File name:

File_patched.exe

Full analysis: https://app.any.run/tasks/c8ee1528-2bff-4f34-961f-7b9069421955
Verdict: Malicious activity
Threats:

PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware.

Analysis date: July 22, 2024, 14:52:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
privateloader
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

E8A8D55B8AAFA2FBAA103826FA155398

SHA1:

9707C41D54434D195086B9CD8C48EBE55D50ACF6

SHA256:

39B12A0B45BB75DDD3FD333A6C97C31C7928C547D5EBC620730C90CFB92C7233

SSDEEP:

98304:0ccJ6jbuXW2TELVL3HqLfLv6uMBoplUjYxzu2y1Scz30YgN6l8rPBx8efISInmN6:HkjvipXnLCm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • File_patched.exe (PID: 8180)
    • Changes the Windows auto-update feature

      • File_patched.exe (PID: 8180)
    • PRIVATELOADER has been detected (SURICATA)

      • File_patched.exe (PID: 8180)
    • Connects to the CnC server

      • File_patched.exe (PID: 8180)
    • Actions looks like stealing of personal data

      • File_patched.exe (PID: 8180)
    • PRIVATELOADER has been detected (YARA)

      • File_patched.exe (PID: 8180)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • File_patched.exe (PID: 8180)
    • Checks Windows Trust Settings

      • File_patched.exe (PID: 8180)
    • Checks for external IP

      • File_patched.exe (PID: 8180)
    • Connects to the server without a host name

      • File_patched.exe (PID: 8180)
    • Executes application which crashes

      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Potential Corporate Privacy Violation

      • File_patched.exe (PID: 8180)
  • INFO

    • Reads the computer name

      • File_patched.exe (PID: 8180)
      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Process checks computer location settings

      • File_patched.exe (PID: 8180)
    • Reads the machine GUID from the registry

      • File_patched.exe (PID: 8180)
    • Checks supported languages

      • File_patched.exe (PID: 8180)
      • Z2SOpaxDPdw148yFDKCzwUeP.exe (PID: 4092)
    • Creates files or folders in the user directory

      • File_patched.exe (PID: 8180)
      • WerFault.exe (PID: 7240)
    • Checks proxy server information

      • File_patched.exe (PID: 8180)
    • Reads the software policy settings

      • File_patched.exe (PID: 8180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:07:22 04:10:07+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 1177088
InitializedDataSize: 463360
UninitializedDataSize: -
EntryPoint: 0x2d2765
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Tyrrrz
FileDescription: LightBulb Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: LightBulb
ProductVersion: 2.6
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PRIVATELOADER file_patched.exe z2sopaxdpdw148yfdkczwuep.exe werfault.exe no specs slui.exe no specs file_patched.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3328"C:\Users\admin\AppData\Local\Temp\File_patched.exe" C:\Users\admin\AppData\Local\Temp\File_patched.exeexplorer.exe
User:
admin
Company:
Tyrrrz
Integrity Level:
MEDIUM
Description:
LightBulb Setup
Exit code:
3221226540
Version:
Modules
Images
c:\users\admin\appdata\local\temp\file_patched.exe
c:\windows\system32\ntdll.dll
4092C:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exe C:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exe
File_patched.exe
User:
admin
Company:
Latvia misprinting
Integrity Level:
HIGH
Description:
Subaltern distil sanction insanity sunned lifeanddeath
Exit code:
3221225477
Version:
5.11.239.2
Modules
Images
c:\users\admin\documents\piratemamm\z2sopaxdpdw148yfdkczwuep.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5660C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7240C:\WINDOWS\system32\WerFault.exe -u -p 4092 -s 444C:\Windows\System32\WerFault.exeZ2SOpaxDPdw148yFDKCzwUeP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
8180"C:\Users\admin\AppData\Local\Temp\File_patched.exe" C:\Users\admin\AppData\Local\Temp\File_patched.exe
explorer.exe
User:
admin
Company:
Tyrrrz
Integrity Level:
HIGH
Description:
LightBulb Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\file_patched.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 658
Read events
3 557
Write events
70
Delete events
31

