| download: | MrsMajor2.0.exe |
| Full analysis: | https://app.any.run/tasks/1ae6af73-353e-4a7c-bbd7-ec5f0d9e6120 |
| Verdict: | Malicious activity |
| Analysis date: | April 06, 2019, 11:54:06 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 247A35851FDEE53A1696715D67BD0905 |
| SHA1: | D2E86020E1D48E527E81E550F06C651328BD58A4 |
| SHA256: | 5DD4EA169CABF9226F54BB53E63EA6A1B5880A0D1222242AEE378EFB6255B57D |
| SSDEEP: | 786432:7VQ4fX8siQIZwastE9oGH5UcnaAVBmn163+L2:7ywXwdwRQo2O1L2 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (35.8) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (31.7) |
| .scr | | | Windows screen saver (15) |
| .dll | | | Win32 Dynamic Link Library (generic) (7.5) |
| .exe | | | Win32 Executable (generic) (5.1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:05:04 09:30:05+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 49152 |
| InitializedDataSize: | 26840064 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug, Pre-release, Private build |
| FileOS: | Windows 16-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| FileDescription: | Cling Clang.. |
| FileVersion: | 1,0,0,0 |
| ProductName: | MrsMajor 2.0 |
| InternalName: | majordared.exe |
| ProductVersion: | 1.0.0.0 |
| LegalCopyright: | Elektro Berkay |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 04-May-2016 07:30:05 |
| Detected languages: |
|
| FileDescription: | Cling Clang.. |
| FileVersion: | 1,0,0,0 |
| ProductName: | MrsMajor 2.0 |
| InternalName: | majordared.exe |
| ProductVersion: | 1.0.0.0 |
| LegalCopyright: | Elektro Berkay |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 04-May-2016 07:30:05 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.code | 0x00001000 | 0x000020C7 | 0x00002200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.43644 |
.text | 0x00004000 | 0x00009C1A | 0x00009E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.5668 |
.rdata | 0x0000E000 | 0x0000097E | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.60937 |
.data | 0x0000F000 | 0x00001784 | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.79557 |
.rsrc | 0x00011000 | 0x01996D74 | 0x01996E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.7581 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.09999 | 668 | Latin 1 / Western European | UNKNOWN | RT_MANIFEST |
B | 5.38576 | 3046 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
D | 3.46772 | 14 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
F | 7.75753 | 26786395 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
I | 4.82225 | 1874 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
N | 2.86596 | 20 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
O | 0.650022 | 6 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
COMCTL32.DLL |
GDI32.DLL |
KERNEL32.dll |
MSVCRT.dll |
OLE32.DLL |
SHELL32.DLL |
SHLWAPI.DLL |
USER32.DLL |
WINMM.DLL |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 636 | "C:\Program Files\MicrosoftWindowsServicesEtc\notmuch.exe" | C:\Program Files\MicrosoftWindowsServicesEtc\notmuch.exe | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Description: NotMuch Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1336 | "C:\Windows\System32\cmd.exe" /c cd\&cd "C:\Users\admin\AppData\Local\Temp" & eula32.exe | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1548 | takeown /f sethc.exe | C:\Windows\System32\takeown.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Takes ownership of a file Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1816 | "C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\1\CFCF.bat "C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe"" | C:\Windows\system32\cmd.exe | GetReady.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2304 | "C:\Users\admin\Desktop\MrsMajor2.0.exe" | C:\Users\admin\Desktop\MrsMajor2.0.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 2356 | eula32.exe | C:\Users\admin\AppData\Local\Temp\eula32.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Description: eula32 Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2748 | "C:\Users\admin\Desktop\MrsMajor2.0.exe" | C:\Users\admin\Desktop\MrsMajor2.0.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2800 | "C:\Windows\System32\shutdown.exe" -r -t 5 | C:\Windows\System32\shutdown.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Shutdown and Annotation Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3308 | takeown /f taskmgr.exe | C:\Windows\System32\takeown.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Takes ownership of a file Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3324 | icacls sethc.exe /granted "admin":F | C:\Windows\System32\icacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2748) MrsMajor2.0.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2748) MrsMajor2.0.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | MajorX |
Value: wscript.exe "C:\Users\admin\AppData\Local\Temp\xRun.vbs" | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, wscript.exe "C:\Program Files\MicrosoftWindowsServicesEtc\xRunReg.vbs" | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system |
| Operation: | write | Name: | wallpaper |
Value: C:\Users\admin\AppData\Local\Temp\theTruth.jpg | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop |
| Operation: | write | Name: | NoChangingWallPaper |
Value: 1 | |||
| (PID) Process: | (3584) wscript.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
| Operation: | write | Name: | Arrow |
Value: C:\Program Files\MicrosoftWindowsServicesEtc\data\excursor.ani | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\clingclang.wav | — | |
MD5:— | SHA256:— | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\CallFunc.vbs | text | |
MD5:5F9737F03289963A6D7A71EFAB0813C4 | SHA256:A767894A68EBC490CB5AB2B7B04DD12B7465553CE7BA7E41E1EA45F1EAEF5275 | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\AppKill.bat | text | |
MD5:D4E987817D2E5D6ED2C12633D6F11101 | SHA256:5549670EF8837C6E3C4E496C1EA2063670618249D4151DEA4D07D48AB456690C | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\data\eula32.exe | executable | |
MD5:CBC127FB8DB087485068044B966C76E8 | SHA256:C5704419B3EEC34FB133CF2509D12492FEBDCB8831EFA1AB014EDEAC83F538D9 | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\GetReady.exe | executable | |
MD5:57F3795953DAFA8B5E2B24BA5BFAD87F | SHA256:5319958EFC38EA81F61854EB9F6C8AEE32394D4389E52FE5C1F7F7EF6B261725 | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\majorsod.exe | executable | |
MD5:B561C360C46744F55BE79A25E1844E3C | SHA256:D1094E91960DED15444C6F50756ADC451A7C0B495B2EA28319B7184BA96236F7 | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\data\thetruth.jpg | image | |
MD5:7907845316BDBD32200B82944D752D9C | SHA256:4E3BAEA3D98C479951F9EA02E588A3B98B1975055C1DFDF67AF4DE6E7B41E476 | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\DgzRun.vbs | text | |
MD5:A91417F7C55510155771F1F644DD6C7E | SHA256:729F7540887CF32A5D4E1968A284C46CF904752821C734BD970ECD30A848477A | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\fexec.vbs | text | |
MD5:FD76266C8088A4DCA45414C36C7E9523 | SHA256:F853DDDB0F9F1B74B72BCCDB5191C28E18D466B5DBC205F7741A24391375CD6F | |||
| 2748 | MrsMajor2.0.exe | C:\Users\admin\AppData\Local\Temp\A11E.tmp\MicrosoftWindowsServicesEtc\data\excursor.ani | ani | |
MD5:289624A46BB7EC6D91D5B099343B7F24 | SHA256:B93B0CB2BB965F5758CB0C699FBC827A64712D6F248AAF810CDE5FA5EF3227EB | |||