URL:

https://customdesignservice.teamviewer.com/download/windows/v15/7ekb7ta/TeamViewerQS.exe

Full analysis: https://app.any.run/tasks/7f80d1f4-c8bb-44f4-80c2-f254755f9553
Verdict: Malicious activity
Analysis date: October 20, 2023, 12:59:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

831BD33741675BA4DC01D069E32BB21F

SHA1:

404E49A40615F70CEB269B9B0992F669090DEFF7

SHA256:

411F7C68DDAF62D3AA4AECE125C87F12D65BE3F459C6571A79C97137BA5B8274

SSDEEP:

3:N8NWpBgrAN9iNLdTUfSryZcXRn:2EIr2wN5YfbZQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TeamViewerQS.exe (PID: 3728)
      • tv_w32.exe (PID: 280)
    • Actions looks like stealing of personal data

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Steals credentials from Web Browsers

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Drops the executable file immediately after the start

      • TeamViewerQS.exe (PID: 3728)
    • Loads dropped or rewritten executable

      • TeamViewer.exe (PID: 3316)
      • TeamViewer.exe (PID: 1740)
      • tv_w32.exe (PID: 280)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • TeamViewerQS.exe (PID: 3728)
    • The process creates files with name similar to system file names

      • TeamViewerQS.exe (PID: 3728)
    • Drops 7-zip archiver for unpacking

      • TeamViewerQS.exe (PID: 3728)
    • Reads the Internet Settings

      • TeamViewerQS.exe (PID: 3728)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Reads security settings of Internet Explorer

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Checks Windows Trust Settings

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
    • Reads settings of System Certificates

      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Application launched itself

      • TeamViewer.exe (PID: 1740)
    • Reads Microsoft Outlook installation path

      • TeamViewer.exe (PID: 3316)
    • Connects to unusual port

      • TeamViewer.exe (PID: 3316)
  • INFO

    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3520)
      • iexplore.exe (PID: 3584)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3584)
    • Application launched itself

      • iexplore.exe (PID: 3584)
    • Checks supported languages

      • TeamViewerQS.exe (PID: 3728)
      • TeamViewer.exe (PID: 1740)
      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
    • Reads the computer name

      • TeamViewerQS.exe (PID: 3728)
      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
    • Create files in a temporary directory

      • TeamViewerQS.exe (PID: 3728)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
    • Loads dropped or rewritten executable

      • TeamViewerQS.exe (PID: 3728)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3552)
      • TeamViewer.exe (PID: 1740)
      • TeamViewer.exe (PID: 3316)
      • tv_w32.exe (PID: 280)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3552)
    • Creates files or folders in the user directory

      • TeamViewer.exe (PID: 3316)
    • Process checks computer location settings

      • TeamViewer.exe (PID: 3316)
    • Reads the time zone

      • TeamViewer.exe (PID: 3316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe teamviewerqs.exe no specs wmpnscfg.exe no specs teamviewer.exe teamviewer.exe tv_w32.exe

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Users\admin\AppData\Local\Temp\TeamViewer\tv_w32.exe" --action hooks --log C:\Users\admin\AppData\Local\Temp\TeamViewer\tv_w32.exe
TeamViewer.exe
User:
SYSTEM
Company:
TeamViewer Germany GmbH
Integrity Level:
SYSTEM
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\users\admin\appdata\local\temp\teamviewer\tv_w32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
1740"C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe" --configuration 7ekb7taC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
TeamViewerQS.exe
User:
admin
Company:
TeamViewer Germany GmbH
Integrity Level:
MEDIUM
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\teamviewer\teamviewer.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
3316"C:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe" --configuration 7ekb7ta --dreC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
TeamViewer.exe
User:
admin
Company:
TeamViewer Germany GmbH
Integrity Level:
HIGH
Description:
TeamViewer
Exit code:
0
Version:
15.46.7.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\teamviewer\teamviewer.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3520"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3584 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3552"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3584"C:\Program Files\Internet Explorer\iexplore.exe" "https://customdesignservice.teamviewer.com/download/windows/v15/7ekb7ta/TeamViewerQS.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3728"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\TeamViewerQS.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\TeamViewerQS.exeiexplore.exe
User:
admin
Company:
TeamViewer
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\teamviewerqs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
26 368
Read events
26 254
Write events
109
Delete events
5

