID: 2344)
      • iexplore.exe (PID: 3272)
      • PEV.3XE (PID: 748)
      • ERUNT.3XE (PID: 992)
      • PEV.3XE (PID: 2344)
    • Stealing of credential data

      • ERUNT.3XE (PID: 992)
  • SUSPICIOUS

    • Modifies the open verb of a shell class

      • ComboFix.exe (PID: 2980)
      • PEV.3XE (PID: 2344)
    • Creates executable files which already exist in Windows

      • ComboFix.exe (PID: 2980)
    • Executable content was dropped or overwritten

      • ComboFix.exe (PID: 2980)
    • Starts application with an unusual extension

      • nsAB5D.tmp (PID: 3660)
      • iexplore.exe (PID: 3272)
      • ComboFix.exe (PID: 2980)
    • Starts CMD.EXE for commands execution

      • ComboFix.exe (PID: 2980)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • ComboFix.exe (PID: 2980)
    • Creates files in the Windows directory

      • ERUNT.3XE (PID: 992)
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 1944)
    • Dropped object may contain Bitcoin addresses

      • ComboFix.exe (PID: 2980)
    • Manual execution by user

      • opera.exe (PID: 1944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2014:05:11 22:03:36+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 20480
InitializedDataSize: 8192
UninitializedDataSize: 180224
EntryPoint: 0x314d0
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 19.11.4.1
ProductVersionNumber: 19.11.4.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Swearware
FileDescription: ComboFix NSIS Installer
FileVersion: 19.11.04.01
InternalName: ComboFix.exe
LegalCopyright: sUBs
OriginalFileName: ComboFix.exe
ProductName: ComboFix

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 11-May-2014 20:03:36
Detected languages:
  • English - United States
CompanyName: Swearware
FileDescription: ComboFix NSIS Installer
FileVersion: 19.11.04.01
InternalName: ComboFix.exe
LegalCopyright: sUBs
OriginalFileName: ComboFix.exe
ProductName: ComboFix

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 11-May-2014 20:03:36
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x0002C000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x0002D000
0x00005000
0x00004800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.83959
.rsrc
0x00032000
0x00002000
0x00001C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.39493

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.26024
1013
UNKNOWN
English - United States
RT_MANIFEST
102
6.81683
184
UNKNOWN
English - United States
RT_DIALOG
103
2.01924
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
7.1047
256
UNKNOWN
English - United States
RT_DIALOG
106
7.12347
284
UNKNOWN
English - United States
RT_DIALOG
111
6.08731
96
UNKNOWN
English - United States
RT_DIALOG
202
6.76113
168
UNKNOWN
English - United States
RT_DIALOG
205
6.96023
240
UNKNOWN
English - United States
RT_DIALOG
206
7.16464
268
UNKNOWN
English - United States
RT_DIALOG
211
6.07193
80
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.DLL
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
16
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start combofix.exe opera.exe erunt.3xe nsab5d.tmp no specs pev.3xe no specs iexplore.exe no specs iexplore.exe no specs pev.3xe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs cmd.exe no specs combofix.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
748C:\32788R22FWJFW\PEV.3XE RIMPORT C:\32788R22FWJFW\EXE.regC:\32788R22FWJFW\PEV.3XEiexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\32788r22fwjfw\pev.3xe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
896C:\Windows\system32\cmd.exe /C C:\32788R22FWJFW\fl0.batC:\Windows\system32\cmd.exeComboFix.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
992"C:\32788R22FWJFW\ERUNT.3XE" "C:\Windows\erdnt\Hiv-backup" SYSREG CURUSER OTHERUSERS /NOCONFIRMDELETEC:\32788R22FWJFW\ERUNT.3XE
ComboFix.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\32788r22fwjfw\erunt.3xe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
1872C:\32788R22FWJFW\License\iexplore.exe -s450000-1400000 -t!k -t!o -t!g -k C:\*.exe and not { "C:\Users\admin\AppData\Local\Temp\ComboFix.exe" or C:\32788R22FWJFW\* }C:\32788R22FWJFW\License\iexplore.exeiexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\32788r22fwjfw\license\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
1944"C:\Program Files\Opera\opera.exe" C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
2344C:\32788R22FWJFW\PEV.3XE RIMPORT C:\32788R22FWJFW\EXE.regC:\32788R22FWJFW\PEV.3XEnsAB5D.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\32788r22fwjfw\pev.3xe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
2344C:\32788R22FWJFW\License\iexplore.exe -loadline:C:\32788R22FWJFW\License\UnxUtilsDist.pif and not { "C:\Users\admin\AppData\Local\Temp\ComboFix.exe" or C:\32788R22FWJFW\* }C:\32788R22FWJFW\License\iexplore.exeiexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2472C:\32788R22FWJFW\License\iexplore.exe -k "C:\Users\admin\AppData\Local\Temp\*" not { "C:\Users\admin\AppData\Local\Temp\ComboFix.exe" or C:\32788R22FWJFW\* }C:\32788R22FWJFW\License\iexplore.exeiexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2476"C:\Users\admin\AppData\Local\Temp\ComboFix.exe" C:\Users\admin\AppData\Local\Temp\ComboFix.exeexplorer.exe
User:
admin
Company:
Swearware
Integrity Level:
MEDIUM
Description:
ComboFix NSIS Installer
Exit code:
3221226540
Version:
19.11.04.01
Modules
Images
c:\users\admin\appdata\local\temp\combofix.exe
c:\systemroot\system32\ntdll.dll
2576C:\32788R22FWJFW\License\iexplore.exe -k { "C:\ProgramData\*" or "C:\Users\admin\*" } not { "C:\Users\admin\AppData\Local\Temp\ComboFix.exe" or C:\32788R22FWJFW\* }C:\32788R22FWJFW\License\iexplore.exeiexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\32788r22fwjfw\license\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
Total events
647
Read events
479
Write events
100
Delete events
68

Modification events

(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Swearware
Operation:writeName:ComboFix_wow
Value:
19-11-04.01
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Operation:delete keyName:
Value:
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.3XE
Operation:writeName:
Value:
3XEfile
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\3XEfile\shell\open\command
Operation:writeName:
Value:
"%1" %*
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.exe
Operation:writeName:
Value:
exefile
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command
Operation:writeName:
Value:
"%1" %*
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.com
Operation:writeName:
Value:
comfile
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\comfile\shell\open\command
Operation:writeName:
Value:
"%1" %*
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.bat
Operation:writeName:
Value:
batfile
(PID) Process:(2980) ComboFix.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.cmd
Operation:writeName:
Value:
cmdfile
Executable files
42
Suspicious files
44
Text files
157
Unknown types
13

