| URL: | https://mswus.blogspot.com |
| Full analysis: | https://app.any.run/tasks/283a11ba-8a67-4736-8496-dfe960828af0 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | July 20, 2020, 17:04:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 3716C8342CCCE2E65458B0D416DAF1F2 |
| SHA1: | B9DC041B84D7033FEAE4DBD07BA893ACB0AD3EDD |
| SHA256: | 609184BF017182B5FB2B114EEF087B015F4702B15D706E266387D522F888F90C |
| SSDEEP: | 3:N8EDldKn:2EnKn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 396 | "C:\Program Files\Aweray\AweSun\AweSun.exe" --mod=update --cmd=check | C:\Program Files\Aweray\AweSun\AweSun.exe | AweSun.exe | ||||||||||||
User: SYSTEM Company: AweRay Limited Integrity Level: SYSTEM Description: AweSun Exit code: 0 Version: 1.5.0.30116 Modules
| |||||||||||||||
| 496 | cmd /c netsh advfirewall firewall add rule name="AweSun" dir=in action=allow program="C:\Program Files\Aweray\AweSun\AweSun.exe" protocol=tcp enable=yes profile=domain | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 828 | cmd.exe /c C:\Users\admin\AppData\Local\Temp\{CEBC1B3F-D7BC-4652-9E93-594608BD7EF7}\{CBF23981-D88F-419C-91AB-01BCC7DED2CB}\runsfx.bat "C:\Program Files\ZohoMeeting\UnAttended\ZohoMeeting" > "C:\Program Files\ZohoMeeting\UnAttended\ZohoMeeting\logs\unziplog.txt" 2>&1 | C:\Windows\system32\cmd.exe | — | setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 848 | "C:\Program Files\Aweray\AweSun\Driver\Mirror\devcon.exe" reinstall "C:\Program Files\Aweray\AweSun\Driver\Mirror\OrayMir.inf" C50B00D7-AE62-4936-8BC8-20E0B9F0BEFB | C:\Program Files\Aweray\AweSun\Driver\Mirror\devcon.exe | AweSun.exe | ||||||||||||
User: admin Company: Windows (R) Server 2003 DDK provider Integrity Level: HIGH Description: Windows Setup API Exit code: 0 Version: 5.2.3790.1830 built by: WinDDK Modules
| |||||||||||||||
| 944 | cmd /c netsh advfirewall firewall add rule name="AweSun" dir=in action=allow program="C:\Program Files\Aweray\AweSun\AweSun.exe" protocol=udp enable=yes profile=private | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1124 | C:\Windows\system32\cmd.exe /c ver | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1444 | "C:\Windows\System32\cmd.exe" /C "C:\Program Files\Aweray\AweSun\install.bat" | C:\Windows\System32\cmd.exe | — | AweSun_1.5.0.30116.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1448 | .\ZohoMeeting_7zip.exe -y | C:\Program Files\ZohoMeeting\UnAttended\ZohoMeeting\ZohoMeeting_7zip.exe | cmd.exe | ||||||||||||
User: admin Company: Igor Pavlov Integrity Level: HIGH Description: 7z Console SFX Exit code: 0 Version: 9.21 beta Modules
| |||||||||||||||
| 1496 | "C:\Users\admin\Downloads\AweSun_1.5.0.30116.exe" | C:\Users\admin\Downloads\AweSun_1.5.0.30116.exe | iexplore.exe | ||||||||||||
User: admin Company: AweRay Limited Integrity Level: MEDIUM Description: AweSun Exit code: 1 Version: 1.5.0.30116 Modules
| |||||||||||||||
| 1500 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2952 CREDAT:922895 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 4086426818 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30826167 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000A3000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2952) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2576 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\CabBF3C.tmp | — | |
MD5:— | SHA256:— | |||
| 2576 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\TarBF3D.tmp | — | |
MD5:— | SHA256:— | |||
| 2952 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 2952 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\CabF9D4.tmp | — | |
MD5:— | SHA256:— | |||
| 2952 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\TarF9D5.tmp | — | |
MD5:— | SHA256:— | |||
| 2576 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B | binary | |
MD5:— | SHA256:— | |||
| 2576 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B | der | |
MD5:— | SHA256:— | |||
| 2576 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\6BMAVEQY.htm | html | |
MD5:— | SHA256:— | |||
| 2576 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_1624CA47AE629C668E604B084F854E36 | der | |
MD5:— | SHA256:— | |||
| 2952 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3B06.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1500 | iexplore.exe | GET | 301 | 2.16.186.24:80 | http://shell.windows.com/fileassoc/fileassoc.asp?Ext=1573109477 | unknown | — | — | whitelisted |
1500 | iexplore.exe | GET | 302 | 23.39.87.170:80 | http://go.microsoft.com/fwlink/?LinkId=57426&Ext=1573109477 | NL | — | — | whitelisted |
2576 | iexplore.exe | GET | 200 | 172.217.22.67:80 | http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D | US | der | 468 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D | US | der | 727 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQDHKIPeFigWksAvfwMj07oj | US | der | 472 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D | US | der | 471 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 172.217.22.67:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQC%2BhM6HMcY3SQIAAAAAcVwa | US | der | 472 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 172.217.22.67:80 | http://crl.pki.goog/GTS1O1core.crl | US | der | 449 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 2.16.177.146:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgSmlKweAQnV5mvGnhC32HZgRQ%3D%3D | unknown | der | 527 b | whitelisted |
2576 | iexplore.exe | GET | 200 | 2.16.177.210:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2576 | iexplore.exe | 172.217.18.97:443 | mswus.blogspot.com | Google Inc. | US | whitelisted |
2576 | iexplore.exe | 172.217.16.170:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
2576 | iexplore.exe | 216.58.208.41:443 | www.blogger.com | Google Inc. | US | whitelisted |
2952 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2576 | iexplore.exe | 216.58.208.33:443 | 1.bp.blogspot.com | Google Inc. | US | whitelisted |
2952 | iexplore.exe | 172.217.18.97:443 | mswus.blogspot.com | Google Inc. | US | whitelisted |
2952 | iexplore.exe | 13.107.21.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2952 | iexplore.exe | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2952 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2576 | iexplore.exe | 151.139.128.14:80 | ocsp.usertrust.com | Highwinds Network Group, Inc. | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
mswus.blogspot.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
www.blogger.com |
| shared |
fonts.googleapis.com |
| whitelisted |
draft.blogger.com |
| whitelisted |
resources.blogblog.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
crl.pki.goog |
| whitelisted |
1.bp.blogspot.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2576 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1052 | svchost.exe | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (s00[.]impcremote[.]com) |
1052 | svchost.exe | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (s00[.]impcremote[.]com) |
1052 | svchost.exe | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (impcs00[.]dynu[.]net) |
1052 | svchost.exe | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (impcs00[.]dynu[.]net) |
2884 | imPcRemoteInstant.exe | Potential Corporate Privacy Violation | REMOTE [PTsecurity] imPcRemote |
2576 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1500 | iexplore.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
1500 | iexplore.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
Process | Message |
|---|---|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:46.855 = Debug = [monitor]PRIMARY, left=0, top=0
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:47.918 = Debug = [monitor]PRIMARY, left=0, top=0
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.730 - Info - [mac] mac address:12:A9:86:6C:77:DE
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.729 = Debug = get_default_interface_ip ok with 192.168.100.3
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.729 - Info - [mac] local ip:192.168.100.3
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.731 - Info - [http call3] new call id:1, url:https://asapi.aweray.net/feedback/install
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.733 - Info - [http call3] id:1 create new connection : https://asapi.aweray.net:443
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.733 - Info - [async dns] start resolve dns asapi.aweray.net
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.749 - Info - attempt to connect server asapi.aweray.net:443(34.85.64.198:443)
|
AweSun_1.5.0.30116.exe | 2020-07-20 18:06:53.837 - Info - [Install] Create new you write info
|