File name: | C:\Users\admin\AppData\LocalLow\u0pwWNzL.tmp |
Full analysis: | https://app.any.run/tasks/6f2fc249-2f22-4d2d-8108-d2c7d1332036 |
Verdict: | Malicious activity |
Analysis date: | September 30, 2020, 14:00:45 |
OS: | Windows 10 Professional (build: 16299, 64 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 95E3333FF23E521E24765456DE64F0BF |
SHA1: | 894BF20C6100936BB274A448D94DE1DF3E174F6E |
SHA256: | 53CFE75633AE2CCB068192D7071891E758E197D8C4F781B7FDF5B2E6055B496B |
SSDEEP: | 6144:538lfL4XZ75UOSHQAKMJmWtCDxir2XvfQ:53GESHQAKiYx62XA |
.exe | | | Win32 Executable MS Visual C++ (generic) (41) |
---|---|---|
.exe | | | Win64 Executable (generic) (36.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.6) |
.exe | | | Win32 Executable (generic) (5.9) |
.exe | | | Clipper DOS Executable (2.6) |
FileSubtype: | - |
---|---|
ObjectFileType: | Static library |
FileOS: | Unknown (0x40324) |
FileFlags: | (none) |
FileFlagsMask: | 0x007f |
ProductVersionNumber: | 1.0.0.1 |
FileVersionNumber: | 1.0.0.1 |
Subsystem: | Windows GUI |
SubsystemVersion: | 5 |
ImageVersion: | - |
OSVersion: | 5 |
EntryPoint: | 0xb533 |
UninitializedDataSize: | - |
InitializedDataSize: | 770560 |
CodeSize: | 169472 |
LinkerVersion: | 9 |
PEType: | PE32 |
TimeStamp: | 2019:09:03 12:36:38+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 03-Sep-2019 10:36:38 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000F0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 03-Sep-2019 10:36:38 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00029460 | 0x00029600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.1336 |
.data | 0x0002B000 | 0x000A7E70 | 0x00008A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.910598 |
.kecew | 0x000D3000 | 0x00000272 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.zobiv | 0x000D4000 | 0x00000017 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0 |
.cic | 0x000D5000 | 0x00000006 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x000D6000 | 0x00011730 | 0x00011800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.98553 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.29986 | 412 | UNKNOWN | UNKNOWN | RT_VERSION |
2 | 5.29534 | 2216 | UNKNOWN | Georgian - Georgia | RT_ICON |
3 | 4.28066 | 1384 | UNKNOWN | Georgian - Georgia | RT_ICON |
4 | 6.35394 | 9640 | UNKNOWN | Georgian - Georgia | RT_ICON |
5 | 6.68039 | 4264 | UNKNOWN | Georgian - Georgia | RT_ICON |
6 | 6.64809 | 2440 | UNKNOWN | Georgian - Georgia | RT_ICON |
7 | 6.18198 | 1128 | UNKNOWN | Georgian - Georgia | RT_ICON |
8 | 5.40471 | 3752 | UNKNOWN | Georgian - Georgia | RT_ICON |
9 | 5.26675 | 2216 | UNKNOWN | Georgian - Georgia | RT_ICON |
10 | 4.27747 | 1384 | UNKNOWN | Georgian - Georgia | RT_ICON |
GDI32.dll |
KERNEL32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
112 | "C:\Users\admin\AppData\Local\Temp\u0pwWNzL.tmp.exe" | C:\Users\admin\AppData\Local\Temp\u0pwWNzL.tmp.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
4044 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.16299.15 (WinBuild.160101.0800) |
PID | Process | Filename | Type | |
---|---|---|---|---|
4044 | explorer.exe | C:\Users\admin\AppData\Roaming\wccgshj | executable | |
MD5:95E3333FF23E521E24765456DE64F0BF | SHA256:53CFE75633AE2CCB068192D7071891E758E197D8C4F781B7FDF5B2E6055B496B | |||
112 | u0pwWNzL.tmp.exe | C:\Users\admin\AppData\Local\Temp\2F6.tmp | executable | |
MD5:7519FB5AA32A22424693261509807203 | SHA256:99A1684168D649FCD312C004368E3BF28F8BB32D734C00852AECC23C5D06281A |
Domain | IP | Reputation |
---|---|---|
etasuklavish.today |
| unknown |
mragyzmachnobesdi.today |
| malicious |
kimchinikuzims.today |
| malicious |
slacvostinrius.today |
| malicious |
straponuliusyn.today |
| malicious |
grammmdinss.today |
| unknown |
viprasputinsd.chimkent.su |
| malicious |
lupadypa.dagestan.su |
| malicious |
stoknolimchin.exnet.su |
| malicious |
musaroprovadnikov.live |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
— | — | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
— | — | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .life TLD |
— | — | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |