| URL: | https://anonfiles.com/p3y1U1Aex8/Hotspot_Shield_VPN_Elite_7.20.8_Full_Patch_TakenSoft_rar |
| Full analysis: | https://app.any.run/tasks/763eb1a8-d624-490b-8d50-a30dc533351a |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | January 25, 2022, 23:38:33 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | A80A89EB6562FB8D0DA3AA3F98485B15 |
| SHA1: | C3D72AE3CBCEBE0C8A6B4BF64C8E8E46AD184055 |
| SHA256: | 5AA497EF199312170F61CE989E6F2539BEDC90604AF5350267EE4CE8FD350678 |
| SSDEEP: | 3:N8M2OWlyFHgexuc3LhJe5P+UXn:2M25lqxxuIG5Pp |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "taskkill.exe" /F /IM af_proxy_cmd.exe | C:\Windows\system32\taskkill.exe | — | MsiExec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 276 | "C:\Program Files\Hotspot Shield\bin\HssInstaller.exe" -addcfg "startup.cfg" "/config/htdocs_dir" "C:\Program Files\Hotspot Shield\htdocs" "config" -product hss | C:\Program Files\Hotspot Shield\bin\HssInstaller.exe | — | MsiExec.exe | |||||||||||
User: admin Company: AnchorFree Inc. Integrity Level: HIGH Description: Hotspot Shield 6.8.12 Exit code: 0 Version: 6.8.12.10541 Modules
| |||||||||||||||
| 420 | "C:\Users\admin\AppData\Local\Temp\srv2.exe" | C:\Users\admin\AppData\Local\Temp\srv2.exe | Setup.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: gosgo Exit code: 3762504530 Version: 1.0.0.0 Modules
| |||||||||||||||
| 496 | C:\Windows\system32\net1 start hshld | C:\Windows\system32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 532 | "C:\Program Files\Hotspot Shield\bin\HssInstaller.exe" -addcfg "startup.cfg" "/config/dport_end" "56999" "config" -product hss | C:\Program Files\Hotspot Shield\bin\HssInstaller.exe | — | MsiExec.exe | |||||||||||
User: admin Company: AnchorFree Inc. Integrity Level: HIGH Description: Hotspot Shield 6.8.12 Exit code: 0 Version: 6.8.12.10541 Modules
| |||||||||||||||
| 572 | "C:\Program Files\Hotspot Shield\bin\HssInstaller.exe" -addcfg "startup.cfg" "/config/priority" "NORMAL_PRIORITY_CLASS" "config" -product hss | C:\Program Files\Hotspot Shield\bin\HssInstaller.exe | — | MsiExec.exe | |||||||||||
User: admin Company: AnchorFree Inc. Integrity Level: HIGH Description: Hotspot Shield 6.8.12 Exit code: 0 Version: 6.8.12.10541 Modules
| |||||||||||||||
| 628 | "C:\Users\admin\AppData\Local\Temp\{A8826FBF-2BCB-4B2C-A64A-4C484AA54E06}\.cr\setup.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\nsr5286.tmp\setup.exe" -burn.filehandle.attached=272 -burn.filehandle.self=280 | C:\Users\admin\AppData\Local\Temp\{A8826FBF-2BCB-4B2C-A64A-4C484AA54E06}\.cr\setup.exe | setup.exe | ||||||||||||
User: admin Company: AnchorFree Inc. Integrity Level: HIGH Description: Hotspot Shield 6.8.12 Exit code: 0 Version: 6.8.12.10541 Modules
| |||||||||||||||
| 652 | "taskkill.exe" /F /IM FBW.exe | C:\Windows\system32\taskkill.exe | — | MsiExec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 672 | rundll32.exe "C:\Windows\Installer\MSICAFD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1559218 253 Setup.Actions!Setup.Actions.CustomActions.InstallFinalCleanup | C:\Windows\system32\rundll32.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 744 | "C:\Program Files\Hotspot Shield\bin\HssInstaller.exe" -addcfg "startup.cfg" "/config/verify_dir" "C:\Program Files\Hotspot Shield\log\verify" "config" -product hss | C:\Program Files\Hotspot Shield\bin\HssInstaller.exe | — | MsiExec.exe | |||||||||||
User: admin Company: AnchorFree Inc. Integrity Level: HIGH Description: Hotspot Shield 6.8.12 Exit code: 0 Version: 6.8.12.10541 Modules
| |||||||||||||||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30937668 | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30937668 | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3148) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3148 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 3148 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | der | |
MD5:— | SHA256:— | |||
| 3148 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | binary | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\anonfiles[1].css | text | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8CF5BD514FD3F41B9B84FC505B8DCD45 | der | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\Hotspot_Shield_VPN_Elite_7.20[1].htm | html | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8CF5BD514FD3F41B9B84FC505B8DCD45 | binary | |
MD5:— | SHA256:— | |||
| 4016 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\app[1].js | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4016 | iexplore.exe | GET | 200 | 95.101.89.75:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgNP3fS5KI692THHXqQ23ICPyg%3D%3D | unknown | der | 503 b | shared |
4016 | iexplore.exe | GET | 200 | 18.66.9.49:80 | http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D | US | der | 1.51 Kb | whitelisted |
3148 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D | US | der | 1.47 Kb | whitelisted |
3148 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D | US | der | 471 b | whitelisted |
420 | srv2.exe | GET | 200 | 34.117.59.81:80 | http://ipinfo.io/196.244.192.6 | US | binary | 262 b | shared |
2472 | setup.exe | GET | 200 | 104.18.21.226:80 | http://crl.globalsign.net/root-r3.crl | US | der | 1.77 Kb | whitelisted |
4016 | iexplore.exe | GET | 200 | 143.204.101.99:80 | http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D | US | der | 1.70 Kb | whitelisted |
2472 | setup.exe | GET | 200 | 23.37.43.27:80 | http://sv.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQe6LNDJdqx%2BJOp7hVgTeaGFJ%2FCQgQUljtT8Hkzl699g%2B8uK8zKt4YecmYCEGfxU7IK0zmcft3OLGyv12Y%3D | NL | der | 1.47 Kb | shared |
3148 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | der | 471 b | whitelisted |
4016 | iexplore.exe | GET | 200 | 18.66.242.62:80 | http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D | US | der | 1.39 Kb | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3148 | iexplore.exe | 8.253.207.120:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | malicious |
4016 | iexplore.exe | 45.154.253.150:443 | anonfiles.com | — | — | suspicious |
4016 | iexplore.exe | 8.253.207.120:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | malicious |
4016 | iexplore.exe | 104.89.32.83:80 | x1.c.lencr.org | Akamai Technologies, Inc. | NL | suspicious |
— | — | 45.154.253.150:443 | anonfiles.com | — | — | suspicious |
4016 | iexplore.exe | 95.101.89.75:80 | r3.o.lencr.org | Akamai International B.V. | — | unknown |
4016 | iexplore.exe | 45.154.253.151:443 | anonfiles.com | — | — | suspicious |
3148 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3148 | iexplore.exe | 204.79.197.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
4016 | iexplore.exe | 151.101.130.217:443 | vjs.zencdn.net | Fastly | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
anonfiles.com |
| shared |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
vjs.zencdn.net |
| whitelisted |
djv99sxoqpv11.cloudfront.net |
| shared |
ocsp2.globalsign.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.dyndns. Domain |
— | — | Misc activity | AV INFO Query to checkip.dyndns. Domain |
420 | srv2.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup - checkip.dyndns.org |
420 | srv2.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ipinfo.io |
420 | srv2.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup - checkip.dyndns.org |
420 | srv2.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup - checkip.dyndns.org |
420 | srv2.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ipinfo.io |