File name:

CuteWriter2.8.exe

Full analysis: https://app.any.run/tasks/e47492d9-33ed-4567-9140-7e87d925273b
Verdict: Malicious activity
Analysis date: May 23, 2024, 12:33:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

90D5D0DA3F9E6EDFAD8C10E859EDCFCA

SHA1:

B9203DF961DA2BE55AA8DF66CEAF63190736404A

SHA256:

3BD83B73B76013E6EE8C119281BFC2D3AF362AD2EF8595CB24FAC6304FC677EB

SSDEEP:

98304:RliI8w7DGiHn8tKRnrBQSdrAf7fvaHORAGjcOMrfe+hfROx27CyFRTo9+Xw0LPhv:F1chhb0c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CuteWriter2.8.exe (PID: 3964)
      • CuteWriter2.8.exe (PID: 1020)
      • CuteWriter2.8.tmp (PID: 2104)
    • Steals credentials from Web Browsers

      • ApnStub.exe (PID: 2108)
    • Actions looks like stealing of personal data

      • ApnStub.exe (PID: 2108)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CuteWriter2.8.exe (PID: 3964)
      • CuteWriter2.8.exe (PID: 1020)
      • CuteWriter2.8.tmp (PID: 2104)
    • Reads the Windows owner or organization settings

      • CuteWriter2.8.tmp (PID: 2104)
    • Process drops legitimate windows executable

      • CuteWriter2.8.tmp (PID: 2104)
    • Reads security settings of Internet Explorer

      • ApnStub.exe (PID: 2108)
    • Reads the Internet Settings

      • ApnStub.exe (PID: 2108)
    • Checks Windows Trust Settings

      • ApnStub.exe (PID: 2108)
    • Reads settings of System Certificates

      • ApnStub.exe (PID: 2108)
    • Adds/modifies Windows certificates

      • ApnStub.exe (PID: 2108)
    • Potential Corporate Privacy Violation

      • ApnStub.exe (PID: 2108)
  • INFO

    • Checks supported languages

      • CuteWriter2.8.exe (PID: 3964)
      • CuteWriter2.8.tmp (PID: 3980)
      • CuteWriter2.8.exe (PID: 1020)
      • CuteWriter2.8.tmp (PID: 2104)
      • ApnStub.exe (PID: 2108)
      • wmpnscfg.exe (PID: 1664)
    • Reads the computer name

      • CuteWriter2.8.tmp (PID: 3980)
      • CuteWriter2.8.tmp (PID: 2104)
      • ApnStub.exe (PID: 2108)
      • wmpnscfg.exe (PID: 1664)
    • Create files in a temporary directory

      • CuteWriter2.8.exe (PID: 3964)
      • CuteWriter2.8.exe (PID: 1020)
      • CuteWriter2.8.tmp (PID: 2104)
      • ApnStub.exe (PID: 2108)
    • Reads the machine GUID from the registry

      • ApnStub.exe (PID: 2108)
    • Reads the software policy settings

      • ApnStub.exe (PID: 2108)
    • Checks proxy server information

      • ApnStub.exe (PID: 2108)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 37888
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0x9c40
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.8.1.0
ProductVersionNumber: 2.8.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: CutePDF Setup
CompanyName: Acro Software Inc.
FileDescription: CutePDF Writer Setup
FileVersion: 2.8.1.0
LegalCopyright:
ProductName: CutePDF Writer
ProductVersion: 2.8.1.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cutewriter2.8.exe cutewriter2.8.tmp no specs cutewriter2.8.exe cutewriter2.8.tmp apnstub.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1020"C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe" /SPAWNWND=$20134 /NOTIFYWND=$20138 C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe
CuteWriter2.8.tmp
User:
admin
Company:
Acro Software Inc.
Integrity Level:
HIGH
Description:
CutePDF Writer Setup
Version:
2.8.1.0
Modules
Images
c:\users\admin\appdata\local\temp\cutewriter2.8.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1664"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2104"C:\Users\admin\AppData\Local\Temp\is-S1MIU.tmp\CuteWriter2.8.tmp" /SL5="$30130,4368895,54272,C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe" /SPAWNWND=$20134 /NOTIFYWND=$20138 C:\Users\admin\AppData\Local\Temp\is-S1MIU.tmp\CuteWriter2.8.tmp
CuteWriter2.8.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-s1miu.tmp\cutewriter2.8.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2108"C:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\ApnStub.exe" /tb=ARSC:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\ApnStub.exe
CuteWriter2.8.tmp
User:
admin
Company:
Ask.com
Integrity Level:
HIGH
Description:
AskStub Application
Exit code:
4294967295
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-8kam4.tmp\apnstub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
3964"C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe" C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe
explorer.exe
User:
admin
Company:
Acro Software Inc.
Integrity Level:
MEDIUM
Description:
CutePDF Writer Setup
Version:
2.8.1.0
Modules
Images
c:\users\admin\appdata\local\temp\cutewriter2.8.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3980"C:\Users\admin\AppData\Local\Temp\is-GOGNU.tmp\CuteWriter2.8.tmp" /SL5="$20138,4368895,54272,C:\Users\admin\AppData\Local\Temp\CuteWriter2.8.exe" C:\Users\admin\AppData\Local\Temp\is-GOGNU.tmp\CuteWriter2.8.tmpCuteWriter2.8.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-gognu.tmp\cutewriter2.8.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
Total events
7 660
Read events
7 610
Write events
39
Delete events
11

