| File name: | MrsMajor 3.0.exe |
| Full analysis: | https://app.any.run/tasks/b8e902dc-abd7-41aa-8417-e50a3d53da71 |
| Verdict: | Malicious activity |
| Analysis date: | July 20, 2024, 16:32:55 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 35A27D088CD5BE278629FAE37D464182 |
| SHA1: | D5A291FADEAD1F2A0CF35082012FE6F4BF22A3AB |
| SHA256: | 4A75F2DB1DBD3C1218BB9994B7E1C690C4EDD4E0C1A675DE8D2A127611173E69 |
| SSDEEP: | 6144:Th3idhONY259BH1DzJ5PzVNtGgc+F9TBd096cTKAsLEbqqbd+VWM8AHiKn9SlXNA:Th3iXPw9Tc6kVXMHHLEf8l7 |
| .exe | | | Win64 Executable (generic) (87.2) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2018:02:01 20:47:38+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 2.5 |
| CodeSize: | 86528 |
| InitializedDataSize: | 303104 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.0.0.0 |
| ProductVersionNumber: | 3.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug, Pre-release, Private build |
| FileOS: | Windows 16-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| FileVersion: | 3.0.0.0 |
| ProductVersion: | 3.0.0.0 |
| ProductName: | MrsMajor |
| OriginalFileName: | MrsMajor3.0.exe |
| InternalName: | MrsMajor3.0 |
| FileDescription: | Watch out |
| CompanyName: | Mnc 2020 |
| LegalCopyright: | Elektro Berkay / MoonCon / Tobiaddr0c |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6240 | "C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe" | C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 6440 | "C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe" | C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 7088 | "C:\WINDOWS\system32\wscript.exe" C:\Users\admin\AppData\Local\Temp\8F7D.tmp\8F7E.tmp\8F7F.vbs //Nologo | C:\Windows\System32\wscript.exe | — | MrsMajor 3.0.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 7636 | "C:\Users\admin\AppData\Local\Temp\8F7D.tmp\eulascr.exe" | C:\Users\admin\AppData\Local\Temp\8F7D.tmp\eulascr.exe | wscript.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: mmdropper Version: 1.0.7321.42228 Modules
| |||||||||||||||
| (PID) Process: | (6240) MrsMajor 3.0.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6240) MrsMajor 3.0.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6240) MrsMajor 3.0.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6240) MrsMajor 3.0.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (7088) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (7088) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (7088) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (7088) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (7088) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6240 | MrsMajor 3.0.exe | C:\Users\admin\AppData\Local\Temp\8F7D.tmp\8F7E.tmp\8F7F.vbs | binary | |
MD5:3B8696ECBB737AAD2A763C4EAF62C247 | SHA256:CE95F7EEA8B303BC23CFD6E41748AD4E7B5E0F0F1D3BDF390EADB1E354915569 | |||
| 6240 | MrsMajor 3.0.exe | C:\Users\admin\AppData\Local\Temp\8F7D.tmp\AgileDotNet.VMRuntime.dll | executable | |
MD5:266373FADD81120BAEAE3504E1654A5A | SHA256:0798779DC944BA73C5A9CE4B8781D79F5DD7B5F49E4E8EF75020DE665BAD8CCB | |||
| 7636 | eulascr.exe | C:\Users\admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dll | executable | |
MD5:42B2C266E49A3ACD346B91E3B0E638C0 | SHA256:ADEED015F06EFA363D504A18ACB671B1DB4B20B23664A55C9BC28AEF3283CA29 | |||
| 6240 | MrsMajor 3.0.exe | C:\Users\admin\AppData\Local\Temp\8F7D.tmp\eulascr.exe | executable | |
MD5:8B1C352450E480D9320FCE5E6F2C8713 | SHA256:2C343174231B55E463CA044D19D47BD5842793C15954583EB340BFD95628516E | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4716 | svchost.exe | 20.190.159.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5620 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 4.209.33.156:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6488 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 20.190.159.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2760 | svchost.exe | 40.113.110.67:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4716 | svchost.exe | 40.126.31.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |