| File name: | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N |
| Full analysis: | https://app.any.run/tasks/3fd9de2e-33e3-4c74-bb4a-2d0d1e3c82bf |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | November 07, 2024, 18:39:52 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 6603274198C7489C05E99F9C05E92500 |
| SHA1: | 6F55C0AEFCA08578AFF195C5D586FD3D8D331322 |
| SHA256: | 5B68D93F21D6B07AC727CB0B813615A547CBB929F9E36147F5CE9EEDDBDE4E98 |
| SSDEEP: | 6144:SJYXvFbsaXdS+S+S+S+S+S+S+S+S+S+S+SUU:2YfNpFU |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1970:01:01 15:50:05+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 52736 |
| InitializedDataSize: | 1565184 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x18f000 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.9 |
| ProductVersionNumber: | 0.0.0.9 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | Chinese (Traditional) |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | Teco Image Systems Co., Ltd. |
| FileDescription: | Printer Status Displayer |
| FileVersion: | 0, 0, 0, 9 |
| InternalName: | Status Monitor |
| LegalCopyright: | Copyright (c) Teco Image Systems Co., Ltd. and his Licensors. All right reserved. |
| LegalTrademarks: | - |
| OriginalFileName: | 4P_SMON |
| PrivateBuild: | - |
| ProductName: | - |
| ProductVersion: | 0, 0, 0, 9 |
| SpecialBuild: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 540 | "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager" | C:\Windows\System32\cmd.exe | — | 2858313152.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 920 | sc stop WaaSMedicSvc | C:\Windows\SysWOW64\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Service Control Manager Configuration Tool Exit code: 5 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 920 | schtasks /delete /f /tn "Windows Upgrade Manager" | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1176 | sc stop DoSvc | C:\Windows\SysWOW64\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Service Control Manager Configuration Tool Exit code: 5 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | sc stop UsoSvc | C:\Windows\SysWOW64\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Service Control Manager Configuration Tool Exit code: 5 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1700 | C:\WINDOWS\System32\reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Windows Security" /t REG_SZ /f /d "C:\Users\admin\Microsoft Windows Security\winupsecvmgr.exe" | C:\Windows\System32\reg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1788 | C:\Users\admin\Microsoft Windows Security\winupsecvmgr.exe | C:\Users\admin\Microsoft Windows Security\winupsecvmgr.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2172 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2224 | "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait | C:\Windows\SysWOW64\cmd.exe | — | sysppvrdnvs.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 5 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2660 | C:\Users\admin\AppData\Local\Temp\2858313152.exe | C:\Users\admin\AppData\Local\Temp\2858313152.exe | — | sysppvrdnvs.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (6516) 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6516) 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6516) 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (6044) BEF3.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6044) BEF3.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6044) BEF3.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (5356) 1428614846.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Windows Settings |
Value: C:\Users\admin\sysppvrdnvs.exe | |||
| (PID) Process: | (7128) sysppvrdnvs.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate |
| Operation: | write | Name: | DisableWindowsUpdate |
Value: 1 | |||
| (PID) Process: | (7128) sysppvrdnvs.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU |
| Operation: | write | Name: | NoAutoUpdate |
Value: 1 | |||
| (PID) Process: | (7128) sysppvrdnvs.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU |
| Operation: | write | Name: | AlwaysAutoUpdate |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | C:\Users\admin\AppData\Local\Temp\BEF3.exe | executable | |
MD5:8D8E6C7952A9DC7C0C73911C4DBC5518 | SHA256:FEB4C3AE4566F0ACBB9E0F55417B61FEFD89DC50A4E684DF780813FB01D61278 | |||
| 4208 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d2mijjuo.ffv.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\1[1] | binary | |
MD5:1FCB78FB6CF9720E9D9494C42142D885 | SHA256:84652BB8C63CA4FD7EB7A2D6EF44029801F3057AA2961867245A3A765928DD02 | |||
| 4208 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_sb0o3e51.20w.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\AppData\Local\Temp\2858313152.exe | binary | |
MD5:39F45EDB23427EBF63197CA138DDB282 | SHA256:77FBB0D8630024634880C37DA59CE57D1B38C7E85BDCC14C697DB9E79C24E0DE | |||
| 4208 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:8D7B90E3C01542109F943326CE464AE5 | SHA256:469BAA0A5C8C7521229351DD7F81949A238FDBAB764FAAD5DE98022D20608478 | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\2[1] | binary | |
MD5:39F45EDB23427EBF63197CA138DDB282 | SHA256:77FBB0D8630024634880C37DA59CE57D1B38C7E85BDCC14C697DB9E79C24E0DE | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\tbtnds.dat | binary | |
MD5:EF3953B964BE356A94E15122D0AE4A60 | SHA256:AD2DC6A04B4A818BB6D7B7070E8B07F38196751AE7872DC47E1968E2C7EC0BE8 | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\AppData\Local\Temp\1130718550.exe | binary | |
MD5:1FCB78FB6CF9720E9D9494C42142D885 | SHA256:84652BB8C63CA4FD7EB7A2D6EF44029801F3057AA2961867245A3A765928DD02 | |||
| 7128 | sysppvrdnvs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\3[1] | binary | |
MD5:1568EFB715BD9797610F55AA48DFB18E | SHA256:F42EF51C4C7C8F607A0405848593369BFC193B771E8ED687540632CAD1376216 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/pei.exe | unknown | — | — | malicious |
6944 | svchost.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5640 | RUXIMICS.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6044 | BEF3.exe | GET | 200 | 185.215.113.66:80 | http://twizt.net/newtpp.exe | unknown | — | — | malicious |
5640 | RUXIMICS.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7128 | sysppvrdnvs.exe | GET | — | 185.215.113.66:80 | http://185.215.113.66/1 | unknown | — | — | malicious |
7128 | sysppvrdnvs.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/1 | unknown | — | — | malicious |
7128 | sysppvrdnvs.exe | GET | — | 185.215.113.66:80 | http://185.215.113.66/2 | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5488 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5640 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
— | — | 104.126.37.154:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
6944 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | 185.215.113.66:80 | twizt.net | 1337team Limited | SC | malicious |
6944 | svchost.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5640 | RUXIMICS.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
twizt.net |
| unknown |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.update.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Misc activity | ET INFO Packed Executable Download |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 |
6044 | BEF3.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
6516 | 5b68d93f21d6b07ac727cb0b813615a547cbb929f9e36147f5ce9eeddbde4e98N.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
7128 | sysppvrdnvs.exe | A Network Trojan was detected | ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC |