analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

2.exe

Full analysis: https://app.any.run/tasks/23f9a9c9-82d4-4f4e-92ae-ee02ee8c3372
Verdict: Malicious activity
Analysis date: April 25, 2019, 11:10:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

077DDACC6745D71835B04917F130FC41

SHA1:

DC6A7608F0BA642330DCDF6BB18CCFA9252E1AFD

SHA256:

5169980C90C6C9513D346ABE0B7DB868B5FFFCCEFD48C2AA5815B15FD9607BDB

SSDEEP:

12288:8h11tmcSy/cDYw7J3j4DRUJZdLmiNpaJflZH:8hhmByozyGJPr+JNZH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • 2.exe (PID: 2404)
    • Application was dropped or rewritten from another process

      • Winny.exe (PID: 1500)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2.exe (PID: 2404)
    • Creates files in the program directory

      • 2.exe (PID: 2404)
    • Creates a software uninstall entry

      • 2.exe (PID: 2404)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (91.9)
.exe | Win32 Executable MS Visual C++ (generic) (3.3)
.exe | Win64 Executable (generic) (3)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x30ed
UninitializedDataSize: 1024
InitializedDataSize: 164864
CodeSize: 23552
LinkerVersion: 6
PEType: PE32
TimeStamp: 2007:11:17 15:35:37+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 17-Nov-2007 14:35:37
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 17-Nov-2007 14:35:37
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005B22
0x00005C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.46966
.rdata
0x00007000
0x0000129C
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04904
.data
0x00009000
0x00025CB8
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.12345
.ndata
0x0002F000
0x00009000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00038000
0x00001ED8
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.49744

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.10609
533
UNKNOWN
English - United States
RT_MANIFEST
2
1.55959
1736
UNKNOWN
English - United States
RT_ICON
3
1.13859
1384
UNKNOWN
English - United States
RT_ICON
102
2.62197
160
UNKNOWN
English - United States
RT_DIALOG
103
2.59109
48
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.68176
494
UNKNOWN
English - United States
RT_DIALOG
106
2.86295
228
UNKNOWN
English - United States
RT_DIALOG
111
2.92694
218
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2.exe no specs 2.exe notepad.exe no specs winny.exe

Process information

PID
CMD
Path
Indicators
Parent process
1968"C:\Users\admin\Desktop\2.exe" C:\Users\admin\Desktop\2.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2404"C:\Users\admin\Desktop\2.exe" C:\Users\admin\Desktop\2.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2140"C:\Windows\system32\NOTEPAD.EXE" C:\Winny\ReadME(KOR).txtC:\Windows\system32\NOTEPAD.EXE2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1500"C:\Winny\Winny.exe" C:\Winny\Winny.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Winny アプリケーション
Exit code:
0
Version:
1, 1, 4, 0
Total events
196
Read events
185
Write events
11
Delete events
0

Modification events

(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Winny.exe
Operation:writeName:
Value:
C:\Winny\Winny.exe
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:DisplayName
Value:
Winny 1.14k(013)
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:UninstallString
Value:
C:\Winny\uninst.exe
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:DisplayIcon
Value:
C:\Winny\Winny.exe
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:DisplayVersion
Value:
1.14k(013)
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:URLInfoAbout
Value:
http://winnykorea.com/
(PID) Process:(2404) 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Winny
Operation:writeName:Publisher
Value:
À§´ÏÄÚ¸®¾Æ(WinnyKorea.com)
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
132
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
132
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDX
Value:
960
Executable files
5
Suspicious files
0
Text files
119
Unknown types
8

Dropped files

PID
Process
Filename
Type
24042.exeC:\Users\admin\AppData\Local\Temp\nso6861.tmp\ioSpecial.initext
MD5:2A16D1BD6C210AF4A10E44885F0844EB
SHA256:4941BAB3A932B99C9F520B7128E17EF19BB3D64F7660710C528F8BDE979371FA
24042.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Winny\ReadME(KOR).lnklnk
MD5:EAB53A5F7638FA90DB8EFF1330BC5570
SHA256:87C59DBE687F2D92273926EBEB8EB24D01F2A1F35E1ADF24010764D458B1B343
24042.exeC:\Winny\Noderef.txttext
MD5:3E92E8FAC46BA2CC575F86CD4059C808
SHA256:C846D683AD5AC445739633D85B32E91F7CC6C6BB22BFD2E6A8590E45DF25C512
24042.exeC:\Winny\BoardList.txttext
MD5:128A13962904455BF04E0EB19436F242
SHA256:7B1B5B8D0541276BD1EBA5EA4573AF98F3AF0DF32D9886DF84F7414BCB4F421C
24042.exeC:\Winny\Readme.htmlhtml
MD5:A28EC1AF65DF0A415299688A41129290
SHA256:F1396E9C8D50EE0203842F09AE9EBC7E552373610F3E29FBCCBEAE61EF237267
24042.exeC:\Winny\SafeNy.initext
MD5:2FE9A90967F8C66BFB085CBEC436E511
SHA256:C3CECB240209AADC0C7A117D20CCCD114DC59D26FC1C36BF1AB5D35F582DB575
24042.exeC:\Winny\natewinny.htmhtml
MD5:44D84AF942549783D32B5913CFA01ED6
SHA256:533217B983A78F0D466C8CBC4F05D68F13D6B2C21970A30F93991EF1A3A93C40
24042.exeC:\Winny\Ignore.txttext
MD5:54116CE4E28039BF532F68CEB986DA69
SHA256:F4E33E3FEAC72E5E11F23048270B67532EE01F7C12758F83162B1728F3B13F6C
24042.exeC:\Winny\ReadME(KOR).txttext
MD5:02F9C66FF8FFDABDB5D8FE56D426E944
SHA256:E0A2E5922487BBBEE329BA2951FFB12D0107EE4E4E28725AA909B1774B159D23
24042.exeC:\Winny\Winny.exeexecutable
MD5:586FBE640E3BB1DF2BB7FC59E1E50985
SHA256:78000F37A8F82C093F5C3D6D657E63946EEB83F6F619CAB1B19A6178F50BD75E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1500
Winny.exe
61.198.112.179:10853
TOKAI Communications Corporation
JP
unknown

DNS requests

Domain
IP
Reputation
sasak.myhome.cx
  • 114.22.16.129
unknown

Threats

No threats detected
No debug info