| URL: | http://blogattach.naver.net/a633ba091c2d2c99b45734033dd7addd7c27d2ff/20200402_26_blogfile/cupe21_1585798921689_yk064f_exe/ClickToTweak_4.95.exe |
| Full analysis: | https://app.any.run/tasks/0a5c5e62-2800-48a5-949c-2102cc34c351 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | October 20, 2020, 06:19:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 7F49683010DC3376BAEF4C9535913168 |
| SHA1: | CF7DF4957B60408D54FC8DB9271317DA8EE7F305 |
| SHA256: | 50E664974DDD4C5E1D80A16E0D305BE5F4A5931A20C23D227CA421A4C300D314 |
| SSDEEP: | 3:N1KcrcvN/EM8f+Vcxox2zWWBBqhDGVR96XTsECDMl1AYIHeRLRFC90x6zA:Ccrcv1rg+t2zWW38G+XgR30xz |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 916 | "C:\Program Files\Click To Tweak [Basic]\CTTService.exe" | C:\Program Files\Click To Tweak [Basic]\CTTService.exe | — | services.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 944 | "C:\Program Files\Click To Tweak [Basic]\InstSvc.exe" beginnerprotecton | C:\Program Files\Click To Tweak [Basic]\InstSvc.exe | — | ClickToTweak_4.95.exe | |||||||||||
User: admin Company: http://rodream.net Integrity Level: HIGH Description: rodream's Setup Helper Exit code: 0 Version: 2, 0, 0, 0 Modules
| |||||||||||||||
| 984 | "C:\Program Files\Click To Tweak [Basic]\InstSvc.exe" registerrodexec | C:\Program Files\Click To Tweak [Basic]\InstSvc.exe | — | ClickToTweak_4.95.exe | |||||||||||
User: admin Company: http://rodream.net Integrity Level: HIGH Description: rodream's Setup Helper Exit code: 0 Version: 2, 0, 0, 0 Modules
| |||||||||||||||
| 1580 | "C:\Program Files\Click To Tweak [Basic]\InstSvc.exe" prepareinstall | C:\Program Files\Click To Tweak [Basic]\InstSvc.exe | — | ClickToTweak_4.95.exe | |||||||||||
User: admin Company: http://rodream.net Integrity Level: HIGH Description: rodream's Setup Helper Exit code: 0 Version: 2, 0, 0, 0 Modules
| |||||||||||||||
| 1692 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe | iexplore.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1856 | "C:\Program Files\Click To Tweak [Basic]\InstSvc.exe" cttsvcinst | C:\Program Files\Click To Tweak [Basic]\InstSvc.exe | — | ClickToTweak_4.95.exe | |||||||||||
User: admin Company: http://rodream.net Integrity Level: HIGH Description: rodream's Setup Helper Exit code: 0 Version: 2, 0, 0, 0 Modules
| |||||||||||||||
| 2008 | "C:\Program Files\Click To Tweak [Basic]\CTTBasic.exe" | C:\Program Files\Click To Tweak [Basic]\CTTBasic.exe | ClickToTweak_4.95.exe | ||||||||||||
User: admin Company: Realization of Dream Integrity Level: HIGH Description: Click To Tweak [Basic] Executable File Exit code: 0 Version: 4, 9, 5, 0 Modules
| |||||||||||||||
| 2168 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe | — | iexplore.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 2360 | "C:\Program Files\Click To Tweak [Basic]\InstSvc.exe" normalver | C:\Program Files\Click To Tweak [Basic]\InstSvc.exe | — | ClickToTweak_4.95.exe | |||||||||||
User: admin Company: http://rodream.net Integrity Level: HIGH Description: rodream's Setup Helper Exit code: 0 Version: 2, 0, 0, 0 Modules
| |||||||||||||||
| 2720 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://blogattach.naver.net/a633ba091c2d2c99b45734033dd7addd7c27d2ff/20200402_26_blogfile/cupe21_1585798921689_yk064f_exe/ClickToTweak_4.95.exe" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (3824) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3824) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3824) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 544454090 | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30844585 | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2720) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3824 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ClickToTweak_4.95[1].exe | — | |
MD5:— | SHA256:— | |||
| 3824 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe.bdbkb9s.partial | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF8B2C06AF38D76099.TMP | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ClickToTweak_4.95.exe.bdbkb9s.partial:Zone.Identifier | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\CabBDD6.tmp | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\TarBDD7.tmp | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verBE17.tmp | — | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{4C30508B-129C-11EB-85AF-12A9866C77DE}.dat | binary | |
MD5:— | SHA256:— | |||
| 1692 | ClickToTweak_4.95.exe | C:\Users\admin\AppData\Local\Temp\nscB1E1.tmp\ioSpecial.ini | text | |
MD5:— | SHA256:— | |||
| 2720 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203 | der | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3988 | InstSvc.exe | GET | 301 | 172.80.94.139:80 | http://rodream.net/version/ctt_ontip.url | US | html | 2.87 Kb | malicious |
3988 | InstSvc.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/version/ctt_ontip.url | US | html | 2.87 Kb | malicious |
2872 | iexplore.exe | GET | 301 | 172.80.94.139:80 | http://rodream.net/ | US | html | 50.6 Kb | malicious |
2008 | CTTBasic.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/version/ctt.inf | US | html | 2.87 Kb | malicious |
2008 | CTTBasic.exe | GET | 301 | 172.80.94.139:80 | http://rodream.net/version/sfence.url | US | html | 2.87 Kb | malicious |
2872 | iexplore.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/aka2020.js | US | text | 13.7 Kb | malicious |
2872 | iexplore.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/ | US | html | 8.34 Kb | malicious |
2872 | iexplore.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/images/style.css | US | text | 7.03 Kb | malicious |
2720 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
2872 | iexplore.exe | GET | 200 | 172.80.94.139:80 | http://www.rodream.net/images/slider.js | US | text | 1.38 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2008 | CTTBasic.exe | 172.80.94.139:80 | rodream.net | eSited Solutions | US | malicious |
2720 | iexplore.exe | 204.79.197.200:443 | ieonline.microsoft.com | Microsoft Corporation | US | whitelisted |
2872 | iexplore.exe | 172.80.94.139:80 | rodream.net | eSited Solutions | US | malicious |
2940 | iexplore.exe | 204.79.197.200:80 | ieonline.microsoft.com | Microsoft Corporation | US | whitelisted |
2872 | iexplore.exe | 120.26.80.26:80 | tool.yishangwang.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
2872 | iexplore.exe | 103.235.46.191:443 | hm.baidu.com | Beijing Baidu Netcom Science and Technology Co., Ltd. | HK | suspicious |
2872 | iexplore.exe | 103.118.81.3:443 | www.j9999.cc | — | — | unknown |
2872 | iexplore.exe | 2.16.186.11:80 | isrg.trustid.ocsp.identrust.com | Akamai International B.V. | — | whitelisted |
2872 | iexplore.exe | 104.18.21.226:80 | ocsp.globalsign.com | Cloudflare Inc | US | shared |
2872 | iexplore.exe | 205.185.216.10:80 | www.download.windowsupdate.com | Highwinds Network Group, Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
blogattach.naver.net |
| suspicious |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
rodream.net |
| malicious |
www.rodream.net |
| malicious |
ieonline.microsoft.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
tool.yishangwang.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3824 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3824 | iexplore.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2008 | CTTBasic.exe | A Network Trojan was detected | ET MALWARE Pigeon.AYX/AVKill Related User-Agent (CTTBasic) |
2008 | CTTBasic.exe | A Network Trojan was detected | ET MALWARE Pigeon.AYX/AVKill Related User-Agent (CTTBasic) |
2008 | CTTBasic.exe | A Network Trojan was detected | ET MALWARE Pigeon.AYX/AVKill Related User-Agent (CTTBasic) |
2008 | CTTBasic.exe | A Network Trojan was detected | ET MALWARE Pigeon.AYX/AVKill Related User-Agent (CTTBasic) |
1052 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .cc TLD |