| File name: | LSRP.exe |
| Full analysis: | https://app.any.run/tasks/e33e8664-f12e-4674-a4fb-82d1c53db16b |
| Verdict: | Malicious activity |
| Analysis date: | January 07, 2024, 17:08:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 02A8FC64CE50C2594163580DCE9C5B37 |
| SHA1: | BDA4BD8AED17024B1974E626DB98FDE0550AF036 |
| SHA256: | 5F180F2B06400A24DC4A77DE281D3A493C30A5E5E5ECA2C256472E144A829D44 |
| SSDEEP: | 98304:Qs9w7LxKbLcFQO1NsZDtoGqB1Xg95Oqu97OzPH+rPz9nCfaPBYMBBfsBnp88HNDz:V/aDWEyn76E |
| .exe | | | Win64 Executable (generic) (56.1) |
|---|---|---|
| .scr | | | Windows screen saver (26.6) |
| .exe | | | Win32 Executable (generic) (9.1) |
| .exe | | | Generic Win/DOS Executable (4) |
| .exe | | | DOS Executable Generic (4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:06:14 21:11:00+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 259584 |
| InitializedDataSize: | 307712 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2cbbc |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.1.5.0 |
| ProductVersionNumber: | 0.1.5.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | ASCII |
| Comments: | - |
| CompanyName: | By Nexus |
| FileDescription: | LS-RP.com |
| FileVersion: | 0.1.5.0 |
| InternalName: | ams_launch |
| LegalTrademarks: | By Nexus |
| OriginalFileName: | LSRP+.exe |
| ProductName: | Los Santos Roleplay+ |
| ProductVersion: | 0.1.5.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\AppData\Local\Temp\LSRP.exe" | C:\Users\admin\AppData\Local\Temp\LSRP.exe | — | explorer.exe | |||||||||||
User: admin Company: By Nexus Integrity Level: MEDIUM Description: LS-RP.com Exit code: 0 Version: 0.1.5.0 Modules
| |||||||||||||||
| 1072 | "C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\admin\AppData\Local\Temp\LSRP.exe" | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | LSRP.exe | ||||||||||||
User: admin Company: By Nexus Integrity Level: MEDIUM Description: LS-RP.com Exit code: 0 Version: 0.1.5.0 Modules
| |||||||||||||||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 460000005B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47} |
| Operation: | write | Name: | WpadDecisionReason |
Value: 1 | |||
| (PID) Process: | (1072) autorun.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47} |
| Operation: | write | Name: | WpadDecisionTime |
Value: 1D442A308C41DA01 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd | compressed | |
MD5:3E56603B472EFB878CC93A79F54631D0 | SHA256:08E7ABE097B1763650F49A878E80BCBD2CDD76A8464B2B404247626B832948C3 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\Draw\Draw.lmd | executable | |
MD5:6B1CDF960E0ED0F2CD2D049BADB7832A | SHA256:814DF73BA2D1E8BA5F8B6D2B93E5BBEDE5AFA7D725EA0E406258DCEB73E14738 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\lsrpp_logo.png | image | |
MD5:32F1D544A06CCF907DE4C175B959C2F7 | SHA256:4D5A51718F8BB532A18C1482E171F341F8FD7C8BF42CD3105FBE8509DCB1E44F | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\ListIcon\ListIcon.lmd | executable | |
MD5:561109D9FA99C3CF398B7797531623D3 | SHA256:0C91DCF3D6FB6CD7CE35A80E6DD3D57EABFB761A068A9CF6F908A5BA00261AF5 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | executable | |
MD5:A9AA34A0F00130BAC0856E7F6084F50D | SHA256:E370B1C7DC9B0D19414547430011A5AF726204FF1F3119D34C2E59F815EA6228 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\MemoryEx\MemoryEx.lmd | executable | |
MD5:E7C4E26AA905BBFE90416D5421D52C17 | SHA256:7D7B5C17794EBF7CD2CED16537F1C74A735F3A86F85F8D3A9EF3A89B0C8E3A5F | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\luasql\sqlite3.dll | executable | |
MD5:9BFE3E9A406BC5A960E656E17DA7E82B | SHA256:2E814B8463379E4D5FC6C36CCB73124A8A7419E5F2C572BFA0DF06948887F805 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\SHAPE\SHAPE.APO | executable | |
MD5:75A9117316FA7CD057AFC78C4859DF4D | SHA256:4386C7BEE62D530E0549862E9EA97DDD9151C055337775AB090487D9DB3EC240 | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\WinApi\WinApi.lmd | executable | |
MD5:0194F4B3EA555E5A2EC2C5AA38C3F47A | SHA256:F1166C24279CD83A4BDF7BFE4906113B31DB005608DCF688F62B53467807E65D | |||
| 116 | LSRP.exe | C:\Users\admin\AppData\Local\Temp\ir_ext_temp_0\lsrpp.ico | image | |
MD5:23C0741E541BE8220E516BD0C98646E0 | SHA256:36FCC21B79B58E26955DDAD6A8066FF10D0CEAE8212516D5072C5DC6E66F16C4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1072 | autorun.exe | POST | 301 | 188.114.97.3:80 | http://ls-rp.com/?page=ucplogout | unknown | — | — | unknown |
1072 | autorun.exe | GET | 200 | 184.24.77.179:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9c35526d3a6ecb8f | unknown | compressed | 4.66 Kb | unknown |
1072 | autorun.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | unknown | binary | 1.41 Kb | unknown |
1072 | autorun.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D | unknown | binary | 724 b | unknown |
1080 | svchost.exe | GET | 304 | 173.222.108.242:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?eca8823d6d0692d6 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1072 | autorun.exe | 188.114.97.3:80 | ls-rp.com | CLOUDFLARENET | NL | unknown |
1072 | autorun.exe | 188.114.97.3:443 | ls-rp.com | CLOUDFLARENET | NL | unknown |
1072 | autorun.exe | 184.24.77.179:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
1072 | autorun.exe | 142.250.186.131:80 | ocsp.pki.goog | GOOGLE | US | whitelisted |
1080 | svchost.exe | 173.222.108.242:80 | ctldl.windowsupdate.com | Akamai International B.V. | CH | unknown |
Domain | IP | Reputation |
|---|---|---|
ls-rp.com |
| malicious |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
community.ls-rp.com |
| unknown |