Dropped files

PID
Process
Filename
Type
2980ComboFix.exeC:\Users\admin\AppData\Local\Temp\nsz77B9.tmp\W7.mactext
MD5:486DA0E231191AE975F6D2B4D14F9D39
SHA256:03DB0EDF70B6E6A3601107FA8F4FA1B1044FC83F65927C0B3B3374C041826B61
2980ComboFix.exeC:\32788R22FWJFW\ActiveDrv.vbstext
MD5:4518E427C4E77F0118770CC850A1B312
SHA256:56745DACBA04EA4690BF51502558CF361A4D7FF3ABC848B88E64BF16DAF4CFD8
2980ComboFix.exeC:\32788R22FWJFW\BootDrv.vbstext
MD5:602AD0A844220D0DC431DC77C0E1A322
SHA256:9C79039A69E206167A13D20EA9CCB5BDCAF02111C000E5FB65B1AC5ACA0A762D
2980ComboFix.exeC:\Users\admin\AppData\Local\Temp\nsz77B9.tmp\Vista.krltext
MD5:486DA0E231191AE975F6D2B4D14F9D39
SHA256:03DB0EDF70B6E6A3601107FA8F4FA1B1044FC83F65927C0B3B3374C041826B61
2980ComboFix.exeC:\32788R22FWJFW\023w8.dattext
MD5:63905C8FF5C63CCA68E4CCE5F535BEC3
SHA256:3E0A78667B1B29E9F797C3F9893E50082C0626914C74BD04153A7625F80CCB11
2980ComboFix.exeC:\32788R22FWJFW\023w7.dattext
MD5:935D25BCC25FD5444D0E1BF7ED228C24
SHA256:C89B74EF94086FC4A969E579D0653D460931508B862233ED008E0FB4FF23FA3F
2980ComboFix.exeC:\32788R22FWJFW\BFE.dathiv
MD5:4159270EBC4700D923FBA2BBA4171FDD
SHA256:14DA6D6205BE3B0629EC4987F8C66543EB69FC2F45D6071076F7769F4E6CDBF9
2980ComboFix.exeC:\Users\admin\AppData\Local\Temp\nsz77B9.tmp\System.dllexecutable
MD5:A436DB0C473A087EB61FF5C53C34BA27
SHA256:75ED40311875312617D6711BAED0BE29FCAEE71031CA27A8D308A72B15A51E49
2980ComboFix.exeC:\32788R22FWJFW\AWF.cmdtext
MD5:0AF9FF8D8313FAB8E535CCEF4C8DB10A
SHA256:150AFEDE0368D115BB26787E98AA9148335F20053791B9953E4BA4B23AD64130
2980ComboFix.exeC:\32788R22FWJFW\023.dattext
MD5:670CBBF19119C06C2D3F3CE005DB24A1
SHA256:C5DD0199365F954D28DE7CA43C93F2186E0AB9C9088425F8C7143CCFACE82827
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
12
DNS requests
7
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2980
ComboFix.exe
GET
104.20.129.30:80
http://download.bleepingcomputer.com/sUBs/version.txt
US
whitelisted
2980
ComboFix.exe
GET
195.22.26.248:80
http://compendiate.net/sUBs/ComboFix.exe/version.txt
PT
malicious
GET
172.217.18.99:80
http://www.google.com.ua/search?q=fuck&sourceid=opera&ie=utf-8&oe=utf-8&channel=suggest
US
whitelisted
GET
185.26.182.112:80
http://sitecheck2.opera.com/?host=www.google.com.ua&hdn=Nxr6KEmdGjdmqcWka8dkkA==
unknown
whitelisted
1944
opera.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
564 b
whitelisted
GET
200
172.217.22.110:80
http://clients1.google.com/complete/search?q=fuck&client=opera-suggest-omnibox&hl=de
US
text
31 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1944
opera.exe
185.26.182.93:443
certs.opera.com
Opera Software AS
whitelisted
2980
ComboFix.exe
104.20.129.30:80
download.bleepingcomputer.com
Cloudflare Inc
US
shared
1944
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
1944
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
172.217.22.110:80
clients1.google.com
Google Inc.
US
whitelisted
2980
ComboFix.exe
195.22.26.248:80
compendiate.net
Claranet Ltd
PT
malicious
172.217.18.99:80
www.google.com.ua
Google Inc.
US
whitelisted
185.26.182.112:80
sitecheck2.opera.com
Opera Software AS
malicious

DNS requests

Domain
IP
Reputation
download.bleepingcomputer.com
  • 104.20.129.30
  • 172.67.18.91
  • 104.20.128.30
whitelisted
certs.opera.com
  • 185.26.182.93
  • 185.26.182.94
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
compendiate.net
  • 195.22.26.248
malicious
clients1.google.com
  • 172.217.22.110
whitelisted
www.google.com.ua
  • 172.217.18.99
whitelisted
sitecheck2.opera.com
  • 185.26.182.112
  • 185.26.182.111
  • 185.26.182.93
  • 185.26.182.106
  • 185.26.182.94
  • 185.26.182.118
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ADWARE [PTsecurity] PUA:Win32/Conduit
6 ETPRO signatures available at the full report
No debug info