| File name: | NPE.exe |
| Full analysis: | https://app.any.run/tasks/0ae2712f-c0ab-42e5-9c3f-117854911795 |
| Verdict: | Malicious activity |
| Analysis date: | May 16, 2021, 14:04:59 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 252653807CDEAA7129B5E3050748C8B8 |
| SHA1: | 99955399D76EBC42EF4A25CDB85FE0ACD275199C |
| SHA256: | 25F0A92DA8B07F28F6523EDE8828F9BE83B64E8A272792CDCC9DC9AC86603C48 |
| SSDEEP: | 196608:IQVK+Xvylnx0u+ckxhfxaiV7cmjDl8MF9bA0JP2pHrqNsso8Bf:IQVSx0uyhfXvl1DbUrqNnBf |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| ProductVersion: | 6 |
|---|---|
| ProductName: | Norton Power Eraser |
| OriginalFileName: | NPE.exe |
| LegalCopyright: | Copyright (c) 2021 NortonLifeLock Inc. All rights reserved. |
| InternalName: | NPE |
| FileVersion: | 6.0.1.2095 |
| FileDescription: | Norton Power Eraser |
| CompanyName: | NortonLifeLock Inc. |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Windows NT 32-bit |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 6.0.0.0 |
| FileVersionNumber: | 6.0.1.2095 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 6 |
| ImageVersion: | - |
| OSVersion: | 6 |
| EntryPoint: | 0x4c81eb |
| UninitializedDataSize: | - |
| InitializedDataSize: | 6598144 |
| CodeSize: | 7277056 |
| LinkerVersion: | 14.14 |
| PEType: | PE32 |
| TimeStamp: | 2021:05:06 22:01:44+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 06-May-2021 20:01:44 |
| Detected languages: |
|
| Debug artifacts: |
|
| CompanyName: | NortonLifeLock Inc. |
| FileDescription: | Norton Power Eraser |
| FileVersion: | 6.0.1.2095 |
| InternalName: | NPE |
| LegalCopyright: | Copyright (c) 2021 NortonLifeLock Inc. All rights reserved. |
| OriginalFilename: | NPE.exe |
| ProductName: | Norton Power Eraser |
| ProductVersion: | 6.0 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000140 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 06-May-2021 20:01:44 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x006E18CC | 0x006E1A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.74775 |
IPPCODE | 0x006E3000 | 0x0000EFCE | 0x0000F000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.28739 |
.rdata | 0x006F2000 | 0x001A5D96 | 0x001A5E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.46611 |
.data | 0x00898000 | 0x00041A74 | 0x00038600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.20836 |
.rsrc | 0x008DA000 | 0x003F0FAC | 0x003F1000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.33653 |
.reloc | 0x00CCB000 | 0x0007B824 | 0x0007BA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.65542 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.13372 | 1770 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 4.83854 | 19496 | Latin 1 / Western European | UNKNOWN | RT_ICON |
3 | 4.53695 | 16936 | Latin 1 / Western European | UNKNOWN | RT_ICON |
4 | 4.68794 | 9640 | Latin 1 / Western European | UNKNOWN | RT_ICON |
5 | 4.79893 | 4264 | Latin 1 / Western European | UNKNOWN | RT_ICON |
6 | 4.90673 | 2440 | Latin 1 / Western European | UNKNOWN | RT_ICON |
7 | 5.01681 | 2064 | Latin 1 / Western European | UNKNOWN | RT_ICON |
8 | 5.01581 | 1128 | Latin 1 / Western European | UNKNOWN | RT_ICON |
9 | 3.04588 | 308 | Latin 1 / Western European | UNKNOWN | RT_CURSOR |
10 | 2.63031 | 308 | Latin 1 / Western European | UNKNOWN | RT_CURSOR |
ADVAPI32.dll |
COMDLG32.dll |
GDI32.dll |
IMM32.dll |
KERNEL32.dll |
OLEAUT32.dll |
PSAPI.DLL |
RPCRT4.dll |
SETUPAPI.dll |
SHELL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1836 | "C:\Users\admin\AppData\Local\Temp\NPE.exe" | C:\Users\admin\AppData\Local\Temp\NPE.exe | — | explorer.exe | |||||||||||
User: admin Company: NortonLifeLock Inc. Integrity Level: MEDIUM Description: Norton Power Eraser Exit code: 3221226540 Version: 6.0.1.2095 Modules
| |||||||||||||||
| 2380 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3716 | C:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801} | C:\Windows\system32\DllHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3904 | "C:\Users\admin\AppData\Local\Temp\NPE.exe" | C:\Users\admin\AppData\Local\Temp\NPE.exe | explorer.exe | ||||||||||||
User: admin Company: NortonLifeLock Inc. Integrity Level: HIGH Description: Norton Power Eraser Exit code: 0 Version: 6.0.1.2095 Modules
| |||||||||||||||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\NPE.exe |
| Operation: | write | Name: | DumpType |
Value: 0 | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\NPE.exe |
| Operation: | write | Name: | DumpCount |
Value: 4 | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\NPE.exe |
| Operation: | write | Name: | DumpFlags |
Value: 0 | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\NPE.exe |
| Operation: | write | Name: | DumpFolder |
Value: C:\Users\admin\AppData\Local\NPE\LocalDumps | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\NPETraceSession |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (3904) NPE.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 |
| Operation: | write | Name: | Blob |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3904 | NPE.exe | C:\ProgramData\Norton\NPE\NPEsettings.dat.log | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\NPE\ErrMgmt\SQCLIENT.dat.log | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\NPE\ErrorInstances\12BB96CA\1951FA38-30AE-4958-B398-415C4B4A7DE9.dat.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Windows\TEMP\C03713D5.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Cab8DCB.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Tar8DCC.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Cab9000.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Tar9001.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Cab934D.tmp | — | |
MD5:— | SHA256:— | |||
| 3904 | NPE.exe | C:\Users\admin\AppData\Local\Temp\Tar934E.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3904 | NPE.exe | GET | 404 | 93.184.221.240:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | US | xml | 341 b | whitelisted |
836 | svchost.exe | GET | 404 | 104.79.89.142:80 | http://www.microsoft.com/ | US | xml | 341 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.78.85.248:443 | vss.norton.com | Microsoft Corporation | US | unknown |
— | — | 52.234.215.129:443 | stats.norton.com | Microsoft Corporation | US | whitelisted |
3904 | NPE.exe | 52.234.215.129:443 | stats.norton.com | Microsoft Corporation | US | whitelisted |
3904 | NPE.exe | 40.78.85.248:443 | vss.norton.com | Microsoft Corporation | US | unknown |
3904 | NPE.exe | 198.153.194.1:53 | — | NeuStar, Inc. | US | unknown |
3904 | NPE.exe | 8.8.4.4:53 | — | Google Inc. | US | whitelisted |
3904 | NPE.exe | 23.96.34.208:443 | shasta-rrs.norton.com | Microsoft Corporation | US | unknown |
3904 | NPE.exe | 128.107.241.185:53 | — | Cisco Systems, Inc. | US | suspicious |
3904 | NPE.exe | 198.153.192.1:53 | — | NeuStar, Inc. | US | malicious |
836 | svchost.exe | 104.79.89.142:80 | www.microsoft.com | Time Warner Cable Internet LLC | US | unknown |
Domain | IP | Reputation |
|---|---|---|
vss.norton.com |
| unknown |
stats.norton.com |
| unknown |
www.microsoft.com |
| whitelisted |
definitions.norton.com |
| unknown |
dns.msftncsi.com |
| shared |
shasta-rrs.norton.com |
| unknown |
www.download.windowsupdate.com |
| whitelisted |
tool-avpg.crsi.symantec.com |
| unknown |
sa02in01.sa02.crsi.symantec.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3904 | NPE.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |