File name: | file |
Full analysis: | https://app.any.run/tasks/64b0ba45-e7ce-423b-9a1d-5b4ea59521e6 |
Verdict: | Malicious activity |
Analysis date: | January 27, 2023, 09:03:56 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 531981FA2658977F0ECDAD58E88F3037 |
SHA1: | A32FBF450455E965B54506DEA14438E0598A8E08 |
SHA256: | 3ECD4763FFC944FDC67A9027E459CD4F448B1A8D1B36147977AFAF86BBF2A261 |
SSDEEP: | 196608:91OyP3N/E1u7Yz/qped/kgyLPFZRsCu3hOCVci8L4Xt7uhwp1K:3OI3a1u0KeSgIHRsCuwCVciZXRNK |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2010-Nov-18 16:27:35 |
Detected languages: |
|
CompanyName: | Igor Pavlov |
FileDescription: | 7z Setup SFX |
FileVersion: | 9.20 |
InternalName: | 7zS.sfx |
LegalCopyright: | Copyright (c) 1999-2010 Igor Pavlov |
OriginalFilename: | 7zS.sfx.exe |
ProductName: | 7-Zip |
ProductVersion: | 9.20 |
e_magic: | MZ |
---|---|
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | - |
e_cparhdr: | 4 |
e_minalloc: | - |
e_maxalloc: | 65535 |
e_ss: | - |
e_sp: | 184 |
e_csum: | - |
e_ip: | - |
e_cs: | - |
e_ovno: | - |
e_oemid: | - |
e_oeminfo: | - |
e_lfanew: | 232 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 5 |
TimeDateStamp: | 2010-Nov-18 16:27:35 |
PointerToSymbolTable: | - |
NumberOfSymbols: | - |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 4096 | 104938 | 104960 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.60849 |
.rdata | 110592 | 17556 | 17920 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.36802 |
.data | 131072 | 23112 | 12800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.37054 |
.sxdata | 155648 | 4 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0203931 |
.rsrc | 159744 | 2656 | 3072 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.30196 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.75404 | 744 | UNKNOWN | English - United States | RT_ICON |
2 | 3.18403 | 296 | UNKNOWN | English - United States | RT_ICON |
5 | 1.43775 | 52 | UNKNOWN | English - United States | RT_STRING |
500 | 3.09294 | 184 | UNKNOWN | English - United States | RT_DIALOG |
1 (#2) | 2.78284 | 148 | UNKNOWN | English - United States | RT_STRING |
1 (#3) | 2.37086 | 34 | UNKNOWN | English - United States | RT_GROUP_ICON |
1 (#4) | 3.44049 | 700 | UNKNOWN | English - United States | RT_VERSION |
KERNEL32.dll |
OLEAUT32.dll |
SHELL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1344 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Igor Pavlov Integrity Level: MEDIUM Description: 7z Setup SFX Exit code: 3221226540 Version: 9.20 Modules
| |||||||||||||||
2032 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | Explorer.EXE | ||||||||||||
User: admin Company: Igor Pavlov Integrity Level: HIGH Description: 7z Setup SFX Exit code: 0 Version: 9.20 Modules
| |||||||||||||||
2028 | .\Install.exe | C:\Users\admin\AppData\Local\Temp\7zS4C1D.tmp\Install.exe | file.exe | ||||||||||||
User: admin Company: Igor Pavlov Integrity Level: HIGH Description: 7z Setup SFX Exit code: 0 Version: 9.20 Modules
| |||||||||||||||
1988 | .\Install.exe /S /site_id "525403" | C:\Users\admin\AppData\Local\Temp\7zS4E7E.tmp\Install.exe | Install.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
1768 | "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&" | C:\Windows\SysWOW64\forfiles.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: ForFiles - Executes a command on selected files Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1672 | "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&" | C:\Windows\SysWOW64\forfiles.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: ForFiles - Executes a command on selected files Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
124 | /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64& | C:\Windows\SysWOW64\cmd.exe | — | forfiles.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1960 | /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64& | C:\Windows\SysWOW64\cmd.exe | — | forfiles.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2368 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32 | c:\windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2380 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32 | c:\windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (1988) Install.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (1988) Install.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (1988) Install.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (1988) Install.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2368) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions |
Operation: | write | Name: | exe |
Value: 0 | |||
(PID) Process: | (2380) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet |
Operation: | write | Name: | SpyNetReporting |
Value: 0 | |||
(PID) Process: | (2864) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions |
Operation: | write | Name: | exe |
Value: 0 | |||
(PID) Process: | (2872) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet |
Operation: | write | Name: | SpyNetReporting |
Value: 0 | |||
(PID) Process: | (2192) powershell.EXE | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\14C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2192) powershell.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2032 | file.exe | C:\Users\admin\AppData\Local\Temp\7zS4C1D.tmp\__data__\config.txt | binary | |
MD5:D251554B249B6EFD4EDE16A6856714BF | SHA256:72EED68238E3741EA36DC941030876B4CD777646C639D4DA8FA8B5073BF77824 | |||
2192 | powershell.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | binary | |
MD5:F6C846D320239C7EF5513019C0EE4A53 | SHA256:7CAF7E561AA0BAC5AD5C0D3FC1C8B306AE90B7D7F73DBD19044C0B6FAC804D15 | |||
2192 | powershell.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\696U1H2VGZ7QUBUI4KZE.temp | binary | |
MD5:F6C846D320239C7EF5513019C0EE4A53 | SHA256:7CAF7E561AA0BAC5AD5C0D3FC1C8B306AE90B7D7F73DBD19044C0B6FAC804D15 | |||
2192 | powershell.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RFd5fc4.TMP | binary | |
MD5:D12147D4849A339C8508A67CDAA0F9AD | SHA256:9A4E0139A51B4755DAA7A3F6BA321F4021E17602696176CA40C2D4C2522956F0 | |||
2028 | Install.exe | C:\Users\admin\AppData\Local\Temp\7zS4E7E.tmp\Install.exe | executable | |
MD5:641EADD9585299DDDF46D16A91582FBE | SHA256:D66BEAC01580E9F730480D4CC8091DC582E6D22A40106A5A1C7F8A6FB0712BC8 | |||
2032 | file.exe | C:\Users\admin\AppData\Local\Temp\7zS4C1D.tmp\Install.exe | executable | |
MD5:A5BCAFA4B983E40E80CE5F7D195BF91A | SHA256:692474B8B6306906BDB8DAFF57FABA4AAE6BCAE7F36504872EF6084CC8B790BA | |||
1988 | Install.exe | C:\Windows\system32\GroupPolicy\gpt.ini | text | |
MD5:A62CE44A33F1C05FC2D340EA0CA118A4 | SHA256:9F2CD4ACF23D565BC8498C989FCCCCF59FD207EF8925111DC63E78649735404A | |||
2384 | schtasks.exe | C:\Windows\Tasks\baqkzymadDkdbhQsxA.job | binary | |
MD5:7FA18054BB1C5D09F6136FB21F1272F4 | SHA256:890B7234968534EC2E23998D87066EA65F50758C095C04664CA0AF266D2FC07E | |||
2192 | powershell.EXE | C:\Users\admin\AppData\Local\Temp\ehto2dxd.3u5.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
2192 | powershell.EXE | C:\Users\admin\AppData\Local\Temp\uejazlxz.2j2.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1440 | FHYQWsM.exe | GET | 200 | 172.217.18.99:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
2972 | rundll32.exe | POST | 200 | 54.185.139.178:80 | http://api2.check-data.xyz/api2/google_api_ifi | US | — | — | malicious |
1440 | FHYQWsM.exe | GET | 200 | 184.24.77.69:80 | http://apps.identrust.com/roots/dstrootcax3.p7c | US | cat | 893 b | shared |
1440 | FHYQWsM.exe | GET | 200 | 172.217.18.99:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEFy5J6A6YKVTEoiTk%2FRTejk%3D | US | der | 471 b | whitelisted |
1440 | FHYQWsM.exe | GET | 200 | 23.45.105.185:80 | http://x1.c.lencr.org/ | NL | der | 717 b | whitelisted |
1440 | FHYQWsM.exe | GET | 200 | 172.217.18.99:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDrLFyBxR1WMQr6Mn9JjdU0 | US | der | 472 b | whitelisted |
1440 | FHYQWsM.exe | GET | 200 | 184.24.77.52:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgRB7A5ys5XSOpfz0dPt7QOXbw%3D%3D | US | der | 503 b | shared |
1440 | FHYQWsM.exe | GET | 200 | 178.79.242.128:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9a13c8621d408546 | DE | compressed | 4.70 Kb | whitelisted |
1440 | FHYQWsM.exe | GET | 200 | 172.217.18.99:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D | US | der | 724 b | whitelisted |
1440 | FHYQWsM.exe | GET | 200 | 178.79.242.128:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?9a88ea110ce21994 | DE | compressed | 61.4 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1440 | FHYQWsM.exe | 184.24.77.52:80 | r3.o.lencr.org | Akamai International B.V. | DE | malicious |
1440 | FHYQWsM.exe | 142.250.185.138:443 | www.googleapis.com | GOOGLE | US | whitelisted |
1440 | FHYQWsM.exe | 172.217.18.99:80 | ocsp.pki.goog | GOOGLE | US | whitelisted |
1440 | FHYQWsM.exe | 178.79.242.128:80 | ctldl.windowsupdate.com | LLNW | DE | malicious |
1440 | FHYQWsM.exe | 3.80.150.121:443 | service-domain.xyz | AMAZON-AES | US | suspicious |
1440 | FHYQWsM.exe | 172.217.18.14:443 | clients2.google.com | GOOGLE | US | whitelisted |
2972 | rundll32.exe | 54.185.139.178:80 | api2.check-data.xyz | AMAZON-02 | US | malicious |
1440 | FHYQWsM.exe | 184.24.77.69:80 | apps.identrust.com | Akamai International B.V. | DE | suspicious |
1440 | FHYQWsM.exe | 23.45.105.185:80 | x1.c.lencr.org | AKAMAI-AS | DE | unknown |
Domain | IP | Reputation |
---|---|---|
teredo.ipv6.microsoft.com |
| whitelisted |
service-domain.xyz |
| suspicious |
ctldl.windowsupdate.com |
| whitelisted |
apps.identrust.com |
| shared |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
www.googleapis.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
clients2.google.com |
| whitelisted |
api2.check-data.xyz |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |
— | — | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |