File name:

yuie9i75.exe

Full analysis: https://app.any.run/tasks/fd9291eb-8d44-4c43-bca7-16ca68567534
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 14, 2019, 15:36:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
betabot
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

4AE89BC386D5CC0D645424BAFD7C4FC7

SHA1:

6778F6FC3AF36895FE6CBBAEED2545432B32D2C6

SHA256:

31E760FDBE0BFA91C5966B47593D3775EEEEC546D101D6F151D42FF409EAD495

SSDEEP:

24576:fJZuTgsNfX3HLjk/sTVKpVm0qY5KkiHpj:xcEsN/LjTcpVmy5Mp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Detected BetaBot Trojan

      • yuie9i75.exe (PID: 1560)
      • explorer.exe (PID: 1248)
      • 37osoum5.exe (PID: 2476)
      • WINWORD.EXE (PID: 2696)
      • WINWORD.EXE (PID: 1036)
    • Changes internet zones settings

      • explorer.exe (PID: 1248)
    • Connects to CnC server

      • explorer.exe (PID: 1248)
    • Changes Image File Execution Options

      • explorer.exe (PID: 1248)
      • regedit.exe (PID: 1520)
      • 37osoum5.exe (PID: 2476)
    • Modifies Windows security services settings

      • regedit.exe (PID: 1520)
    • Changes the autorun value in the registry

      • regedit.exe (PID: 1520)
      • explorer.exe (PID: 1248)
    • Changes firewall settings

      • 37osoum5.exe (PID: 2476)
    • Downloads executable files from the Internet

      • explorer.exe (PID: 1248)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • yuie9i75.exe (PID: 1560)
      • explorer.exe (PID: 1248)
    • Executed via COM

      • DllHost.exe (PID: 3952)
    • Creates files in the program directory

      • yuie9i75.exe (PID: 1560)
      • 37osoum5.exe (PID: 2476)
    • Creates files in the Windows directory

      • 37osoum5.exe (PID: 2476)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 1248)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 2696)
      • WINWORD.EXE (PID: 1036)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2696)
      • WINWORD.EXE (PID: 1036)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 1036)
      • WINWORD.EXE (PID: 2696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:09:26 00:08:09+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 305664
InitializedDataSize: 709632
UninitializedDataSize: -
EntryPoint: 0x2ff70
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 8.3.3.6
ProductVersionNumber: 8.3.3.6
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: Graphite
FileDescription: Letters Initguid Increaseuserva Ties Escaping Emails
FileVersion: 8.3.3.6
LegalCopyright: Copyright (c) 2014 - . All rights reserved. Accomplice
InternalName: Graphite
CompanyName: Accomplice
ProductVersion: 8.3.3.6

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 25-Sep-2019 22:08:09
Detected languages:
  • English - United States
ProductName: Graphite
FileDescription: Letters Initguid Increaseuserva Ties Escaping Emails
FileVersion: 8.3.3.6
LegalCopyright: Copyright (c) 2014 - . All rights reserved. Accomplice
InternalName: Graphite
CompanyName: Accomplice
ProductVersion: 8.3.3.6

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 25-Sep-2019 22:08:09
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00064000
0x00001654
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.48625
.rdata
0x0004C000
0x00011A4A
0x00011C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04837
.data
0x0005E000
0x000055E8
0x00002800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.43125
.rsrc
0x00066000
0x00093BEB
0x00093C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.08646
.reloc
0x000FA000
0x00003BC4
0x00003C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.63481

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.06677
539
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.96648
4264
Latin 1 / Western European
English - United States
RT_ICON
3
4.71272
1128
Latin 1 / Western European
English - United States
RT_ICON
5
3.97688
198302
UNKNOWN
UNKNOWN
TEXT
99
7.99655
81238
Latin 1 / Western European
English - United States
TEXT
101
2.45849
48
Latin 1 / Western European
English - United States
RT_GROUP_ICON
272
7.96778
202810
Latin 1 / Western European
English - United States
CUSTOM
3343
7.99348
60534
Latin 1 / Western European
English - United States
AFX
5063
2.93618
1064
Latin 1 / Western European
English - United States
RT_BITMAP
9110
4.89468
4138
Latin 1 / Western European
English - United States
RT_BITMAP

