| File name: | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa |
| Full analysis: | https://app.any.run/tasks/227a5094-5648-40cf-b3cf-fc50b5e4c3c8 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 03, 2024, 02:17:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | DEC4D19A8A4E882E187E5C02883CA15A |
| SHA1: | 02A08E6D43417DF5E28C207545872E0C4259C278 |
| SHA256: | 460CF5F5172C753609FE8F485AC060B45ECAE1197E11C4E28020FCB6E24452AA |
| SSDEEP: | 49152:smiGGTtVvf7eoe5JigwLq4ut3K90oX/FPsh4GjOK9x6N:smiGGTtVvf7ep5JigwLqptylXiqRK9xi |
| .exe | | | Win32 Executable MS Visual C++ (generic) (19.1) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (4) |
| .exe | | | Win32 Executable (generic) (2.7) |
| .exe | | | Generic Win/DOS Executable (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2009:02:20 17:41:25+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 139264 |
| InitializedDataSize: | 225280 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x4490 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.3.0.0 |
| ProductVersionNumber: | 2.3.0.0 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| CompanyName: | 深圳市为爱普信息技术有限公司 |
| FileDescription: | 爱思助手更新程序 |
| FileVersion: | 2,3,0,0 |
| InternalName: | i4Updater |
| LegalCopyright: | Copyright (C) 2015 |
| OriginalFileName: | i4Updater |
| ProductName: | 爱思助手更新程序 |
| ProductVersion: | 2.3.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1116 | "C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe" | C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | 814.pif | ||||||||||||
User: admin Company: 深圳市为爱普信息技术有限公司 Integrity Level: HIGH Description: 爱思助手更新程序 Version: 2,3,0,0 Modules
| |||||||||||||||
| 1756 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3972 | "C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe" | C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | — | explorer.exe | |||||||||||
User: admin Company: 深圳市为爱普信息技术有限公司 Integrity Level: MEDIUM Description: 爱思助手更新程序 Exit code: 3221226540 Version: 2,3,0,0 Modules
| |||||||||||||||
| 4076 | "C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe" | C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | explorer.exe | ||||||||||||
User: admin Company: 深圳市为爱普信息技术有限公司 Integrity Level: HIGH Description: 爱思助手更新程序 Exit code: 0 Version: 2,3,0,0 Modules
| |||||||||||||||
| 4092 | C:\Users\admin\AppData\Local\Temp\814.pif ////DAEMON | C:\Users\admin\AppData\Local\Temp\814.pif | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | ||||||||||||
User: admin Company: 深圳市为爱普信息技术有限公司 Integrity Level: HIGH Description: 爱思助手更新程序 Version: 2,3,0,0 Modules
| |||||||||||||||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | ProxyServer |
Value: | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | ProxyOverride |
Value: | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | AutoConfigURL |
Value: | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | AutoDetect |
Value: | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1116) 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4092 | 814.pif | — | ||
MD5:— | SHA256:— | |||
| 4092 | 814.pif | C:\Windows\system32\RCX42BA.tmp | executable | |
MD5:15AB45F2469536783926521892679452 | SHA256:E2FD343664ACD1018B942CD374A465D6AFDA1106FFE814229E47B1932FC41A3F | |||
| 4076 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | C:\Users\admin\AppData\Local\Temp\814.pif | executable | |
MD5:8DAFB60D60DC86608F37E111EE84AD2E | SHA256:369B689C6D83A1438AA0A78777D5B30A23BC3FA6056F41F78EF93D66CBD47B52 | |||
| 4092 | 814.pif | C:\Windows\System32\notepad.exe11478 | executable | |
MD5:15AB45F2469536783926521892679452 | SHA256:E2FD343664ACD1018B942CD374A465D6AFDA1106FFE814229E47B1932FC41A3F | |||
| 4092 | 814.pif | C:\Windows\system32\RCX41A0.tmp | executable | |
MD5:CC623B9A2FF4A02CB4AD12DFCE2DEE4B | SHA256:FE65D1629FAD918362AC27AD464711F1C0E14B121906658BB64EA52A89A2FEBA | |||
| 4092 | 814.pif | C:\Windows\system32\RCX450E.tmp | executable | |
MD5:80FF104B493EBFF89C692770ADFF0F0A | SHA256:8C1188EF1D7BDFE9428B512C1BF3543A3DCD5A83E42D90E82770B7F9732316B0 | |||
| 4092 | 814.pif | C:\Windows\System32\calc.exe15724 | executable | |
MD5:CC623B9A2FF4A02CB4AD12DFCE2DEE4B | SHA256:FE65D1629FAD918362AC27AD464711F1C0E14B121906658BB64EA52A89A2FEBA | |||
| 4092 | 814.pif | C:\Users\admin\AppData\Local\Temp\460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | executable | |
MD5:7246808BAA325DF50008291393844B02 | SHA256:2F6F7B24C8B6B26654FF68DFF63BF439F0DC022D60581267BDE9C67E2D6C41EF | |||
| 4092 | 814.pif | C:\Windows\System32\ctfmon.exe26962 | executable | |
MD5:A65B30CDADDE294AF7CF9E3D090E6603 | SHA256:3DA901428A2815B0A8E20633821093EB7A748E341BEFCEC852217F0E58787E8D | |||
| 4092 | 814.pif | C:\Windows\system32\ctfmon.exe26962 | executable | |
MD5:8DAFB60D60DC86608F37E111EE84AD2E | SHA256:369B689C6D83A1438AA0A78777D5B30A23BC3FA6056F41F78EF93D66CBD47B52 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | GET | 302 | 47.99.89.159:80 | http://url.i4.cn/update?v= | unknown | — | — | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | GET | 200 | 163.171.129.138:80 | http://d.updater.i4.cn/i4tools7/update/Config_7.98.80.002.xml | unknown | — | — | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | GET | — | 163.171.129.138:80 | http://d.updater.i4.cn/i4tools7/update/update_files/66EBC9AAEA7291052E882657EB5C100F.dll | unknown | — | — | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | GET | 200 | 163.171.129.138:80 | http://d.updater.i4.cn/i4tools7/update/update_files/8E341B92F5D1EB3673F6F8D8369B4100.dll | unknown | — | — | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | GET | 200 | 163.171.129.138:80 | http://d.updater.i4.cn/i4tools7/update/update_files/83704826F29570E9EA0BAB94C8B14788.dll | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | 47.99.89.159:80 | url.i4.cn | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
1116 | 460cf5f5172c753609fe8f485ac060b45ecae1197e11c4e28020fcb6e24452aa.exe | 163.171.129.138:80 | d.updater.i4.cn | QUANTILNETWORKS | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
url.i4.cn |
| malicious |
dns.msftncsi.com |
| shared |
d.updater.i4.cn |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |