File name:

zbot.exe

Full analysis: https://app.any.run/tasks/511c672b-8f5a-4ac3-98ee-6c477a53eda2
Verdict: Malicious activity
Analysis date: January 10, 2025, 19:33:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

34510CEB373808C65949CBBE111BF2E3

SHA1:

A7BCF10B90014353744F43C010B27B764AF4D179

SHA256:

591BE7D2050CD4F7946B22B42575F108EA8B3299519774118FE4ABB8051C5CF5

SSDEEP:

3072:/caqyte61V77snHLLxtLyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONmI:/caBtT77snHRAY7PNNW4IxZ7zbC0rONR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • WinMail.exe (PID: 2244)
    • Application was injected by another process

      • dwm.exe (PID: 388)
    • Runs injected code in another process

      • itydu.exe (PID: 116)
  • SUSPICIOUS

    • Starts itself from another location

      • zbot.exe (PID: 1916)
    • Reads the Internet Settings

      • WinMail.exe (PID: 2244)
      • dwm.exe (PID: 388)
      • zbot.exe (PID: 1916)
      • cmd.exe (PID: 3000)
      • itydu.exe (PID: 116)
    • Reads Internet Explorer settings

      • WinMail.exe (PID: 2244)
    • Reads the date of Windows installation

      • zbot.exe (PID: 1916)
    • Executable content was dropped or overwritten

      • zbot.exe (PID: 1916)
      • WinMail.exe (PID: 2244)
    • Reads Microsoft Outlook installation path

      • WinMail.exe (PID: 2244)
    • Detected use of alternative data streams (AltDS)

      • WinMail.exe (PID: 2244)
    • Checks Windows Trust Settings

      • WinMail.exe (PID: 2244)
    • Reads security settings of Internet Explorer

      • WinMail.exe (PID: 2244)
    • Reads settings of System Certificates

      • WinMail.exe (PID: 2244)
    • Starts CMD.EXE for commands execution

      • zbot.exe (PID: 1916)
    • Executing commands from a ".bat" file

      • zbot.exe (PID: 1916)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 1108)
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 1404)
      • zbot.exe (PID: 1916)
      • WinMail.exe (PID: 2244)
      • itydu.exe (PID: 116)
    • Reads the computer name

      • zbot.exe (PID: 1916)
      • itydu.exe (PID: 116)
      • WinMail.exe (PID: 2244)
      • wmpnscfg.exe (PID: 1404)
    • Reads the machine GUID from the registry

      • WinMail.exe (PID: 2244)
    • Creates files or folders in the user directory

      • WinMail.exe (PID: 2244)
      • zbot.exe (PID: 1916)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1404)
    • Checks proxy server information

      • WinMail.exe (PID: 2244)
    • The sample compiled with english language support

      • WinMail.exe (PID: 2244)
    • Reads the software policy settings

      • WinMail.exe (PID: 2244)
    • Create files in a temporary directory

      • WinMail.exe (PID: 2244)
      • zbot.exe (PID: 1916)
    • Process checks Internet Explorer phishing filters

      • zbot.exe (PID: 1916)
      • itydu.exe (PID: 116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.5)
.exe | DOS Executable Borland Pascal 7.0x (19.2)
.exe | Generic Win/DOS Executable (18.8)
.exe | DOS Executable Generic (18.8)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:04:14 15:07:12+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 132608
InitializedDataSize: 14848
UninitializedDataSize: -
EntryPoint: 0x1d470
OSVersion: 5.1
ImageVersion: 1
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
7
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start zbot.exe wmpnscfg.exe no specs itydu.exe no specs svchost.exe winmail.exe cmd.exe no specs dwm.exe

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Roaming\Nipem\itydu.exe"C:\Users\admin\AppData\Roaming\Nipem\itydu.exezbot.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\nipem\itydu.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
388"C:\Windows\system32\Dwm.exe"C:\Windows\System32\dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
1108C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1404"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1916"C:\Users\admin\AppData\Local\Temp\zbot.exe" C:\Users\admin\AppData\Local\Temp\zbot.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zbot.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2244"C:\Program Files\Windows Mail\WinMail.exe" -EmbeddingC:\Program Files\Windows Mail\WinMail.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Mail
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows mail\winmail.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3000"C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\tmpb6df59e4.bat"C:\Windows\System32\cmd.exezbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
5 110
Read events
5 033
Write events
66
Delete events
11

Modification events

(PID) Process:(1108) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
525400363EFF
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\IAM\Accounts
Operation:writeName:ConnectionSettingsMigrated
Value:
1
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Trident\Settings
Operation:writeName:Always Use My Colors
Value:
0
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Trident\Settings
Operation:writeName:Always Use My Font Face
Value:
0
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Trident\Settings
Operation:writeName:Always Use My Font Size
Value:
0
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Trident\Main
Operation:writeName:Move System Caret
Value:
no
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
Operation:writeName:StoreMigratedV5
Value:
1
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
Operation:writeName:Settings Upgraded
Value:
10
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Mail
Operation:writeName:Safe Attachments
Value:
1
(PID) Process:(2244) WinMail.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows Mail\Mail
Operation:writeName:Secure Safe Attachments
Value:
1
Executable files
2
Suspicious files
19
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edb00002.logbinary
MD5:2147D5072337BB0896143252863BE341
SHA256:63513725FD1AB1D23963FAC93463C090FCEC6A8DE2556005298DBF3666623663
1916zbot.exeC:\Users\admin\AppData\Roaming\Nipem\itydu.exeexecutable
MD5:80E2D0FD4CCB5FF6E34896F2F7E3786B
SHA256:7D4AC1D8882BF81660614B3BB47E24BE3F27AB45A674798D2373F6DE22797B42
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edbtmp.logbinary
MD5:85EFD41061551F83F832C32AFEA1B141
SHA256:FC837737CD8040F78B5D62154CFB41CE6449016CEC6FD247EF407E886BA22B06
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStorebinary
MD5:64482876619424CEAB5094CB64E302DF
SHA256:49CE1D5F8BAEEC8892144AC0C9C7BB678C97A1BB7ECB2B7811C1BF386CBD30B2
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edb.chkbinary
MD5:3840FB03EE72CB424CBCDF687F4DA45F
SHA256:84E6112722190E9498C42FC6AE8A259F7A87D9DFAA05E9BABBDC9C326EE6044E
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00002.logbinary
MD5:2147D5072337BB0896143252863BE341
SHA256:63513725FD1AB1D23963FAC93463C090FCEC6A8DE2556005298DBF3666623663
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStorebinary
MD5:8E4C659C7347171ABC1FEA6DB0DDAD1C
SHA256:A80ACA25D08B755E0A97E2CA945A3625CC56E223E37B44D616F3ECE6C358E38C
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\edb.logbinary
MD5:09F9EC30C43F61C1B4E3CF574CEF1740
SHA256:3A2C8485989DE3437B107D5459308E6984CC2D0F029B25CA74DFA0BC4B754054
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.folbinary
MD5:60A3B6592DE01A4CB2E07DA218C9F34B
SHA256:8AD29C309236F0210E3AE7AF8ADEDF1642A9E561498F9320B50CEC8938EE8B83
2244WinMail.exeC:\Users\admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.patbinary
MD5:70E1416F606621C4CC6941288E338025
SHA256:E9F24AE1D1D548098938EF907536792C926102A0961E3DF226229AE03306D5E4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
2
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
root-me-dans-ton.onion
unknown

Threats

PID
Process
Class
Message
1108
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
No debug info