File name:

File_patched.exe

Full analysis: https://app.any.run/tasks/c8ee1528-2bff-4f34-961f-7b9069421955
Verdict: Malicious activity
Threats:

PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware.

Analysis date: July 22, 2024, 14:52:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
privateloader
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

E8A8D55B8AAFA2FBAA103826FA155398

SHA1:

9707C41D54434D195086B9CD8C48EBE55D50ACF6

SHA256:

39B12A0B45BB75DDD3FD333A6C97C31C7928C547D5EBC620730C90CFB92C7233

SSDEEP:

98304:0ccJ6jbuXW2TELVL3HqLfLv6uMBoplUjYxzu2y1Scz30YgN6l8rPBx8efISInmN6:HkjvipXnLCm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • File_patched.exe (PID: 8180)
    • Changes the Windows auto-update feature

      • File_patched.exe (PID: 8180)
    • Actions looks like stealing of personal data

      • File_patched.exe (PID: 8180)
    • PRIVATELOADER has been detected (SURICATA)

      • File_patched.exe (PID: 8180)
    • Connects to the CnC server

      • File_patched.exe (PID: 8180)
    • PRIVATELOADER has been detected (YARA)

      • File_patched.exe (PID: 8180)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • File_patched.exe (PID: 8180)
    • Checks for external IP

      • File_patched.exe (PID: 8180)
    • Checks Windows Trust Settings

      • File_patched.exe (PID: 8180)
    • Executes application which crashes

      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Connects to the server without a host name

      • File_patched.exe (PID: 8180)
    • Potential Corporate Privacy Violation

      • File_patched.exe (PID: 8180)
  • INFO

    • Checks supported languages

      • File_patched.exe (PID: 8180)
      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Process checks computer location settings

      • File_patched.exe (PID: 8180)
    • Reads the computer name

      • File_patched.exe (PID: 8180)
      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Reads the machine GUID from the registry

      • File_patched.exe (PID: 8180)
    • Checks proxy server information

      • File_patched.exe (PID: 8180)
    • Creates files or folders in the user directory

      • File_patched.exe (PID: 8180)
      • WerFault.exe (PID: 7240)
    • Reads the software policy settings

      • File_patched.exe (PID: 8180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:07:22 04:10:07+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 1177088
InitializedDataSize: 463360
UninitializedDataSize: -
EntryPoint: 0x2d2765
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Tyrrrz
FileDescription: LightBulb Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: LightBulb
ProductVersion: 2.6
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PRIVATELOADER file_patched.exe z2sopaxdpdw148yfdkczwuep.exe werfault.exe no specs slui.exe no specs file_patched.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3328"C:\Users\admin\AppData\Local\Temp\File_patched.exe" C:\Users\admin\AppData\Local\Temp\File_patched.exeexplorer.exe
User:
admin
Company:
Tyrrrz
Integrity Level:
MEDIUM
Description:
LightBulb Setup
Exit code:
3221226540
Version:
Modules
Images
c:\users\admin\appdata\local\temp\file_patched.exe
c:\windows\system32\ntdll.dll
4092C:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exe C:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exe
File_patched.exe
User:
admin
Company:
Latvia misprinting
Integrity Level:
HIGH
Description:
Subaltern distil sanction insanity sunned lifeanddeath
Exit code:
3221225477
Version:
5.11.239.2
Modules
Images
c:\users\admin\documents\piratemamm\z2sopaxdpdw148yfdkczwuep.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5660C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7240C:\WINDOWS\system32\WerFault.exe -u -p 4092 -s 444C:\Windows\System32\WerFault.exeZ2SOpaxDPdw148yFDKCzwUeP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
8180"C:\Users\admin\AppData\Local\Temp\File_patched.exe" C:\Users\admin\AppData\Local\Temp\File_patched.exe
explorer.exe
User:
admin
Company:
Tyrrrz
Integrity Level:
HIGH
Description:
LightBulb Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\file_patched.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 658
Read events
3 557
Write events
70
Delete events
31

Modification events

(PID) Process:(8180) File_patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules
Operation:writeName:C:\
Value:
1
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\AppHVSI
Operation:writeName:AllowAppHVSI_ProviderSet
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\EdgeUpdate
Operation:writeName:UpdateDefault
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\Network Connections
Operation:writeName:NC_DoNotShowLocalOnlyIcon
Value:
1
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\Windows Feeds
Operation:writeName:EnableFeeds
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUStatusServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:UpdateServiceUrlAlternate
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:**del.FillEmptyContentUrls
Value:
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Operation:writeName:UseWUServer
Value:
1
Executable files
0
Suspicious files
10
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Z2SOpaxDPdw148yF_ca2fcef508d7d204c359537a8eb765a15cae063_f028f696_1d2172e0-9797-495f-a623-22cd9ba83e01\Report.wer
MD5:
SHA256:
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB15E.tmp.WERInternalMetadata.xmlxml
MD5:353C178D0B78936EF3262A76362CADC8
SHA256:0C36AF45724795D42A7CC48D6B5FAEBB9BA1E4874381FD08DF6D9B750656737D
8180File_patched.exeC:\WINDOWS\System32\GroupPolicy\Machine\Registry.polbinary
MD5:8C49DAA7D041CF94B84B491FF44A0915
SHA256:87826FFBE97A6F8C9B9BC24D016214488D77917D91CB606F33DD71251B7A6A79
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\351809EA8413AE0AA50BAEE3C04D84F6binary
MD5:023E0A51A27E527C2C9EA720CE2FBAE5
SHA256:77C167E4546EC3BB78F789234DA6F62926F40141D6AC45362F7273D30045D9CE
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\731067BF8D7976C075349ACF768DDFB7binary
MD5:EEE7A53BB313CD1720AF4A4B5B7ABD03
SHA256:962557D2FF42FCEBD0251E2DF5AE3297E421C4F28B3E733DC59BCFB118C20907
7240WerFault.exeC:\WINDOWS\AppCompat\Programs\Amcache.hvebinary
MD5:4F3C78838B0AA5C4DA008F6E0767E779
SHA256:39CAF752208BD9321F5CC3A771984A68360D42BFA0B3D59A0649A495233C5541
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\351809EA8413AE0AA50BAEE3C04D84F6binary
MD5:0DB8DC01246057B54A7C23125B5605A7
SHA256:D9ACC98815C2EC09DF489E930D2777F1CADD096036F89965CE2E31C6E3F9E032
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB17E.tmp.xmlxml
MD5:D36A1F5E0DE0CE2C294967CDDBAB59F2
SHA256:EDD4041FCBDFB6A35541E85359CA13CCDA52087BBCD8261832CD94F92363C3EC
8180File_patched.exeC:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exebinary
MD5:7D7048444D4A71E38A1BD16B3252873E
SHA256:C2570C9EC105ED62DDBE709F1A88FDD3FBE08E704D5A7B71A45E5E1CB261B4C0
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB0B1.tmp.dmpdmp
MD5:3BEBEFCB28A1CAE553522E8FC1C65838
SHA256:2E6635A2B25C2E312EA1B815CC2BBBBAFA6CF7F7344FCDF6CD29EE346F2EAF6D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
44
DNS requests
22
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8180
File_patched.exe
GET
200
109.120.176.203:80
http://109.120.176.203/api/crazyfish.php
unknown
unknown
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/rootr5/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQiD0S5cIHyfrLTJ1fvAkJWflH%2B2QQUPeYpSJvqB8ohREom3m7e0oPQn1kCDQHuXyKVQkkF%2BQGRqNw%3D
unknown
whitelisted
8180
File_patched.exe
POST
200
109.120.176.203:80
http://109.120.176.203/api/twofish.php
unknown
unknown
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDHmsXXQgoaZQ4a3ukw%3D%3D
unknown
whitelisted
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDB8VCpIoQMc6D1nxwA%3D%3D
unknown
whitelisted
8180
File_patched.exe
POST
200
109.120.176.203:80
http://109.120.176.203/api/twofish.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
whitelisted
4716
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5620
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7856
svchost.exe
4.209.32.67:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
2168
svchost.exe
224.0.0.251:5353
unknown
2168
svchost.exe
224.0.0.252:5355
whitelisted
8180
File_patched.exe
109.120.176.203:80
RU
unknown
8180
File_patched.exe
172.67.75.163:443
api.myip.com
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.71
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.74
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.72
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.238
whitelisted
api.myip.com
  • 172.67.75.163
  • 104.26.8.59
  • 104.26.9.59
whitelisted
ipinfo.io
  • 34.117.59.81
shared
client.wns.windows.com
  • 40.115.3.253
whitelisted
vk.com
  • 87.240.137.164
  • 87.240.132.72
  • 87.240.132.78
  • 87.240.132.67
  • 87.240.129.133
  • 93.186.225.194
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
sun6-20.userapi.com
  • 95.142.206.0
whitelisted

Threats

PID
Process
Class
Message
8180
File_patched.exe
Device Retrieving External IP Address Detected
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
8180
File_patched.exe
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
8180
File_patched.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io)
2168
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
8180
File_patched.exe
A Network Trojan was detected
LOADER [ANY.RUN] PrivateLoader Check-in
2168
svchost.exe
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (iplogger .org in DNS Lookup)
8180
File_patched.exe
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (iplogger .org in TLS SNI)
No debug info