URL:

http://d.updater.3u.com/3utools/download/3uTools_v2.39.033_Setup.exe

Full analysis: https://app.any.run/tasks/0a93911d-b826-4d13-843c-e8470c1bdc70
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 28, 2020, 19:48:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

EE7D36BAD8A08D424A444B2C48A19FD5

SHA1:

EFD30080DEDEBA5A12293DBA37D0902DCB05F3D9

SHA256:

3C9553244351342915C8B0A6E6AD34E125FCF2D7D9AB28DB6125C191F52688D8

SSDEEP:

3:N1KaLABQQtbJN8LWDKJ9nylA:CaLkQk8iknylA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 3uTools_v2.39.033_Setup.exe (PID: 3952)
      • HeicViewer.exe (PID: 4008)
      • 3uTools.exe (PID: 1008)
      • 3uTools_v2.39.033_Setup.exe (PID: 580)
    • Loads dropped or rewritten executable

      • 3uTools.exe (PID: 1008)
      • HeicViewer.exe (PID: 4008)
    • Downloads executable files from the Internet

      • chrome.exe (PID: 4040)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2136)
      • 3uTools_v2.39.033_Setup.exe (PID: 3952)
    • Modifies the open verb of a shell class

      • 3uTools.exe (PID: 1008)
      • HeicViewer.exe (PID: 4008)
    • Creates a software uninstall entry

      • 3uTools.exe (PID: 1008)
      • 3uTools_v2.39.033_Setup.exe (PID: 3952)
    • Creates files in the program directory

      • 3uTools.exe (PID: 1008)
      • 3uTools_v2.39.033_Setup.exe (PID: 3952)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2136)
      • chrome.exe (PID: 4040)
    • Application launched itself

      • chrome.exe (PID: 2136)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2136)
    • Dropped object may contain Bitcoin addresses

      • 3uTools_v2.39.033_Setup.exe (PID: 3952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
15
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs 3utools_v2.39.033_setup.exe no specs 3utools_v2.39.033_setup.exe 3utools.exe heicviewer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
580"C:\Users\admin\Downloads\3uTools_v2.39.033_Setup.exe" C:\Users\admin\Downloads\3uTools_v2.39.033_Setup.exechrome.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\3utools_v2.39.033_setup.exe
c:\systemroot\system32\ntdll.dll
1008"C:\Program Files\3uTools\3uTools.exe" C:\Program Files\3uTools\3uTools.exe
3uTools_v2.39.033_Setup.exe
User:
admin
Company:
ShangHai ZhangZheng Network Technology Co., Ltd.
Integrity Level:
HIGH
Description:
3uTools
Exit code:
0
Version:
2.3.9.0
Modules
Images
c:\program files\3utools\3utools.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\3utools\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1148"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,10253346330047560420,1781267851849524344,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5021137851367407988 --mojo-platform-channel-handle=3528 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1464"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2132 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10253346330047560420,1781267851849524344,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=18169409209157839643 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1796"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10253346330047560420,1781267851849524344,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4369522162330013468 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2136"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://d.updater.3u.com/3utools/download/3uTools_v2.39.033_Setup.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2192"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1020,10253346330047560420,1781267851849524344,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=9429696383852586251 --mojo-platform-channel-handle=1112 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2560"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6ec5a9d0,0x6ec5a9e0,0x6ec5a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2768"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10253346330047560420,1781267851849524344,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4511906466208467263 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
1 181
Read events
1 080
Write events
98
Delete events
3

Modification events

(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1464) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2136-13240439306035500
Value:
259
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2832-13239195546717773
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
209
Suspicious files
26
Text files
168
Unknown types
19

Dropped files

PID
Process
Filename
Type
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\b6ebced3-b8f5-403a-9acb-aaac52543da6.tmp
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFd6988.TMPtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFd6969.TMPtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabsbinary
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RFd69a7.TMPtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RFd69c6.TMPtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
50
DNS requests
17
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/update?v=2.39.033&d=1
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/bMJjMraa?pc_vs=2.39.033
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/Z3QJvuaa?pc_vs=2.39.033
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/vIJJbqaa
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/i2qEFzaa
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/7Rn6Jvaa
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/ZZRf2eaa
US
suspicious
1008
3uTools.exe
GET
302
163.171.132.119:80
http://url.3u.com/QnYzE3aa
US
suspicious
4040
chrome.exe
GET
200
163.171.132.19:80
http://d.updater.3u.com/3utools/download/3uTools_v2.39.033_Setup.exe
US
executable
109 Mb
malicious
1008
3uTools.exe
GET
200
163.171.132.19:80
http://d.updater.3u.com/3utools/configs/more_devices/iPhone_SE_silver.png
US
image
66.2 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4040
chrome.exe
216.58.205.227:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
4040
chrome.exe
172.217.18.13:443
accounts.google.com
Google Inc.
US
whitelisted
1008
3uTools.exe
163.171.132.19:80
d.updater.3u.com
US
suspicious
1008
3uTools.exe
95.100.72.131:443
secure-appldnld.apple.com
Akamai Technologies, Inc.
unknown
4040
chrome.exe
216.58.205.238:443
clients1.google.com
Google Inc.
US
whitelisted
4040
chrome.exe
163.171.132.19:80
d.updater.3u.com
US
suspicious
4040
chrome.exe
172.217.21.227:443
ssl.gstatic.com
Google Inc.
US
whitelisted
216.58.212.174:443
sb-ssl.google.com
Google Inc.
US
whitelisted
4040
chrome.exe
172.217.18.170:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
1008
3uTools.exe
163.171.132.119:80
url.3u.com
US
malicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 216.58.205.227
whitelisted
d.updater.3u.com
  • 163.171.132.19
  • 163.171.132.115
  • 163.171.132.122
  • 163.171.132.18
malicious
accounts.google.com
  • 172.217.18.13
shared
ssl.gstatic.com
  • 172.217.21.227
whitelisted
www.gstatic.com
  • 172.217.21.227
whitelisted
sb-ssl.google.com
  • 216.58.212.174
whitelisted
clients1.google.com
  • 216.58.205.238
whitelisted
url.3u.com
  • 163.171.132.119
suspicious
ios.pclog.3u.com
  • 163.171.132.119
malicious
www.3u.com
  • 163.171.132.119
malicious

Threats

PID
Process
Class
Message
4040
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
1008
3uTools.exe
Potentially Bad Traffic
ET INFO Double User-Agent (User-Agent User-Agent)
Process
Message
3uTools.exe
QCoreApplication::applicationDirPath: Please instantiate the QApplication object first
3uTools.exe
localhost server bind port succed!
3uTools.exe
MainWindows Size Mismatch: QRect(0,0 1060x780)