URL:

https://customdesignservice.teamviewer.com/download/windows/v15/7ekb7ta/TeamViewerQS.exe

Full analysis: https://app.any.run/tasks/7f80d1f4-c8bb-44f4-80c2-f254755f9553
Verdict: Malicious activity
Analysis date: October 20, 2023, 12:59:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

831BD33741675BA4DC01D069E32BB21F

SHA1:

404E49A40615F70CEB269B9B0992F669090DEFF7

SHA256:

411F7C68DDAF62D3AA4AECE125C87F12D65BE3F459C6571A79C97137BA5B8274

SSDEEP:

3:N8NWpBgrAN9iNLdTUfSryZcXRn:2EIr2wN5YfbZQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TeamViewerQS.exe (PID: 3728)
      • tv_w32.exe (PID: 280)
    • Actions looks like stealing of personal data

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Steals credentials from Web Browsers

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Loads dropped or rewritten executable

      • TeamViewer.exe (PID: 1740)
      • tv_w32.exe (PID: 280)
      • TeamViewer.exe (PID: 3316)
    • Drops the executable file immediately after the start

      • TeamViewerQS.exe (PID: 3728)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • TeamViewerQS.exe (PID: 3728)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • TeamViewerQS.exe (PID: 3728)
    • Drops 7-zip archiver for unpacking

      • TeamViewerQS.exe (PID: 3728)
    • Reads the Internet Settings

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
      • TeamViewerQS.exe (PID: 3728)
    • Reads security settings of Internet Explorer

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Checks Windows Trust Settings

      • TeamViewer.exe (PID: 1740)
      • tv_w32.exe (PID: 280)
      • TeamViewer.exe (PID: 3316)
    • Reads settings of System Certificates

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Application launched itself

      • TeamViewer.exe (PID: 1740)
    • Reads Microsoft Outlook installation path

      • TeamViewer.exe (PID: 3316)
    • Connects to unusual port

      • TeamViewer.exe (PID: 3316)
  • INFO

    • Loads dropped or rewritten executable

      • TeamViewerQS.exe (PID: 3728)
    • Reads the computer name

      • TeamViewerQS.exe (PID: 3728)
      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
      • TeamViewer.exe (PID: 1740)
    • Checks supported languages

      • TeamViewerQS.exe (PID: 3728)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 1740)
    • Create files in a temporary directory

      • TeamViewerQS.exe (PID: 3728)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3520)
      • iexplore.exe (PID: 3584)
    • Application launched itself

      • iexplore.exe (PID: 3584)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3584)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3552)
    • Creates files or folders in the user directory

      • TeamViewer.exe (PID: 3316)
    • Process checks computer location settings

      • TeamViewer.exe (PID: 3316)
    • Reads the time zone

      • TeamViewer.exe (PID: 3316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe teamviewerqs.exe no specs wmpnscfg.exe no specs teamviewer.exe teamviewer.exe tv_w32.exe

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Users\admin\AppData\Local\Temp\TeamViewer\tv_w32.exe" --action hooks --log C:\Users\admin\AppData\Local\Temp\TeamViewer\tv_w32.exe
TeamViewer.exe
User:
SYSTEM
Company:
TeamViewer Germany GmbH
Integrity Level:
SYSTEM
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\users\admin\appdata\local\temp\teamviewer\tv_w32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
1740"C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe" --configuration 7ekb7taC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
TeamViewerQS.exe
User:
admin
Company:
TeamViewer Germany GmbH
Integrity Level:
MEDIUM
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\teamviewer\teamviewer.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
3316"C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe" --configuration 7ekb7ta --dreC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
TeamViewer.exe
User:
admin
Company:
TeamViewer Germany GmbH
Integrity Level:
HIGH
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\teamviewer\teamviewer.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3520"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3584 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3552"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3584"C:\Program Files\Internet Explorer\iexplore.exe" "https://customdesignservice.teamviewer.com/download/windows/v15/7ekb7ta/TeamViewerQS.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3728"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\TeamViewerQS.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\TeamViewerQS.exeiexplore.exe
User:
admin
Company:
TeamViewer
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\teamviewerqs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
26 368
Read events
26 254
Write events
109
Delete events
5

Modification events

(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
53
Suspicious files
25
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
3728TeamViewerQS.exeC:\Users\admin\AppData\Local\Temp\TeamViewer\tvqsfiles.7z
MD5:
SHA256:
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:E856DA158EC32219AF87F39772805F1F
SHA256:6C41AE747DB1F12B3A1C19A35B18661617FDD0797F28D07C3500C198A0198E9A
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:12A13AA482F7E5659E7C4335F729F1ED
SHA256:C4E46C28FB9AB5ECFB8941074868877B5B859C3A018C19C15713B0F6EFD9F05F
3728TeamViewerQS.exeC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
MD5:
SHA256:
3520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\TeamViewerQS[1].exeexecutable
MD5:2BB924B2E8BDEF19BC858B3FD9BE88B1
SHA256:94D177F6031E178950F63A5245205F14C3C9D171987D8715824D9A8E265A32F2
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:B351E989A01E201DE84319285B32957E
SHA256:B5A38EAD255F486AA6DD5723CC2A9B997A2C0DB375877BA4673FE1EEF2531100
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:93DD3276F51BA946CE8CF8B0EE1BA1CA
SHA256:04B1211C14D570A7EB07BA9895FFC34C21B7B010543532EA99BD92C80B9ED1B7
3584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver81BC.tmpxml
MD5:CBD0581678FA40F0EDCBC7C59E0CAD10
SHA256:159BD4343F344A08F6AF3B716B6FA679859C1BD1D7030D26FF5EF0255B86E1D9
3728TeamViewerQS.exeC:\Users\admin\AppData\Local\Temp\TeamViewer\CopyrightQS.txttext
MD5:1056072F17BECB959BCD4610BDDC72E9
SHA256:E009178CA5DB7F64893A2B1CC34FAA91ED290DF9B3ED6B71CAEF83D728B8294E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
13
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3520
iexplore.exe
GET
200
104.18.15.101:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
binary
1.42 Kb
unknown
3584
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
3520
iexplore.exe
GET
200
104.18.15.101:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
binary
2.18 Kb
unknown
3520
iexplore.exe
GET
200
8.248.147.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b40315f06fd1d4d8
unknown
compressed
4.66 Kb
unknown
3520
iexplore.exe
GET
200
8.248.147.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?060020e49c501eb3
unknown
compressed
4.66 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3520
iexplore.exe
8.248.147.254:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
4
System
192.168.100.255:137
whitelisted
3520
iexplore.exe
104.18.15.101:80
ocsp.comodoca.com
CLOUDFLARENET
unknown
4
System
192.168.100.255:138
whitelisted
3584
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
3584
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1740
TeamViewer.exe
137.117.216.27:443
configdl.teamviewer.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3316
TeamViewer.exe
137.117.216.27:443
configdl.teamviewer.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3316
TeamViewer.exe
37.252.232.107:5938
router5.teamviewer.com
ANEXIA Internetdienstleistungs GmbH
GB
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 8.248.147.254
  • 8.241.121.126
  • 67.27.159.254
  • 67.27.234.126
  • 67.27.235.126
whitelisted
ocsp.comodoca.com
  • 104.18.15.101
  • 104.18.14.101
whitelisted
ocsp.usertrust.com
  • 104.18.15.101
  • 104.18.14.101
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
configdl.teamviewer.com
  • 137.117.216.27
unknown
router5.teamviewer.com
  • 37.252.232.107
  • 178.255.155.171
  • 188.172.198.145
  • 217.146.8.71
  • 188.172.254.135
unknown

Threats

No threats detected
No debug info