Modification events

(PID) Process:(8180) File_patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules
Operation:writeName:C:\
Value:
1
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\AppHVSI
Operation:writeName:AllowAppHVSI_ProviderSet
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\EdgeUpdate
Operation:writeName:UpdateDefault
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\Network Connections
Operation:writeName:NC_DoNotShowLocalOnlyIcon
Value:
1
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\Windows Feeds
Operation:writeName:EnableFeeds
Value:
0
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUStatusServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:UpdateServiceUrlAlternate
Value:
http://neverupdatewindows10.com
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:**del.FillEmptyContentUrls
Value:
(PID) Process:(8180) File_patched.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{B22D3B6D-E271-4366-A4CF-38307843663E}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Operation:writeName:UseWUServer
Value:
1
Executable files
0
Suspicious files
10
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Z2SOpaxDPdw148yF_ca2fcef508d7d204c359537a8eb765a15cae063_f028f696_1d2172e0-9797-495f-a623-22cd9ba83e01\Report.wer
MD5:
SHA256:
8180File_patched.exeC:\WINDOWS\System32\GroupPolicy\gpt.initext
MD5:3D89F23265C9E30A0CF055C3EB4D637C
SHA256:806582F6221C79BD4C7EACDC4B63E937CE247EEE2BA159F55C545CDFB2B1C25B
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\351809EA8413AE0AA50BAEE3C04D84F6binary
MD5:023E0A51A27E527C2C9EA720CE2FBAE5
SHA256:77C167E4546EC3BB78F789234DA6F62926F40141D6AC45362F7273D30045D9CE
8180File_patched.exeC:\WINDOWS\System32\GroupPolicy\Machine\Registry.polbinary
MD5:8C49DAA7D041CF94B84B491FF44A0915
SHA256:87826FFBE97A6F8C9B9BC24D016214488D77917D91CB606F33DD71251B7A6A79
7240WerFault.exeC:\WINDOWS\AppCompat\Programs\Amcache.hvebinary
MD5:4F3C78838B0AA5C4DA008F6E0767E779
SHA256:39CAF752208BD9321F5CC3A771984A68360D42BFA0B3D59A0649A495233C5541
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\731067BF8D7976C075349ACF768DDFB7binary
MD5:5F0A4CF1FA57545718CD5C45B4C79DB1
SHA256:2D1CABB97AA06EA9DD0879860DD42F559BB62AB3569DF6F5883157B8D4861F98
7240WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB17E.tmp.xmlxml
MD5:D36A1F5E0DE0CE2C294967CDDBAB59F2
SHA256:EDD4041FCBDFB6A35541E85359CA13CCDA52087BBCD8261832CD94F92363C3EC
8180File_patched.exeC:\Users\admin\Documents\piratemamm\Z2SOpaxDPdw148yFDKCzwUeP.exebinary
MD5:7D7048444D4A71E38A1BD16B3252873E
SHA256:C2570C9EC105ED62DDBE709F1A88FDD3FBE08E704D5A7B71A45E5E1CB261B4C0
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046binary
MD5:3615B404CA5944F213F7F46DD13FFF19
SHA256:DF3EE5AE58EF6AD4F82F6FD02C6C42479B1A3DBB4B1F61A34C66057201BF9E6A
8180File_patched.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046binary
MD5:184E822136BD0C070CF2273673C1AD11
SHA256:8DBFAFDCF552FA14EA97BF51F11BDAA92DB85F2B42182F8C98CB98062A433ED4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
44
DNS requests
22
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8180
File_patched.exe
GET
200
109.120.176.203:80
http://109.120.176.203/api/crazyfish.php
unknown
8180
File_patched.exe
POST
200
109.120.176.203:80
http://109.120.176.203/api/twofish.php
unknown
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/rootr5/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQiD0S5cIHyfrLTJ1fvAkJWflH%2B2QQUPeYpSJvqB8ohREom3m7e0oPQn1kCDQHuXyKVQkkF%2BQGRqNw%3D
unknown
whitelisted
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDHmsXXQgoaZQ4a3ukw%3D%3D
unknown
whitelisted
8180
File_patched.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDB8VCpIoQMc6D1nxwA%3D%3D
unknown
whitelisted
8180
File_patched.exe
POST
200
109.120.176.203:80
http://109.120.176.203/api/twofish.php
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
whitelisted
4716
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5620
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7856
svchost.exe
4.209.32.67:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
2168
svchost.exe
224.0.0.251:5353
unknown
2168
svchost.exe
224.0.0.252:5355
whitelisted
8180
File_patched.exe
109.120.176.203:80
RU
unknown
8180
File_patched.exe
172.67.75.163:443
api.myip.com
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.71
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.74
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.72
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.238
whitelisted
api.myip.com
  • 172.67.75.163
  • 104.26.8.59
  • 104.26.9.59
whitelisted
ipinfo.io
  • 34.117.59.81
shared
client.wns.windows.com
  • 40.115.3.253
whitelisted
vk.com
  • 87.240.137.164
  • 87.240.132.72
  • 87.240.132.78
  • 87.240.132.67
  • 87.240.129.133
  • 93.186.225.194
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
sun6-20.userapi.com
  • 95.142.206.0
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io)
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
A Network Trojan was detected
LOADER [ANY.RUN] PrivateLoader Check-in
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (iplogger .org in DNS Lookup)
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (iplogger .org in TLS SNI)
No debug info