analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

findlawthose.exe

Full analysis: https://app.any.run/tasks/d922a679-4a8d-4550-8a04-ce5339cd9cd9
Verdict: Malicious activity
Analysis date: May 15, 2024, 19:10:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0340A002BF0A8C4A243F4BBEF0834236

SHA1:

71721084D269C34EBAFC424D8B0234DED561572D

SHA256:

61C0A64BFE9888A239B36E6FF9CA4A146A16CF8A8A6CEA73C192294E95C60C19

SSDEEP:

49152:j4ip2XAMXys3HC7IdYFStm6W11M607WCvgTxOIsvvYK2w1P90rbhFHvQj64hbYkE:Eq2XAMiGM40Oq11MR7xvgTxOIsvgKZl+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • findlawthose.exe (PID: 3972)
      • cmd.exe (PID: 4004)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 4036)
      • findstr.exe (PID: 2108)
    • Actions looks like stealing of personal data

      • Joint.pif (PID: 1872)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Starts CMD.EXE for commands execution

      • findlawthose.exe (PID: 3972)
      • cmd.exe (PID: 4004)
    • Executing commands from ".cmd" file

      • findlawthose.exe (PID: 3972)
    • Reads the Internet Settings

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Get information on the list of running processes

      • cmd.exe (PID: 4004)
    • Application launched itself

      • cmd.exe (PID: 4004)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 4004)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4004)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4004)
    • Suspicious file concatenation

      • cmd.exe (PID: 2044)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 4004)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4004)
    • The executable file from the user directory is run by the CMD process

      • Joint.pif (PID: 1872)
    • Checks Windows Trust Settings

      • Joint.pif (PID: 1872)
    • Reads browser cookies

      • Joint.pif (PID: 1872)
    • Reads settings of System Certificates

      • Joint.pif (PID: 1872)
  • INFO

    • Creates files or folders in the user directory

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
    • Reads the computer name

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
      • wmpnscfg.exe (PID: 1664)
    • Checks supported languages

      • findlawthose.exe (PID: 3972)
      • Joint.pif (PID: 1872)
      • wmpnscfg.exe (PID: 1664)
    • Checks proxy server information

      • Joint.pif (PID: 1872)
    • Reads mouse settings

      • Joint.pif (PID: 1872)
    • Reads the machine GUID from the registry

      • Joint.pif (PID: 1872)
    • Reads the software policy settings

      • Joint.pif (PID: 1872)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x348f
UninitializedDataSize: 2048
InitializedDataSize: 141824
CodeSize: 26112
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2021:07:24 22:17:55+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start findlawthose.exe no specs cmd.exe tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs joint.pif ping.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3972"C:\Users\admin\AppData\Local\Temp\findlawthose.exe" C:\Users\admin\AppData\Local\Temp\findlawthose.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\findlawthose.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
4004"C:\Windows\System32\cmd.exe" /k move Bullet Bullet.cmd & Bullet.cmd & exitC:\Windows\System32\cmd.exe
findlawthose.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
4028tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4036findstr /I "wrsa.exe opssvc.exe" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
2104tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2108findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
124cmd /c md 338603C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2032findstr /V "EFFICIENCYORLANDOOUTCOMESONS" Yours C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
2044cmd /c copy /b Interface + Hacker + Accessory + Materials + Fox 338603\P C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1872338603\Joint.pif 338603\P C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\338603\Joint.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\338603\joint.pif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
Total events
7 878
Read events
7 830
Write events
42
Delete events
6

Modification events

(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3972) findlawthose.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1872) Joint.pifKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
1
Suspicious files
36
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Loverbinary
MD5:DDC784C2316FD4B13F787BF335CBA424
SHA256:28000A24A5DCCA85EDABBB06171C7F2FFF870A03B87AB3D74BAE17C1CA14DAEA
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dollarbinary
MD5:5A0A42372EFAAFA503A260C384C655C9
SHA256:93B493C964F2F7ECAB56D2EBDA19649F35BEBC85195732848DAFC0BD52483A69
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Snakebinary
MD5:B59445B88695FD69DC7830CEBB814482
SHA256:9ECFFE21A9E9641A78326A6F9D56D0C4985D18595D8AC61D6D26212B1AC43971
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Directionbinary
MD5:7A6D88A14306499A10BEA6405CFB0C05
SHA256:95FC7000AF779173A5C6157263BB440C3B1335EB5716E9163A2354A3C9CCFD11
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Abrahambinary
MD5:80DAB3C7E8B663F98EB8E0B3C264D13C
SHA256:239049F1D14593E349ABD5E2B4857F253381D125BEDBFBC6FC1066EDF0A45066
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Doctorsbinary
MD5:4FBA7B15AE67115040D3B27560E572B5
SHA256:14F005182E4FCD5BBE8EFAF2B2396B010FBFE99DFB6E3C450F1FAFD856A9219C
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ivorybinary
MD5:94F4CF03EC38AE188DFB6C4015906A9A
SHA256:FC0C6DFBFAF017DA504409770EFF568CBC06C0BD71CBD258AF5139711FECFE44
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Materialsbinary
MD5:2314218DD9E4853FF1BD5CC2582D04FF
SHA256:602971E19DE6C87FF906D48590E5CCBCCA522CA73219A68D8ADE4C522890E993
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Examsabr
MD5:1807BCD7105F7937E9665950762EAD76
SHA256:ED6132C5B804E98EEB135C28BBEE3CCB962CAF3983EE8F80A008C28A965A0844
3972findlawthose.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sundaybinary
MD5:21123E17DEDE86B2941E49ED27D0B8C7
SHA256:56BA4912EB8D821F6015CFF8F214C2E4F5AF48710D4CC21FBC4A4CF66F5AB47A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
11
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1872
Joint.pif
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?12e27d4abf843930
unknown
unknown
1872
Joint.pif
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
1872
Joint.pif
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
unknown
1088
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?91e4205cfb4a00a1
unknown
unknown
1872
Joint.pif
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1872
Joint.pif
92.122.104.90:443
steamcommunity.com
AKAMAI-AS
DE
unknown
1872
Joint.pif
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
1872
Joint.pif
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1872
Joint.pif
188.114.96.3:443
frpk.xyz
CLOUDFLARENET
NL
unknown
1872
Joint.pif
142.250.185.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1088
svchost.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted

DNS requests

Domain
IP
Reputation
DDhgIWTBCbqwUIpSa.DDhgIWTBCbqwUIpSa
  • 49.13.77.253
unknown
steamcommunity.com
  • 92.122.104.90
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
frpk.xyz
  • 188.114.96.3
  • 188.114.97.3
unknown
ocsp.pki.goog
  • 142.250.185.131
whitelisted

Threats

No threats detected
No debug info