download:

yf

Full analysis: https://app.any.run/tasks/361a7db0-ed1f-4fa3-b5eb-062a7e73f583
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 20, 2019, 20:25:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
loader
stealer
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

1C3553B215663EFCCA2C01CB23C3D516

SHA1:

717B00990A9DC3F1B086F673C8C8508AF1482FDF

SHA256:

3F535F0AA1187AA388C6DA77586A5AE8C80286659CFD6C98EC217731B77D21D9

SSDEEP:

96:DG/Jn9TntCg7Sgl1rNXKI8vHxRXrAtVuFVCgakbuzzn:DG/Jn9TnMaSgPVK9vHxRXrwVuFVCgakA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • psgold_31_2018[1].exe (PID: 3164)
      • psgold_31_2018[1].exe (PID: 2900)
      • proshow.exe (PID: 408)
      • psgold_31_2018[1].exe (PID: 3564)
      • Adobe CS3 Design Premium Keygen.exe (PID: 2880)
      • psgold_31_2018[1].exe (PID: 948)
      • Adobe Dreamweaver CS3 Keygen.exe (PID: 3076)
      • proshow.exe (PID: 2856)
      • psgold_31_2018.exe (PID: 2532)
      • psgold_31_2018.exe (PID: 3680)
      • proshow.exe (PID: 552)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3540)
    • Stealing of credential data

      • proshow.exe (PID: 408)
      • proshow.exe (PID: 2856)
    • Loads dropped or rewritten executable

      • proshow.exe (PID: 408)
      • proshow.exe (PID: 2856)
      • proshow.exe (PID: 552)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3540)
      • psgold_31_2018[1].exe (PID: 2900)
      • iexplore.exe (PID: 2716)
      • WinRAR.exe (PID: 3916)
      • psgold_31_2018[1].exe (PID: 948)
      • psgold_31_2018.exe (PID: 2532)
      • WinRAR.exe (PID: 1876)
    • Creates files in the user directory

      • proshow.exe (PID: 408)
      • proshow.exe (PID: 2856)
    • Reads Internet Cache Settings

      • proshow.exe (PID: 408)
      • proshow.exe (PID: 2856)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 2840)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 2872)
      • iexplore.exe (PID: 3540)
    • Application launched itself

      • iexplore.exe (PID: 2716)
    • Changes internet zones settings

      • iexplore.exe (PID: 2716)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2872)
      • iexplore.exe (PID: 3540)
      • iexplore.exe (PID: 2716)
    • Creates files in the user directory

      • iexplore.exe (PID: 3540)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2716)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2716)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2716)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 1876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

Title: Index of /yf
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
19
Malicious processes
6
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe no specs iexplore.exe psgold_31_2018[1].exe no specs psgold_31_2018[1].exe winrar.exe no specs proshow.exe cmd.exe no specs notepad.exe no specs winrar.exe adobe cs3 design premium keygen.exe no specs adobe dreamweaver cs3 keygen.exe no specs psgold_31_2018[1].exe no specs psgold_31_2018[1].exe proshow.exe winrar.exe psgold_31_2018.exe no specs psgold_31_2018.exe proshow.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
408C:\Users\admin\AppData\Local\Temp\mvu17CC.tmp\proshow.exe -stub C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\psgold_31_2018[1].exe,""C:\Users\admin\AppData\Local\Temp\mvu17CC.tmp\proshow.exe
psgold_31_2018[1].exe
User:
admin
Company:
Photodex
Integrity Level:
HIGH
Description:
compupic
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\mvu17cc.tmp\proshow.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
552C:\Users\admin\AppData\Local\Temp\mvuD962.tmp\proshow.exe -stub C:\Users\admin\AppData\Local\Temp\Rar$EXa1876.9358\ProShow Gold 3.1\psgold_31_2018.exe,""C:\Users\admin\AppData\Local\Temp\mvuD962.tmp\proshow.exepsgold_31_2018.exe
User:
admin
Company:
Photodex
Integrity Level:
HIGH
Description:
compupic
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\mvud962.tmp\proshow.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
948"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\psgold_31_2018[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\psgold_31_2018[1].exe
iexplore.exe
User:
admin
Company:
Photodex Corporation
Integrity Level:
HIGH
Description:
Photodex ProShow Setup
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\jgrr2oyx\psgold_31_2018[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
1636"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa2840.49351\res.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1876"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\K8XK8917\ProShow%20Gold%203.1[1].zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2532"C:\Users\admin\AppData\Local\Temp\Rar$EXa1876.9358\ProShow Gold 3.1\psgold_31_2018.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1876.9358\ProShow Gold 3.1\psgold_31_2018.exe
WinRAR.exe
User:
admin
Company:
Photodex Corporation
Integrity Level:
HIGH
Description:
Photodex ProShow Setup
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1876.9358\proshow gold 3.1\psgold_31_2018.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
2716"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\yf.htmC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2840"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\CS4 Crack Final.zip"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2856C:\Users\admin\AppData\Local\Temp\mvu4678.tmp\proshow.exe -stub C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\psgold_31_2018[1].exe,""C:\Users\admin\AppData\Local\Temp\mvu4678.tmp\proshow.exe
psgold_31_2018[1].exe
User:
admin
Company:
Photodex
Integrity Level:
HIGH
Description:
compupic
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\mvu4678.tmp\proshow.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2872"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2716 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
2 710
Read events
2 410
Write events
294
Delete events
6

Modification events

(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{63E609F7-7B3D-11E9-A370-5254004A04AF}
Value:
0
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(2716) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070500010014001400190016006401
Executable files
133
Suspicious files
20
Text files
1 337
Unknown types
18

Dropped files

PID
Process
Filename
Type
2716iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2716iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3540iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\K8XK8917\yf[1].txt
MD5:
SHA256:
2716iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFEC92A48EC8424B25.TMP
MD5:
SHA256:
2872iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019052020190521\index.datdat
MD5:
SHA256:
3540iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:
SHA256:
3540iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\K8XK8917\yf[1].htmhtml
MD5:
SHA256:
3540iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019052020190521\index.datdat
MD5:
SHA256:
3540iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
2716iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{63E609F8-7B3D-11E9-A370-5254004A04AF}.datbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
13
DNS requests
2
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3540
iexplore.exe
GET
74.208.236.170:80
http://mywegsite.com/yf/ADBEPHSPCS3_WWE.exe
US
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/
US
html
1.26 Kb
malicious
2716
iexplore.exe
GET
404
74.208.236.170:80
http://mywegsite.com/favicon.ico
US
html
586 b
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/ProShow%20Gold%203.1.zip
US
compressed
15.6 Mb
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/WebCom_PS_Files/
US
html
555 b
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/
US
html
1.26 Kb
malicious
2716
iexplore.exe
GET
404
74.208.236.170:80
http://mywegsite.com/favicon.ico
US
html
586 b
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/Talmudic%20Ethics/
US
html
1.19 Kb
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/spicons/blank.gif
US
image
148 b
malicious
3540
iexplore.exe
GET
200
74.208.236.170:80
http://mywegsite.com/yf/Talmudic%20Ethics/Picts_7/
US
html
443 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2716
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3540
iexplore.exe
74.208.236.170:80
mywegsite.com
1&1 Internet SE
US
malicious
2716
iexplore.exe
74.208.236.170:80
mywegsite.com
1&1 Internet SE
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
mywegsite.com
  • 74.208.236.170
malicious

Threats

PID
Process
Class
Message
3540
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3540
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info