Modification events

(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2108) ApnStub.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
6
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2104CuteWriter2.8.tmpC:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\_isetup\_RegDLL.tmpexecutable
MD5:0EE914C6F0BB93996C75941E1AD629C6
SHA256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
2104CuteWriter2.8.tmpC:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
2104CuteWriter2.8.tmpC:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\ApnStub.exeexecutable
MD5:C36923084822C017F69396418A999D39
SHA256:7A158FDEEA8F7107BE5CE40242546A503193AA1C278F74A4730871B8EDD0BA76
3964CuteWriter2.8.exeC:\Users\admin\AppData\Local\Temp\is-GOGNU.tmp\CuteWriter2.8.tmpexecutable
MD5:67C5A4F36E1C91A3B85E440EDD7AD026
SHA256:99C299D6565AB53D9AF66E0146737DC0ECFBC52ECF4740825B552DB0CC4210C6
1020CuteWriter2.8.exeC:\Users\admin\AppData\Local\Temp\is-S1MIU.tmp\CuteWriter2.8.tmpexecutable
MD5:67C5A4F36E1C91A3B85E440EDD7AD026
SHA256:99C299D6565AB53D9AF66E0146737DC0ECFBC52ECF4740825B552DB0CC4210C6
2104CuteWriter2.8.tmpC:\Users\admin\AppData\Local\Temp\is-8KAM4.tmp\ApnIC.dllexecutable
MD5:197215658B8015182192E1EBCA3BBCC3
SHA256:08DB125C09EB53CC28E7BC7C427B6C2217FF6134A122E6D65D1D24F70E875D9E
2108ApnStub.exeC:\Users\admin\AppData\Local\Temp\APNLogs\ic.logcsv
MD5:CABFBDD570E7D03E62B0EF7F19022198
SHA256:FE3B1B7717061E48B2E2AE7D360D645F9FFCEF055CFB629AAB4A6D2A420E3342
2108ApnStub.exeC:\Users\admin\AppData\Local\Temp\APN-Stub\Stb5b809b66-9231-4292-908e-6950ab4e7ed2.logtext
MD5:96683C310DE8720F521E2C9218D21BF5
SHA256:22A619A7C28DFBC7B88D078288112B5A3C49FE0663269B5851E5A995847DD46C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
3
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2108
ApnStub.exe
GET
200
34.117.224.112:80
http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&cb=&encb=&chk=ifdfcr&ts=g1Nv9&guid=4ce38fc0-bde3-42c6-8a35-bbaa3e97fdb6&dt=0&wft=local&harch=32&hloc=en-US&iev=9.11.9600.19596&dbr=&vb=&msi=&inst=&tb=ARS&hos=6.1.1.sp1.x86&dot=6
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
884
svchost.exe
49.13.77.253:80
apnmedia.ask.com
Hetzner Online GmbH
DE
unknown
1064
svchost.exe
239.255.255.250:1900
unknown
2108
ApnStub.exe
49.13.77.253:80
apnmedia.ask.com
Hetzner Online GmbH
DE
unknown
2108
ApnStub.exe
34.117.224.112:80
img.apnanalytics.com
GOOGLE-CLOUD-PLATFORM
US
unknown

DNS requests

Domain
IP
Reputation
apnmedia.ask.com
  • 49.13.77.253
unknown
websearch.ask.com
  • 49.13.77.253
unknown
img.apnanalytics.com
  • 34.117.224.112
unknown

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info