File name:

browser.jpg.bin

Full analysis: https://app.any.run/tasks/d51b2202-e93b-4184-b025-d79d24f474ac
Verdict: Malicious activity
Analysis date: February 18, 2019, 08:53:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8AB9488D8397A8E00E60EC6CBF42AE5E

SHA1:

FDBD5DB9D7C3C10BC1F5752D32874CE6C22ED4CE

SHA256:

33A895FF37AE6EF351624500C2F9783E6EC8E99CB128B16FB053AAABD646AC8C

SSDEEP:

24576:yQHWiG1FduXsnFWp1mvvujb1RQ/sT0pYEX7iSkSNvd6DKOS37NXfAwo3w2IyJasl:yQrG1Fd/nFAO2FksTqwSDADhwt2IiH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • browser.jpg.bin.exe (PID: 3180)
  • SUSPICIOUS

    • Creates files in the program directory

      • browser.jpg.bin.exe (PID: 3180)
    • Executable content was dropped or overwritten

      • browser.jpg.bin.exe (PID: 3180)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • browser.jpg.bin.exe (PID: 3180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:18 09:42:54+01:00
PEType: PE32
LinkerVersion: 9
CodeSize: 2098176
InitializedDataSize: 124416
UninitializedDataSize: -
EntryPoint: 0x200d10
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 14.0.1000.340
ProductVersionNumber: 14.0.1000.340
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: German
CharacterSet: Unicode
Comments: @CompanyName
eUpSoftware: VFileDescription
eUpRegistryEditor: <FileVersion
yrightAVGNetherlandsBV2011: LLegalTrademarks
eUpUtilities: LProductName
eUpUtilities2014: @ProductVersion
Tag01000340: D
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
30
Monitored processes
1
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start browser.jpg.bin.exe

Process information

PID
CMD
Path
Indicators
Parent process
3180"C:\Users\admin\AppData\Local\Temp\browser.jpg.bin.exe" C:\Users\admin\AppData\Local\Temp\browser.jpg.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\browser.jpg.bin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
31
Read events
28
Write events
3
Delete events
0

Modification events

(PID) Process:(3180) browser.jpg.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Windows\Configuration
Operation:writeName:i
Value:
D9AF0D9887E39A1955C0
(PID) Process:(3180) browser.jpg.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Windows Session Manager
Value:
"C:\ProgramData\services\csrss.exe"
(PID) Process:(3180) browser.jpg.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Windows Session Manager
Value:
"C:\ProgramData\services\csrss.exe"
Executable files
1
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3180browser.jpg.bin.exeC:\Users\admin\AppData\Local\Temp\9P2i8FeHvz\state.tmp
MD5:
SHA256:
3180browser.jpg.bin.exeC:\Users\admin\AppData\Local\Temp\9P2i8FeHvz\unverified-microdesc-consensus.tmp
MD5:
SHA256:
3180browser.jpg.bin.exeC:\ProgramData\services\csrss.exeexecutable
MD5:
SHA256:
3180browser.jpg.bin.exeC:\Users\admin\AppData\Local\Temp\9P2I8F~1\unverified-microdesc-consensustext
MD5:
SHA256:
3180browser.jpg.bin.exeC:\Users\admin\AppData\Local\Temp\9P2I8F~1\statetext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3180
browser.jpg.bin.exe
194.109.206.212:443
Xs4all Internet BV
NL
malicious
3180
browser.jpg.bin.exe
154.35.32.5:443
Rethem Hosting LLC
US
suspicious

DNS requests

No data

Threats

PID
Process
Class
Message
3180
browser.jpg.bin.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 270
3180
browser.jpg.bin.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
No debug info