| File name: | bla.exe |
| Full analysis: | https://app.any.run/tasks/84dad620-1bf1-4f62-ba96-a1afadf82ef3 |
| Verdict: | Malicious activity |
| Analysis date: | June 14, 2018, 08:12:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 676278FBF70F750792EB93C01C4B69DA |
| SHA1: | BAB90D5CA1E69662AD9CACA50749DC1115BED726 |
| SHA256: | 582C0D861E8CDC2234B286FA03ECC5D35FEC49FB403E88C80346CC04BDD7F0C0 |
| SSDEEP: | 24576:Wk9RrEts4E59IrYnjtscr/dMYry/Zn1lTCvoKFmrj9G7yZlra2ST:WkA+9I6tssMYo/OvoNGqxavT |
| .exe | | | Win32 EXE PECompact compressed (generic) (35.3) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (26.5) |
| .exe | | | Win64 Executable (generic) (23.5) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.5) |
| .exe | | | Win32 Executable (generic) (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1970:03:12 03:48:47+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 4 |
| CodeSize: | 24576 |
| InitializedDataSize: | 143360 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x389f |
| OSVersion: | 4 |
| ImageVersion: | 1 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 12-Mar-1970 02:48:47 |
| Detected languages: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 12-Mar-1970 02:48:47 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00006000 | 0x00006000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.45788 |
.rdata | 0x00007000 | 0x00001000 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.72617 |
.data | 0x0000C000 | 0x00019000 | 0x00019000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.79671 |
.rsrc | 0x00025000 | 0x00005000 | 0x00005000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.31346 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 3.31275 | 9641 | UNKNOWN | Chinese - PRC | RT_ICON |
2 | 3.78801 | 4265 | UNKNOWN | Chinese - PRC | RT_ICON |
3 | 3.99861 | 2441 | UNKNOWN | Chinese - PRC | RT_ICON |
4 | 3.9292 | 1129 | UNKNOWN | Chinese - PRC | RT_ICON |
129 | 2.62308 | 62 | UNKNOWN | Chinese - PRC | RT_GROUP_ICON |
KERNEL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 568 | "C:\Users\admin\Desktop\bla.exe" | C:\Users\admin\Desktop\bla.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1744 | "C:\Users\admin\Desktop\bla.exe" | C:\Users\admin\Desktop\bla.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2192 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2708 | explorer C:\Users\admin\Desktop\bla | C:\Windows\explorer.exe | — | bla.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2760 | "C:\Users\admin\Desktop\bla.exe" | C:\Users\admin\Desktop\bla.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2904 | explorer C:\Users\admin\Desktop\bla | C:\Windows\explorer.exe | — | bla.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2940 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3132 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3428 | C:\Windows\system32\XP-5A923591.EXE 4|-|SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XP-3425E2C9|-|C:\Windows\system32\XP-3425E2C9.EXE|-|0 | C:\Windows\system32\XP-5A923591.EXE | XP-3425E2C9.EXE | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 4088 | explorer C:\Users\admin\Desktop\bla | C:\Windows\explorer.exe | — | bla.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 06000000050000000100000002000000000000000900000008000000030000000700000004000000FFFFFFFF | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar |
| Operation: | write | Name: | Locked |
Value: 1 | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6 |
| Operation: | write | Name: | 1 |
Value: 200000001A00EEBBFE2300001000D09AD3FD8F23AF46ADB46C85480369C700000000 | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6 |
| Operation: | write | Name: | MRUListEx |
Value: 0100000000000000FFFFFFFF | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6\1 |
| Operation: | write | Name: | NodeSlot |
Value: 101 | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6\1 |
| Operation: | write | Name: | MRUListEx |
Value: FFFFFFFF | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\101\Shell |
