| File name: | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe |
| Full analysis: | https://app.any.run/tasks/4943f00e-ed5a-4204-9d10-dd4b7c0b7f58 |
| Verdict: | Malicious activity |
| Threats: | DBatLoader is a loader malware used for distributing payloads of different types, including WarzoneRAT and Formbook. It is employed in multi-stage attacks that usually start with a phishing email carrying a malicious attachment. |
| Analysis date: | March 03, 2025, 02:24:36 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections |
| MD5: | 6F1EAD21AA70A3E69CD5C69595FC7916 |
| SHA1: | 5FEACB3A236A1E2A981540ACA03FC6AB16D2AA76 |
| SHA256: | 36F19CCDFA20772EBEB1C2A89E0EDD174465F5AC697323B4AB05C2A46EC1A1A7 |
| SSDEEP: | 49152:B28B1RuRISXmT1sD/F2UoAIsw5/5w5/5w5/5w5/S/o/5/o/5/o/5/o/muUwhEycS:96AJbU8lWlWlWlKslslslsUwuycH8qg9 |
| .scr | | | Windows screen saver (43.2) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (21.7) |
| .exe | | | Win32 Executable (generic) (14.8) |
| .exe | | | Win16/32 Executable Delphi generic (6.8) |
| .exe | | | Generic Win/DOS Executable (6.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:19 22:22:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 471040 |
| InitializedDataSize: | 1412608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x747c8 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 4180 | C:\Users\Public\Libraries\ktfomwzY.pif | C:\Users\Public\Libraries\ktfomwzY.pif | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | ||||||||||||
User: admin Company: David Harris Integrity Level: MEDIUM Description: Mercury/32 Loader Module v4.62 Version: 4.62 Modules
XWorm(PID) Process(4180) ktfomwzY.pif C223.94.126.41:8888 Keys AES<123456789> Options Splitter<Xwormmm> Sleep time3 USB drop nameXWorm V5.6 MutexjJ8yoJzLryDQI8pN | |||||||||||||||
| 6572 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7368 | "C:\Users\admin\Desktop\36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe" | C:\Users\admin\Desktop\36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7660 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\Public\YzwmoftkF.cmd" " | C:\Windows\SysWOW64\cmd.exe | — | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7668 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7744 | C:\WINDOWS\system32\cmd.exe /c C:\Users\Public\Libraries\\Yzwmoftk99.cmd | C:\Windows\SysWOW64\cmd.exe | — | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7752 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7808 | extrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pif | C:\Windows\SysWOW64\extrac32.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® CAB File Extract Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7848 | C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif | C:\Users\Public\ndpha.pif | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7884 | "C:\Windows \SysWOW64\svchost.pif" | C:\Windows \SysWOW64\svchost.pif | — | ndpha.pif | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Exchange ActiveSync Invoker Exit code: 3221226540 Version: 10.0.22621.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7848) ndpha.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8080 | extrac32.exe | C:\Users\Public\Upha.pif | executable | |
MD5:3FB5CF71F7E7EB49790CB0E663434D80 | SHA256:41F067C3A11B02FE39947F9EBA68AE5C7CB5BD1872A6009A4CD1506554A9ABA9 | |||
| 8144 | aken.pif | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_jnxnat05.3qt.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7368 | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | C:\Windows \SysWOW64\svchost.pif | executable | |
MD5:869640D0A3F838694AB4DFEA9E2F544D | SHA256:0DB4D3FFDB96D13CF3B427AF8BE66D985728C55AE254E4B67D287797E4C0B323 | |||
| 8144 | aken.pif | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ccke40zz.cti.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7368 | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | C:\Users\Public\YzwmoftkF.cmd | text | |
MD5:616F542F94791979D27798E12FE9374B | SHA256:D3C9DDAA8DEBFA28BFDFF1DFC8C5BA4E11E39C7D9029EAD83C874FCFC8325DDB | |||
| 7368 | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | C:\Users\Public\Libraries\Yzwmoftk99.cmd | text | |
MD5:D202469089FA5EC9032F44408562F842 | SHA256:9C330F29B95689D3AB2F7A461479CD87869464CC03E53B0D8FF5727BAA8DA979 | |||
| 7368 | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | C:\Users\Public\Libraries\NEO.cmd | text | |
MD5:D9B276C49813262BA64F91B640235BA9 | SHA256:67BB0E1739291769728FE9E8A77F6E8F5CF506CCF617D55A3349B0A7542D49A5 | |||
| 7368 | 36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7.exe | C:\Windows \SysWOW64\NETUTILS.dll | executable | |
MD5:1E2A3532537D01C1BE8597C87D8918C3 | SHA256:FCBEA11F75B132FC4A6746F80F62DA0064C61092CFCD15CC12879BB95DA5048A | |||
| 8044 | extrac32.exe | C:\Users\Public\alpha.pif | executable | |
MD5:CB6CD09F6A25744A8FA6E4B3E4D260C5 | SHA256:265B69033CEA7A9F8214A34CD9B17912909AF46C7A47395DD7BB893A24507E59 | |||
| 8104 | extrac32.exe | C:\Users\Public\aken.pif | executable | |
MD5:2E5A8590CF6848968FC23DE3FA1E25F1 | SHA256:9785001B0DCF755EDDB8AF294A373C0B87B2498660F724E76C4D53F9C217C7A3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4208 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4180 | ktfomwzY.pif | 23.94.126.41:8888 | — | AS-COLOCROSSING | US | malicious |
7280 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6572 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4180 | ktfomwzY.pif | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] Xworm TCP Packet |