File name:

findlawthose.exe

Full analysis: https://app.any.run/tasks/d922a679-4a8d-4550-8a04-ce5339cd9cd9
Verdict: Malicious activity
Analysis date: May 15, 2024, 19:10:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0340A002BF0A8C4A243F4BBEF0834236

SHA1:

71721084D269C34EBAFC424D8B0234DED561572D

SHA256:

61C0A64BFE9888A239B36E6FF9CA4A146A16CF8A8A6CEA73C192294E95C60C19

SSDEEP:

49152:j4ip2XAMXys3HC7IdYFStm6W11M607WCvgTxOIsvvYK2w1P90rbhFHvQj64hbYkE:Eq2XAMiGM40Oq11MR7xvgTxOIsvgKZl+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • findlawthose.exe (PID: 3972)
      • cmd.exe (PID: 4004)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 2108)
      • findstr.exe (PID: 4036)
    • Actions looks like stealing of personal data

      • Joint.pif (PID: 1872)
  • SUSPICIOUS

    • Reads the Internet Settings

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Reads security settings of Internet Explorer

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Starts CMD.EXE for commands execution

      • findlawthose.exe (PID: 3972)
      • cmd.exe (PID: 4004)
    • Get information on the list of running processes

      • cmd.exe (PID: 4004)
    • Executing commands from ".cmd" file

      • findlawthose.exe (PID: 3972)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 4004)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4004)
    • Application launched itself

      • cmd.exe (PID: 4004)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 4004)
    • Suspicious file concatenation

      • cmd.exe (PID: 2044)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4004)
    • Checks Windows Trust Settings

      • Joint.pif (PID: 1872)
    • Reads settings of System Certificates

      • Joint.pif (PID: 1872)
    • The executable file from the user directory is run by the CMD process

      • Joint.pif (PID: 1872)
    • Reads browser cookies

      • Joint.pif (PID: 1872)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4004)
  • INFO

    • Reads the computer name

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
      • wmpnscfg.exe (PID: 1664)
    • Checks supported languages

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
      • wmpnscfg.exe (PID: 1664)
    • Creates files or folders in the user directory

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Reads mouse settings

      • Joint.pif (PID: 1872)
    • Checks proxy server information

      • Joint.pif (PID: 1872)
    • Reads the machine GUID from the registry

      • Joint.pif (PID: 1872)
    • Reads the software policy settings

      • Joint.pif (PID: 1872)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:07:24 22:17:55+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26112
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x348f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start findlawthose.exe no specs cmd.exe tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs joint.pif ping.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124cmd /c md 338603C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1664"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1872338603\Joint.pif 338603\P C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\338603\Joint.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\338603\joint.pif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2024ping -n 5 127.0.0.1C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2032findstr /V "EFFICIENCYORLANDOOUTCOMESONS" Yours C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
2044cmd /c copy /b Interface + Hacker + Accessory + Materials + Fox 338603\P C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2104tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2108findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
3972"C:\Users\admin\AppData\Local\Temp\findlawthose.exe" C:\Users\admin\AppData\Local\Temp\findlawthose.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\findlawthose.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
4004"C:\Windows\System32\cmd.exe" /k move Bullet Bullet.cmd & Bullet.cmd & exitC:\Windows\System32\cmd.exe
findlawthose.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
7 878
Read events
7 830
Write events
42
Delete events
6

Modification events

(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
1
Suspicious files
36
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Averagebinary
MD5:E556580CFBD7A992FADB47710976320A
SHA256:BCFBFB9727952BBF8C21E358A5E4A00CC4622BBF77DDC0423F5F0F22335F9B15
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Directionbinary
MD5:7A6D88A14306499A10BEA6405CFB0C05
SHA256:95FC7000AF779173A5C6157263BB440C3B1335EB5716E9163A2354A3C9CCFD11
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hackerbinary
MD5:9E1FB55708247F0D7658C6ED8B8C9368
SHA256:2557BFCAB996EDD30F6CCD12E453BBFB7BEACA13055317C99592745692560BD5
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dollarbinary
MD5:5A0A42372EFAAFA503A260C384C655C9
SHA256:93B493C964F2F7ECAB56D2EBDA19649F35BEBC85195732848DAFC0BD52483A69
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Loverbinary
MD5:DDC784C2316FD4B13F787BF335CBA424
SHA256:28000A24A5DCCA85EDABBB06171C7F2FFF870A03B87AB3D74BAE17C1CA14DAEA
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Doctorsbinary
MD5:4FBA7B15AE67115040D3B27560E572B5
SHA256:14F005182E4FCD5BBE8EFAF2B2396B010FBFE99DFB6E3C450F1FAFD856A9219C
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sundaybinary
MD5:21123E17DEDE86B2941E49ED27D0B8C7
SHA256:56BA4912EB8D821F6015CFF8F214C2E4F5AF48710D4CC21FBC4A4CF66F5AB47A
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ivorybinary
MD5:94F4CF03EC38AE188DFB6C4015906A9A
SHA256:FC0C6DFBFAF017DA504409770EFF568CBC06C0BD71CBD258AF5139711FECFE44
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Accessorybinary
MD5:D2CD246B77951309B0C17D324A9706CE
SHA256:030F5BD597F562E7D2582E80E9625FAE28E699E2A945E9DEFDD9A065B7840742
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Editorialsabr
MD5:CC711AF563A656D66B8C7030D61CEA47
SHA256:118447809BFB71A2F0D4EE19D701E23FA19E833C65C2EF1BEB5C722F5A6F8A38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
11
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1872
Joint.pif
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?12e27d4abf843930
unknown
unknown
1088
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?91e4205cfb4a00a1
unknown
unknown
1872
Joint.pif
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
1872
Joint.pif
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
unknown
1872
Joint.pif
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1872
Joint.pif
92.122.104.90:443
steamcommunity.com
AKAMAI-AS
DE
unknown
1872
Joint.pif
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
1872
Joint.pif
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1872
Joint.pif
188.114.96.3:443
frpk.xyz
CLOUDFLARENET
NL
unknown
1872
Joint.pif
142.250.185.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1088
svchost.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted

DNS requests

Domain
IP
Reputation
DDhgIWTBCbqwUIpSa.DDhgIWTBCbqwUIpSa
  • 49.13.77.253
unknown
steamcommunity.com
  • 92.122.104.90
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
frpk.xyz
  • 188.114.96.3
  • 188.114.97.3
unknown
ocsp.pki.goog
  • 142.250.185.131
whitelisted

Threats

No threats detected
No debug info