File name:

file

Full analysis: https://app.any.run/tasks/e3b48555-573d-4c12-a83b-df970a4e33e6
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 28, 2024, 23:10:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
opendir
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

4FED3D45C6E03E3C723F2BAE2678B6CA

SHA1:

B6C5A52D130573F8FACBA126CAF3F5F50C7E8D69

SHA256:

36DBD88E04005441A30022160E04C365B046526B4A384D6B32262F277746B7FE

SSDEEP:

3072:FM1yAl98XxdfPwx+YLNC38tgdfPwx+YLNedfPwd+YLmQ:FM1bYdfYQOCrdfYQOedfYM1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • file.exe (PID: 6308)
    • Potential Corporate Privacy Violation

      • file.exe (PID: 6308)
      • update.exe (PID: 6972)
    • Executable content was dropped or overwritten

      • file.exe (PID: 6308)
      • update.exe (PID: 6972)
    • Process drops legitimate windows executable

      • file.exe (PID: 6308)
    • Connects to the server without a host name

      • update.exe (PID: 6972)
    • Process requests binary or script from the Internet

      • update.exe (PID: 6972)
  • INFO

    • Reads the machine GUID from the registry

      • file.exe (PID: 6308)
    • Disables trace logs

      • file.exe (PID: 6308)
    • Checks supported languages

      • file.exe (PID: 6308)
    • Create files in a temporary directory

      • file.exe (PID: 6308)
    • Checks proxy server information

      • file.exe (PID: 6308)
    • Reads the computer name

      • file.exe (PID: 6308)
    • Sends debugging messages

      • file.exe (PID: 6308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (72.2)
.scr | Windows screen saver (12.9)
.dll | Win32 Dynamic Link Library (generic) (6.4)
.exe | Win32 Executable (generic) (4.4)
.exe | Generic Win/DOS Executable (1.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:18 06:43:49+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 82944
InitializedDataSize: 21504
UninitializedDataSize: -
EntryPoint: 0x1638e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Rif Cabal Online Launcher
CompanyName: Cabal Online
FileDescription: Rif Cabal Online Launcher
FileVersion: 1.0.0.1
InternalName: cabal.exe
LegalCopyright: Copyright © Rif Cabal Online 2018
LegalTrademarks: Rif Cabal Online
OriginalFileName: cabal.exe
ProductName: Rif Cabal Online
ProductVersion: 1.0.0.1
AssemblyVersion: 1.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start file.exe update.exe file.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4472"C:\Users\admin\AppData\Local\Temp\file.exe" C:\Users\admin\AppData\Local\Temp\file.exeexplorer.exe
User:
admin
Company:
Cabal Online
Integrity Level:
MEDIUM
Description:
Rif Cabal Online Launcher
Exit code:
3221226540
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6308"C:\Users\admin\AppData\Local\Temp\file.exe" C:\Users\admin\AppData\Local\Temp\file.exe
explorer.exe
User:
admin
Company:
Cabal Online
Integrity Level:
HIGH
Description:
Rif Cabal Online Launcher
Exit code:
4294967295
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6972"C:\Users\admin\AppData\Local\Temp\update.exe" mmoparadoxC:\Users\admin\AppData\Local\Temp\update.exe
file.exe
User:
admin
Company:
RIF
Integrity Level:
HIGH
Description:
RIF Launcher
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\update.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
2 269
Read events
2 238
Write events
31
Delete events
0

Modification events

(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6308) file.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6308file.exeC:\Users\admin\AppData\Local\Temp\SevenZipSharp.dllexecutable
MD5:05C9849856ABC683BCBC5C8D7921C146
SHA256:49284B31F28D0A62D797CFCF17F464C8C2B22B29D0E8AB7C15C94724D83E595C
6308file.exeC:\Users\admin\AppData\Local\Temp\update.exeexecutable
MD5:C759782F6ADB12299D675EC619B53572
SHA256:9318F8895D9613EAA8CBB0986D389A9480EBDCD7331383DB911EB58211206E24
6972update.exeC:\Users\admin\AppData\Local\Temp\cabal.exeexecutable
MD5:4FED3D45C6E03E3C723F2BAE2678B6CA
SHA256:36DBD88E04005441A30022160E04C365B046526B4A384D6B32262F277746B7FE
6308file.exeC:\Users\admin\AppData\Local\Temp\System.Windows.Interactivity.dllexecutable
MD5:3AB57A33A6E3A1476695D5A6E856C06A
SHA256:4AACE8C8A330AE8429CD8CC1B6804076D3A9FFD633470F91FD36BDD25BB57876
6972update.exeC:\Users\admin\AppData\Local\Temp\main.datbinary
MD5:5C76D529171BD1E07E258D342AC7E59C
SHA256:917D0908B4371943C4168344A36BD3F862685BC29450A18EA93ACFB111DC9DEC
6308file.exeC:\Users\admin\AppData\Local\Temp\resources.xmlxml
MD5:79F786AEF8D3B710973C0275A36955C8
SHA256:4158BD0FD5D17AD69CEBC58C5003AA5037F4DFE5A4021897571C8FCF081614FA
6972update.exeC:\Users\admin\AppData\Local\Temp\resources.xmlxml
MD5:79F786AEF8D3B710973C0275A36955C8
SHA256:4158BD0FD5D17AD69CEBC58C5003AA5037F4DFE5A4021897571C8FCF081614FA
6972update.exeC:\Users\admin\AppData\Local\Temp\mainEX.datbinary
MD5:242B66F61D075F06316774148ED7B361
SHA256:E5F6ED0C70D8E2E172F0DECD93CEEC55341DC6D0DC910308129F364645F64180
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
44
DNS requests
18
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6308
file.exe
GET
200
194.233.88.151:80
http://194.233.88.151/ep33//resources.xml
unknown
unknown
6308
file.exe
GET
194.233.88.151:80
http://194.233.88.151/ep33//client/update.exe
unknown
unknown
6972
update.exe
GET
404
194.233.88.151:80
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.php?t=9/28/2024%2011:10:28%20PM
unknown
unknown
6972
update.exe
GET
200
194.233.88.151:80
http://194.233.88.151/ep33//resources.xml
unknown
unknown
5880
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6972
update.exe
GET
200
194.233.88.151:80
http://194.233.88.151/ep33/client/cabal.exe
unknown
unknown
6328
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2708
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2708
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4288
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4324
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6308
file.exe
194.233.88.151:80
Contabo Asia Private Limited
SG
unknown
4288
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6972
update.exe
194.233.88.151:80
Contabo Asia Private Limited
SG
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
s4.gtsystems.hu
  • 185.6.188.137
unknown
login.live.com
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.23
  • 40.126.31.67
  • 20.190.159.0
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 40.113.103.199
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
6308
file.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6308
file.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6308
file.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6308
file.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6308
file.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
6308
file.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
6308
file.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
6972
update.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6972
update.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6972
update.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Process
Message
file.exe
Downloading resources.xml
file.exe
Loaded resources.xml
file.exe
FileDownloader | Download failed for source: http://194.233.88.151/ep33//client/7z.dll