analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f

Full analysis: https://app.any.run/tasks/b18b38d4-1b2a-41fc-9384-3162d6359a77
Verdict: Malicious activity
Analysis date: February 18, 2019, 15:16:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

617D4073F0AFFC9DBCC476A861812C2E

SHA1:

EF25CDA90D12C51A7F294E1D5D95A31FD521FD19

SHA256:

51319D8F8A7EC9A293DE59FD13F2F59656CECC44C4ABFABACCFD32EF59D1186F

SSDEEP:

24576:PFQeYL+KKEPS1bvKE2JjaErVmJuNi2qc9E:PFQWKKEP2biE2JjaAV5j9E

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • fbinst.dll (PID: 2396)
    • Loads dropped or rewritten executable

      • cmd.exe (PID: 3920)
    • Changes the autorun value in the registry

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 3248)
      • cmd.exe (PID: 3168)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
      • cmd.exe (PID: 3920)
    • Executable content was dropped or overwritten

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
    • Starts CMD.EXE for commands execution

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
    • Application launched itself

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 3108)
    • Changes the started page of IE

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
      • reg.exe (PID: 2892)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • Fav~Url.tmp (PID: 2852)
    • Creates or modifies windows services

      • 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe (PID: 2036)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3248)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (49.4)
.scr | Windows screen saver (23.4)
.dll | Win32 Dynamic Link Library (generic) (11.7)
.exe | Win32 Executable (generic) (8)
.exe | Generic Win/DOS Executable (3.5)

EXIF

EXE

ProductVersion: 3.3.9.4
FileVersion: 5.0.14.501
CharacterSet: Unicode
LanguageCode: Chinese (Simplified)
FileSubtype: -
ObjectFileType: Unknown
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 3.3.9.4
FileVersionNumber: 5.0.14.501
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 5
EntryPoint: 0x176dc
UninitializedDataSize: -
InitializedDataSize: 141312
CodeSize: 548352
LinkerVersion: 10
PEType: PE32
TimeStamp: 2012:04:10 02:11:21+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 10-Apr-2012 00:11:21
Detected languages:
  • Chinese - PRC
  • English - United Kingdom
  • English - United States
FileVersion: 5.0.14.501
ProductVersion: 3.3.9.4

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 10-Apr-2012 00:11:21
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00085D77
0x00085E00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.71034
.rdata
0x00087000
0x00019C2E
0x00019E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.92335
.data
0x000A1000
0x0001A858
0x00006800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.15604
.rsrc
0x000BC000
0x000020C8
0x00002200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.1501

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.01246
620
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.66371
296
Latin 1 / Western European
English - United Kingdom
RT_ICON
3
2.25499
296
Latin 1 / Western European
English - United Kingdom
RT_ICON
4
2.65983
744
Latin 1 / Western European
English - United Kingdom
RT_ICON
5
2.30655
296
Latin 1 / Western European
English - United Kingdom
RT_ICON
7
5.28917
542
Latin 1 / Western European
English - United Kingdom
RT_STRING
8
5.19363
720
Latin 1 / Western European
English - United Kingdom
RT_STRING
9
5.49911
542
Latin 1 / Western European
English - United Kingdom
RT_STRING
10
5.19841
760
Latin 1 / Western European
English - United Kingdom
RT_STRING
11
5.46644
764
Latin 1 / Western European
English - United Kingdom
RT_STRING

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
KERNEL32.dll
MPR.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
USER32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
10
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe no specs 51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe fav~url.tmp no specs cmd.exe no specs fbinst.dll no specs cmd.exe no specs ping.exe no specs cmd.exe no specs ping.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3108"C:\Users\admin\AppData\Local\Temp\51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe" C:\Users\admin\AppData\Local\Temp\51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
5.0.14.501
2036"C:\Users\admin\AppData\Local\Temp\51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe" C:\Users\admin\AppData\Local\Temp\51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
5.0.14.501
2852C:\Users\admin\AppData\Local\dbcTMP\Fav~Url.tmp -y -o"C:\Users\admin\Favorites"C:\Users\admin\AppData\Local\dbcTMP\Fav~Url.tmp51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3920C:\Windows\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\fbinst.dll "C:\Windows\Installation\SUPPORT.IM_" output IMG/* %~nxC:\Windows\system32\cmd.exe51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2396C:\Users\admin\AppData\Local\Temp\fbinst.dll "C:\Windows\Installation\SUPPORT.IM_" output IMG/* %~nxC:\Users\admin\AppData\Local\Temp\fbinst.dllcmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
3248C:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 50&reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.157167.com/?6" /fC:\Windows\system32\cmd.exe51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3972ping 127.0.0.1 -n 50C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3168C:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del /q "C:\Users\admin\AppData\Local\Temp\51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe"C:\Windows\system32\cmd.exe51319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3868ping 127.0.0.1 -n 3C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2892reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.157167.com/?6" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
466
Read events
430
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
67
Unknown types
0

Dropped files

PID
Process
Filename
Type
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\淘宝网.urltext
MD5:0B18032A9692F287FA6CDD3A9439FE46
SHA256:9DE36C643C9C739DC7087DC1520C372B89AB5C17D50AE6816A490658B28DE72D
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\美女图片.urltext
MD5:FB3B6FFEBCBB2A789D282466FDC55E16
SHA256:6BC4960F01D49A4EF45BA49E7BD0F6CD7A4FD3698B9339282951FC7CC85D6A9A
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\女性网.urltext
MD5:E1FF3E911BC0F378D34CC70100114CA2
SHA256:4BBC219388760A7507539F92AC177CDC5F690E8EA2B60ED5C88F5DCCB6553457
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\天猫购物.urltext
MD5:23D8913AB668A3E88BFDCCF09F20BD4A
SHA256:4C30C0FDFADD4AAAEF59502A084E6C83D983587FDB73523A4E9FD90EEA9EFC23
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\足球比分.urltext
MD5:D3802EF751863082875E76A7A897143F
SHA256:351588225B68CAF43FA9C685366A8CF8B53DF0734EB47D19D302939D46F13178
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\小游戏.urltext
MD5:65DD9CB5F675D326F57A1DE7F60BDF07
SHA256:767AFEC63735BF233AB60672473F8B4730C85775635B0A6E1D7F1E97D1D7A7C3
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\百度.urltext
MD5:FA3A6B05619ACAF38FD0787056C593BB
SHA256:29F6BAC8BD7958C0DC6025A7FC9234F180D4E89326E866A0AFE7A163C2821F90
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\links\百度.urltext
MD5:FA3A6B05619ACAF38FD0787056C593BB
SHA256:29F6BAC8BD7958C0DC6025A7FC9234F180D4E89326E866A0AFE7A163C2821F90
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\投资理财.urltext
MD5:2899081B7F0E82C2C705A2BCE69449F4
SHA256:2C68F1CD1CB6001294F05A433B6A8263A3E844EAEA14B4DBA3CBCFB4061344FE
203651319d8f8a7ec9a293de59fd13f2f59656cecc44c4abfabaccfd32ef59d1186f.exeC:\Users\admin\Favorites\links\搜狗.urltext
MD5:90E9F92315DAE8363F038D4284A01C26
SHA256:89CB495FF646E5C497C69E6E2812975EC03832D980DBB4E5ED3148FB9644000F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info