| Operation: | write | Name: | SniffedFolderType |
Value: Documents | |||
| (PID) Process: | (3132) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\krnln.fnr | executable | |
MD5:1081D7EB7A17FAEDFA588B93FC85365E | SHA256:0351D055CF1E194302AB125CC93208A8C733EFB45DC301CA6E7E2A4051F411E0 | |||
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\shell.fne | executable | |
MD5:D54753E7FC3EA03AEC0181447969C0E8 | SHA256:192608FF371400C1529AA05F1ADBA0FE4FDD769FCBF35EE5F8B4F78A838A7EC9 | |||
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\dp1.fne | executable | |
MD5:6D4B2E73F6F8ECFF02F19F7E8EF9A8C7 | SHA256:FE5783E64AA70FAC10C2E42D460732D9770534357329D8BC78576557C165F040 | |||
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\internet.fne | executable | |
MD5:56E9E121D68B5631A360D56B2EF4777F | SHA256:C247997B04FC5535BB07AB43C3628326C6365AA6A0BD82A6F380B8AB66A09D2F | |||
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\com.run | executable | |
MD5:CE2F773275D3FE8B78F4CF067D5E6A0F | SHA256:EB8099C0AD2D82D9D80530443E2909F3B34BE0844D445E844F1C994476C86D2D | |||
| 568 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\shell.fne | executable | |
MD5:D54753E7FC3EA03AEC0181447969C0E8 | SHA256:192608FF371400C1529AA05F1ADBA0FE4FDD769FCBF35EE5F8B4F78A838A7EC9 | |||
| 568 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\krnln.fnr | executable | |
MD5:1081D7EB7A17FAEDFA588B93FC85365E | SHA256:0351D055CF1E194302AB125CC93208A8C733EFB45DC301CA6E7E2A4051F411E0 | |||
| 2760 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\RegEx.fne | executable | |
MD5:A85D63ACEFA7A6FA639787E364C16892 | SHA256:D0B26B744A94A6DC22EBA1B79089C4E1F45DB18A68A9B02F58F017B94873DCB8 | |||
| 568 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\dp1.fne | executable | |
MD5:6D4B2E73F6F8ECFF02F19F7E8EF9A8C7 | SHA256:FE5783E64AA70FAC10C2E42D460732D9770534357329D8BC78576557C165F040 | |||
| 568 | bla.exe | C:\Users\admin\AppData\Local\Temp\E_4\RegEx.fne | executable | |
MD5:A85D63ACEFA7A6FA639787E364C16892 | SHA256:D0B26B744A94A6DC22EBA1B79089C4E1F45DB18A68A9B02F58F017B94873DCB8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4088 | XP-3425E2C9.EXE | GET | 302 | 14.215.177.34:80 | http://hi.baidu.com/siletoyou | CN | html | 221 b | whitelisted |
4088 | XP-3425E2C9.EXE | GET | 301 | 216.58.214.51:80 | http://www.bloguser.googlepages.com/au.htm | US | html | 244 b | whitelisted |
— | — | GET | 404 | 216.58.214.51:80 | http://www.baihe.googlepages.com/ul.htm | US | html | 1.53 Kb | malicious |
4088 | XP-3425E2C9.EXE | GET | — | 14.215.177.34:80 | http://im.baidu.com/search/error.html | CN | — | — | whitelisted |
4088 | XP-3425E2C9.EXE | GET | 302 | 216.58.206.14:80 | http://sites.google.com/site/wwwbloguser/au.htm | US | html | 230 b | whitelisted |
4088 | XP-3425E2C9.EXE | GET | 200 | 104.89.34.252:80 | http://www.microsoft.com/ | NL | html | 1020 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4088 | XP-3425E2C9.EXE | 104.89.34.252:80 | www.microsoft.com | Akamai Technologies, Inc. | NL | whitelisted |
4088 | XP-3425E2C9.EXE | 14.215.177.34:80 | hi.baidu.com | CHINANET Guangdong province network | CN | suspicious |
— | — | 216.58.214.51:80 | www.baihe.googlepages.com | Google Inc. | US | whitelisted |
4088 | XP-3425E2C9.EXE | 216.58.214.51:80 | www.baihe.googlepages.com | Google Inc. | US | whitelisted |
4088 | XP-3425E2C9.EXE | 216.58.206.14:80 | sites.google.com | Google Inc. | US | whitelisted |
4088 | XP-3425E2C9.EXE | 216.58.206.14:443 | sites.google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.microsoft.com |
| whitelisted |
hi.baidu.com |
| whitelisted |
im.baidu.com |
| whitelisted |
www.baihe.googlepages.com |
| malicious |
www.bloguser.googlepages.com |
| unknown |
sites.google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4088 | XP-3425E2C9.EXE | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
4088 | XP-3425E2C9.EXE | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
4088 | XP-3425E2C9.EXE | A Network Trojan was detected | ET POLICY Microsoft user-agent automated process response to automated request |