Imports

ADVAPI32.dll
COMDLG32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
PSAPI.DLL
SETUPAPI.dll
USER32.dll
WTSAPI32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
7
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BETABOT yuie9i75.exe #BETABOT explorer.exe Shell Security Editor no specs #BETABOT 37osoum5.exe regedit.exe #BETABOT winword.exe no specs #BETABOT winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1036"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\viewstyle.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\secur32.dll
1248C:\Windows\explorer.exeC:\Windows\explorer.exe
yuie9i75.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\systemroot\system32\ntdll.dll
c:\windows\explorer.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1520"C:\Windows\regedit.exe"C:\Windows\regedit.exe
37osoum5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1560"C:\Users\admin\AppData\Local\Temp\yuie9i75.exe" C:\Users\admin\AppData\Local\Temp\yuie9i75.exe
explorer.exe
User:
admin
Company:
Accomplice
Integrity Level:
MEDIUM
Description:
Letters Initguid Increaseuserva Ties Escaping Emails
Exit code:
0
Version:
8.3.3.6
Modules
Images
c:\users\admin\appdata\local\temp\yuie9i75.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2476"C:\ProgramData\Google Updater 2.09\37osoum5.exe" /uac /ifeo "" "C:\Windows\system32\eudcedit.exe" C:\ProgramData\Google Updater 2.09\37osoum5.exe
explorer.exe
User:
admin
Company:
Accomplice
Integrity Level:
HIGH
Description:
Letters Initguid Increaseuserva Ties Escaping Emails
Exit code:
0
Version:
8.3.3.6
Modules
Images
c:\programdata\google updater 2.09\37osoum5.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2696"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\cnetanything.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\secur32.dll
3952C:\Windows\system32\DllHost.exe /Processid:{4D111E08-CBF7-4F12-A926-2C7920AF52FC}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
2 673
Read events
1 814
Write events
567
Delete events
292

Modification events

(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Google Updater
Operation:writeName:LastUpdate
Value:
567A3D80F321CE31A589FFBD87660AA2
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:72335710f377fc
Value:
120008000E000A00E30708000E000A00E307
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:ccf4560c448c987299
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:8a39a5518f345
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:3ebd6c510ff4684aa9
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:8507f0ede4f
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:51af665bebc38cca82
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:5e28126e721
Value:
00000000
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:ebad1b19c5bff65258
Value:
FCF678679568F33AAEBB6CFE434525EDC6D2322B
(PID) Process:(1560) yuie9i75.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14E51F82\31b643bcee3b
Operation:writeName:584460e1c2a5fa
Value:
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
Executable files
2
Suspicious files
1
Text files
5
Unknown types
7

Dropped files

PID
Process
Filename
Type
1560yuie9i75.exeC:\Users\admin\AppData\Local\Temp\~DF335760275206C9BC.TMP
MD5:
SHA256:
1560yuie9i75.exeC:\Users\admin\AppData\Local\Temp\~DF12ECA94D9E147385.TMP
MD5:
SHA256:
247637osoum5.exeC:\Users\admin\AppData\Local\Temp\~DFD203C4056690E5A3.TMP
MD5:
SHA256:
247637osoum5.exeC:\Users\admin\AppData\Local\Temp\~DF6041BEDA901A90C8.TMP
MD5:
SHA256:
2696WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRAA9D.tmp.cvr
MD5:
SHA256:
2696WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{12B6E0FB-B581-4C56-B929-F6DFA372E434}.tmp
MD5:
SHA256:
2696WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3A9098A4-BAE1-4E22-850B-EA36F5245E48}.tmp
MD5:
SHA256:
2696WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{CB249097-69C4-47F1-A294-6AE2FA1F4176}.tmp
MD5:
SHA256:
1036WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR1D5C.tmp.cvr
MD5:
SHA256:
1036WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E4ADA562-691F-43E3-835D-0AE2BF197E51}.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
5
DNS requests
7
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1248
explorer.exe
GET
27.254.86.9:80
http://balloonaa.com/web/ultimo.exe
TH
malicious
1248
explorer.exe
GET
27.254.86.9:80
http://balloonaa.com/web/ultimo.exe
TH
malicious
1248
explorer.exe
GET
200
27.254.86.9:80
http://balloonaa.com/web/ultimo.exe
TH
executable
2.44 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1248
explorer.exe
52.137.90.34:80
windowsupdate.microsoft.com
Microsoft Corporation
US
malicious
1248
explorer.exe
27.254.86.9:80
balloonaa.com
CS LOXINFO Public Company Limited.
TH
malicious
1248
explorer.exe
145.249.104.56:80
russk9.icu
Quasi Networks LTD.
ES
malicious

DNS requests

Domain
IP
Reputation
windowsupdate.microsoft.com
  • 52.137.90.34
malicious
russk6.icu
malicious
russk7.icu
unknown
russk8.icu
unknown
russk9.icu
  • 145.249.104.56
malicious
balloonaa.com
  • 27.254.86.9
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
1248
explorer.exe
A Network Trojan was detected
ET TROJAN Win32/Neurevt.A/Betabot Check-in 4
1248
explorer.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.icu domain
1248
explorer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1248
explorer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1248
explorer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1 ETPRO signatures available at the full report
No debug info