Modification events

(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3584) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
53
Suspicious files
25
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
3728TeamViewerQS.exeC:\Users\admin\AppData\Local\Temp\TeamViewer\tvqsfiles.7z
MD5:
SHA256:
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:B925BEA345229E336EA5E907DF7A2267
SHA256:86B9A5063CED2B1C32F525B958AE0B8A77921EA4542B6F0993E9EAA33E4BE437
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:12A13AA482F7E5659E7C4335F729F1ED
SHA256:C4E46C28FB9AB5ECFB8941074868877B5B859C3A018C19C15713B0F6EFD9F05F
3728TeamViewerQS.exeC:\Users\admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
MD5:
SHA256:
3584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{80247D2F-6F48-11EE-B150-12A9866C77DE}.datbinary
MD5:F5F3B24CFC4C16C68CC2775EF1649594
SHA256:9EA8362A05F592D19F94DFA8383A7498DDE9E0FE7240A24C00B2C0C518B26F30
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:E856DA158EC32219AF87F39772805F1F
SHA256:6C41AE747DB1F12B3A1C19A35B18661617FDD0797F28D07C3500C198A0198E9A
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:93DD3276F51BA946CE8CF8B0EE1BA1CA
SHA256:04B1211C14D570A7EB07BA9895FFC34C21B7B010543532EA99BD92C80B9ED1B7
3520iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:B351E989A01E201DE84319285B32957E
SHA256:B5A38EAD255F486AA6DD5723CC2A9B997A2C0DB375877BA4673FE1EEF2531100
3584iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF1D7CCA393813016D.TMPbinary
MD5:24BF055BF34B86C64DE616886C697651
SHA256:610D1F0EF2A223B5A240B798001C72416D446087BEE866DAECA780750C90A02E
3520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\TeamViewerQS.exe.wescq7z.partialexecutable
MD5:007D0976D33811FE8ABEAF0A7018F879
SHA256:F8A301964C4710CF7896745EF00C4C76087AC1E8595D299FBD83117ED93AED1C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
13
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3520
iexplore.exe
GET
200
104.18.15.101:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
binary
2.18 Kb
unknown
3520
iexplore.exe
GET
200
8.248.147.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b40315f06fd1d4d8
unknown
compressed
4.66 Kb
unknown
3520
iexplore.exe
GET
200
104.18.15.101:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
binary
1.42 Kb
unknown
3584
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
3520
iexplore.exe
GET
200
8.248.147.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?060020e49c501eb3
unknown
compressed
4.66 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3520
iexplore.exe
8.248.147.254:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
4
System
192.168.100.255:137
whitelisted
3520
iexplore.exe
104.18.15.101:80
ocsp.comodoca.com
CLOUDFLARENET
unknown
4
System
192.168.100.255:138
whitelisted
3584
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
3584
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1740
TeamViewer.exe
137.117.216.27:443
configdl.teamviewer.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3316
TeamViewer.exe
137.117.216.27:443
configdl.teamviewer.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3316
TeamViewer.exe
37.252.232.107:5938
router5.teamviewer.com
ANEXIA Internetdienstleistungs GmbH
GB
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 8.248.147.254
  • 8.241.121.126
  • 67.27.159.254
  • 67.27.234.126
  • 67.27.235.126
whitelisted
ocsp.comodoca.com
  • 104.18.15.101
  • 104.18.14.101
whitelisted
ocsp.usertrust.com
  • 104.18.15.101
  • 104.18.14.101
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
configdl.teamviewer.com
  • 137.117.216.27
unknown
router5.teamviewer.com
  • 37.252.232.107
  • 178.255.155.171
  • 188.172.198.145
  • 217.146.8.71
  • 188.172.254.135
unknown

Threats

No threats detected
No debug info