analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

file-5141717_exe.bin

Full analysis: https://app.any.run/tasks/c7950c29-4188-4f16-a46e-dab1f954809b
Verdict: Malicious activity
Analysis date: January 17, 2019, 19:25:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
adware
pua
lavasoft
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F9D18A28E2C5E56771016FBAEF18D14A

SHA1:

4B6C976DE897039FAE71608E9967D505C3EDF453

SHA256:

4D56076541B3E4CA99A4BB6FE60F8D6BDD4F9563E8998D5D4DBC8EAF9EAAE664

SSDEEP:

49152:HG5UfgXTHuPAgOBx5WzH38JaKUEJBTFvgfjcYffFYdSQERnVu9IwQF7I:HG5QgDcAnRO8xlFI7BPh4Iw6I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 2504)
    • Application was dropped or rewritten from another process

      • installer.exe (PID: 3916)
      • GenericSetup.exe (PID: 2504)
    • LAVASOFT was detected

      • installer.exe (PID: 3916)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • file-5141717_exe.bin.exe (PID: 3064)
    • Reads Windows owner or organization settings

      • GenericSetup.exe (PID: 2504)
    • Reads Environment values

      • GenericSetup.exe (PID: 2504)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 2504)
    • Searches for installed software

      • GenericSetup.exe (PID: 2504)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (29.8)
.exe | Win32 Executable MS Visual C++ (generic) (21.6)
.exe | Win64 Executable (generic) (19.1)
.exe | UPX compressed Win32 Executable (18.7)
.dll | Win32 Dynamic Link Library (generic) (4.5)

EXIF

EXE

ProductVersion: 3.5.5.44994
ProductName: µTorrent
OriginalFileName: uTorrent.exe
LegalCopyright: ©2018 BitTorrent, Inc. All Rights Reserved.
InternalName: uTorrent.exe
FileVersion: 3.5.5.44994
FileDescription: µTorrent
CompanyName: BitTorrent Inc.
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 3.5.5.44994
FileVersionNumber: 3.5.5.44994
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x148d4
UninitializedDataSize: -
InitializedDataSize: 83968
CodeSize: 104448
LinkerVersion: 6
PEType: PE32
TimeStamp: 2011:04:18 20:54:06+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 18-Apr-2011 18:54:06
Detected languages:
  • English - United States
CompanyName: BitTorrent Inc.
FileDescription: µTorrent
FileVersion: 3.5.5.44994
InternalName: uTorrent.exe
LegalCopyright: ©2018 BitTorrent, Inc. All Rights Reserved.
OriginalFilename: uTorrent.exe
ProductName: µTorrent
ProductVersion: 3.5.5.44994

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 18-Apr-2011 18:54:06
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000197C0
0x00019800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.60823
.rdata
0x0001B000
0x00004490
0x00004600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.38378
.data
0x00020000
0x00005A68
0x00003200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.37934
.sxdata
0x00026000
0x00000004
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0203931
.rsrc
0x00027000
0x0000CC68
0x0000CE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.34014

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.01523
1663
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.18403
296
Latin 1 / Western European
UNKNOWN
RT_ICON
3
5.54032
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
4
5.09168
38056
Latin 1 / Western European
UNKNOWN
RT_ICON
5
1.43775
52
Latin 1 / Western European
English - United States
RT_STRING
500
3.09294
184
Latin 1 / Western European
English - United States
RT_DIALOG
MAINICON
2.50471
34
Latin 1 / Western European
UNKNOWN
RT_GROUP_ICON

Imports

KERNEL32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start file-5141717_exe.bin.exe #LAVASOFT installer.exe genericsetup.exe

Process information

PID
CMD
Path
Indicators
Parent process
3064"C:\Users\admin\AppData\Local\Temp\file-5141717_exe.bin.exe" C:\Users\admin\AppData\Local\Temp\file-5141717_exe.bin.exe
explorer.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
MEDIUM
Description:
µTorrent
Version:
3.5.5.44994
3916.\installer.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\installer.exe
file-5141717_exe.bin.exe
User:
admin
Company:
adaware
Integrity Level:
MEDIUM
Description:
µTorrent
Version:
2.5.3.1186
2504"C:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\GenericSetup.exe" C:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\GenericSetup.exe husertype=AdminC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\GenericSetup.exe
installer.exe
User:
admin
Company:
adaware
Integrity Level:
HIGH
Description:
µTorrent
Version:
2.5.3.1186
Total events
2 579
Read events
2 561
Write events
18
Delete events
0

Modification events

(PID) Process:(3916) installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3916) installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2504) GenericSetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2504) GenericSetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2504) GenericSetup.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
12
Suspicious files
0
Text files
48
Unknown types
0

Dropped files

PID
Process
Filename
Type
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\installer.exeexecutable
MD5:3297751804E07844137B51FBEA591DFC
SHA256:6289AA4169872C8FA4AAF68A529FDF0B1A3AF0AEB099DBA152CC38CE2DD083C8
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\ru\DevLib.resources.dllexecutable
MD5:29D4D2C5C50C97A5F5603521D5C869B7
SHA256:2B1498E1E3BB48D3209D89359715ADFE09F89A993AA1FE054452255986E953A3
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:CF2EB4156075C6F153E59A6215E51C4A
SHA256:CA0B361E12393CDC4965EE9AECD077D46D1DB561F050C203A6B66313625FF315
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\BundleConfig.xmltext
MD5:5E6460DC1DE4D0253C19EAD9AC33443F
SHA256:EFBB2809A266D1F376BA0CD92F458C31E37C48687FFDF01D3C3388351FA69CFB
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\Carrier.EXEexecutable
MD5:952619D83B085AD576793752FB333914
SHA256:51FE6E080DC341134E0964EFDBD1BE5F02107F4CF36B360EEC5DAB3F0F0B0BFB
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\GenericSetup.exe.configxml
MD5:813D476017CCC71080FD97B06A4536A4
SHA256:37410AEB3196DEE540CDE70090294FA63258029114EC5DD58A26152F29E039EF
2504GenericSetup.exeC:\Users\admin\AppData\Local\Temp\utorrent.logtext
MD5:AD8346476CE2AA29054567E20C3C1A84
SHA256:3F2575852FDA913BA944F610CB007272B823B94EFE87E9E747CDE9FB1BEFCC8C
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\DevLib.dllexecutable
MD5:1F32E12ACAF5D9B96014699A4451999A
SHA256:DDB864A94DD1A59FB507D9FA82CD6C78837AAA118113F1B3D0F4C320B0C80A41
3064file-5141717_exe.bin.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\fr\DevLib.resources.dllexecutable
MD5:8C5935CB481AF692CAD4D19A30A3EC14
SHA256:A142423E7FEF8EDBD5EAC33DA9E914D7BF212018EDD28D815B6B660CE5E4DBD7
3916installer.exeC:\Users\admin\AppData\Local\Temp\7zS8FB88EB9\GenericSetup.exe.configxml
MD5:813D476017CCC71080FD97B06A4536A4
SHA256:37410AEB3196DEE540CDE70090294FA63258029114EC5DD58A26152F29E039EF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3916
installer.exe
POST
200
104.17.61.19:80
http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubStart
US
text
29 b
whitelisted
3916
installer.exe
POST
200
104.17.61.19:80
http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStart
US
text
29 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2504
GenericSetup.exe
104.17.60.19:443
flow.lavasoft.com
Cloudflare Inc
US
shared
2504
GenericSetup.exe
104.16.236.150:443
sos.adaware.com
Cloudflare Inc
US
shared
3916
installer.exe
104.17.61.19:80
flow.lavasoft.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
www.google.com
  • 74.125.206.105
  • 74.125.206.106
  • 74.125.206.99
  • 74.125.206.147
  • 74.125.206.103
  • 74.125.206.104
whitelisted
sos.adaware.com
  • 104.16.236.150
  • 104.16.234.150
  • 104.16.235.150
  • 104.16.238.150
  • 104.16.237.150
whitelisted
flow.lavasoft.com
  • 104.17.61.19
  • 104.17.60.19
whitelisted

Threats

PID
Process
Class
Message
3916
installer.exe
A Network Trojan was detected
ET MALWARE Lavasoft PUA/Adware Client Install
No debug info