URL:

https://www.majorgeeks.com/mg/getmirror/hashtab,1.html

Full analysis: https://app.any.run/tasks/434c4947-3226-468d-a68c-96e8b0e2fa53
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 19, 2019, 15:53:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

2A4D1CA6F23A8B63F10A3A81AA0045EA

SHA1:

C3243DA71D8262A66D026C68983B296A16937705

SHA256:

378CC7FA2DAF65E514C09600CDD2B3240A59D33009B5FC71E8FE4160ECAC0CC2

SSDEEP:

3:N8DSLsXDAOmIxXX5FREpSNuJ:2OLsH9ASNuJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • HashTab_v6.0.0.34_Setup[1].exe (PID: 1560)
      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3292)
    • Loads dropped or rewritten executable

      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3292)
      • iexplore.exe (PID: 2848)
      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
    • Creates COM task schedule object

      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
    • Creates files in the program directory

      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
    • Creates a software uninstall entry

      • HashTab_v6.0.0.34_Setup[1].exe (PID: 2972)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2848)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3292)
    • Dropped object may contain TOR URL's

      • iexplore.exe (PID: 3292)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3292)
      • iexplore.exe (PID: 2060)
      • iexplore.exe (PID: 2848)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3292)
      • iexplore.exe (PID: 2060)
    • Creates files in the user directory

      • iexplore.exe (PID: 3292)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3356)
      • iexplore.exe (PID: 2060)
    • Changes internet zones settings

      • iexplore.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe hashtab_v6.0.0.34_setup[1].exe no specs hashtab_v6.0.0.34_setup[1].exe

Process information

PID
CMD
Path
Indicators
Parent process
1560"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\HashTab_v6.0.0.34_Setup[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\HashTab_v6.0.0.34_Setup[1].exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\d2ypij90\hashtab_v6.0.0.34_setup[1].exe
c:\systemroot\system32\ntdll.dll
2060"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2848 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2848"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2972"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\HashTab_v6.0.0.34_Setup[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2YPIJ90\HashTab_v6.0.0.34_Setup[1].exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\d2ypij90\hashtab_v6.0.0.34_setup[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3292"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2848 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3356C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
1 549
Read events
1 092
Write events
453
Delete events
4

Modification events

(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{8925F68F-345E-11E9-AA93-5254004A04AF}
Value:
0
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070200020013000F0035002D00BD02
Executable files
6
Suspicious files
13
Text files
113
Unknown types
32

Dropped files

PID
Process
Filename
Type
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabEFA4.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarEFA5.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabEFB5.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarEFC6.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabF073.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarF074.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabF0A4.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarF0A5.tmp
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\horizontal-slim-10_7[1].css
MD5:
SHA256:
3292iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\hashtab,1[1].htmlhtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
49
DNS requests
27
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2060
iexplore.exe
GET
200
161.47.7.14:80
http://www.reimageplus.com/lp/majorgeeks/index.php?tracking=Majorgeeks&banner=dltxt&adgroup=direct&ads_name=direct&keyword=direct&nms=1
US
html
2.35 Kb
suspicious
2060
iexplore.exe
GET
200
161.47.7.14:80
http://www.reimageplus.com/lp/majorgeeks/index_src.php?tracking=Majorgeeks&banner=dltxt&adgroup=direct&ads_name=direct&keyword=direct&nms=1
US
html
6.38 Kb
suspicious
2060
iexplore.exe
GET
200
161.47.7.14:80
http://www.reimageplus.com/lp/majorgeeks/css/majorgeeks.css
US
text
1.54 Kb
suspicious
2060
iexplore.exe
GET
200
205.185.208.80:80
http://cdnrep.reimage.com/website/newwebsite/lp/majorgeeks/mg_728x90.png
US
image
23.4 Kb
whitelisted
2060
iexplore.exe
GET
200
161.47.7.14:80
http://www.reimageplus.com/lp/majorgeeks/flowplayer.js
US
text
34.5 Kb
suspicious
2060
iexplore.exe
GET
200
205.185.208.80:80
http://cdnrep.reimage.com/website/newwebsite/lp/majorgeeks/dll.gif
US
image
1.59 Kb
whitelisted
2060
iexplore.exe
GET
200
143.204.214.100:80
http://images.scanalert.com/meter/www.reimageplus.com/23.gif
US
image
2.93 Kb
shared
2060
iexplore.exe
GET
200
161.47.7.14:80
http://www.reimageplus.com/assets/styles/jquery.fancybox/jquery.fancybox-2.css
US
text
1.57 Kb
suspicious
2060
iexplore.exe
GET
200
205.185.208.80:80
http://cdnrep.reimage.com/website/newwebsite/lp/majorgeeks/logo.jpg
US
image
30.7 Kb
whitelisted
2060
iexplore.exe
GET
200
205.185.208.80:80
http://cdnrep.reimage.com/website/newwebsite/lp/majorgeeks/l_u_corner.png
US
image
286 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3292
iexplore.exe
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3292
iexplore.exe
172.217.18.98:443
adservice.google.no
Google Inc.
US
whitelisted
3292
iexplore.exe
107.178.250.25:443
cdn.addnow.com
Google Inc.
US
whitelisted
3292
iexplore.exe
31.13.90.36:443
www.facebook.com
Facebook, Inc.
IE
whitelisted
3292
iexplore.exe
172.217.23.174:443
www.google-analytics.com
Google Inc.
US
whitelisted
3292
iexplore.exe
31.13.90.6:443
static.xx.fbcdn.net
Facebook, Inc.
IE
whitelisted
2848
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3292
iexplore.exe
23.111.189.3:443
www.majorgeeks.com
HIVELOCITY VENTURES CORP
US
unknown
3292
iexplore.exe
172.217.18.2:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
3292
iexplore.exe
74.125.140.95:443
ajax.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
www.majorgeeks.com
  • 23.111.189.3
suspicious
cdn-images.mailchimp.com
  • 143.204.211.232
whitelisted
pagead2.googlesyndication.com
  • 172.217.18.2
whitelisted
ajax.googleapis.com
  • 74.125.140.95
  • 108.177.15.95
  • 173.194.76.95
  • 74.125.133.95
  • 64.233.184.95
  • 64.233.167.95
  • 216.58.205.234
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.18.170
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
  • 216.58.207.74
  • 172.217.16.170
  • 216.58.208.42
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.22.106
  • 172.217.18.106
whitelisted
ads.pro-market.net
  • 23.37.60.144
whitelisted
majorgeeks-d.openx.net
  • 173.241.240.220
unknown
x.ss2.us
  • 143.204.208.228
  • 143.204.208.42
  • 143.204.208.196
  • 143.204.208.222
whitelisted
adservice.google.com
  • 216.58.210.2
whitelisted
adservice.google.no
  • 172.217.18.98
whitelisted

Threats

PID
Process
Class
Message
3292
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2060
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Outdated Flash Version M1
No debug info