| URL: | https://sxh.yimg.com/jf/dyc/IEinstall/hpset_2018.06.28.01.exe |
| Full analysis: | https://app.any.run/tasks/12a3c9cb-cf72-40a4-911c-5263758db21b |
| Verdict: | Malicious activity |
| Analysis date: | August 13, 2019, 15:44:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MD5: | FF75C30E90CBCC1155362C61439C40D2 |
| SHA1: | 77B8E7BA4FA8D872B9A8EADC7E7D002FAF81CBB2 |
| SHA256: | 62CA2CDCE9F1AB4D946B11CC95F027EF7C45A375CE153020DE061503C6FE8874 |
| SSDEEP: | 3:N8QiMyTKPWqn2DF2gkA:2QXyTBOi2gJ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 340 | PING 127.0.0.1 -n 1800 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 384 | wscript.exe invisible.vbs checksets.bat | C:\Windows\system32\wscript.exe | — | nsADF.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2160 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exe | iexplore.exe | ||||||||||||
User: admin Company: Yahoo! Inc. Integrity Level: MEDIUM Description: Yahoo homepage Set Setup Exit code: 0 Version: 2018.06.28.01 Modules
| |||||||||||||||
| 2468 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://sxh.yimg.com/jf/dyc/IEinstall/hpset_2018.06.28.01.exe" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2800 | webExt_DL.exe | C:\Users\admin\AppData\Local\Yahoo\yset\webExt_DL.exe | ns30E.tmp | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2888 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2468 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2964 | cmd /c ""C:\Users\admin\AppData\Local\Yahoo\yset\checksets.bat" " | C:\Windows\system32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3400 | "C:\Users\admin\AppData\Local\Temp\nsr290.tmp\nsADF.tmp" wscript.exe invisible.vbs checksets.bat | C:\Users\admin\AppData\Local\Temp\nsr290.tmp\nsADF.tmp | — | hpset_2018.06.28.01[1].exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3572 | "C:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe" /partner=external-oo-hpbanner /yfrc_ie=yset_ie_syc_hp /yfrc_ff=yset_ff_syc_hp /yfrc_chr=yset_chr_syc_hp /ytc=yset_hpiebanner /ytchp=yset_hpiebanner /intl=us /setie /setchr /setff | C:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe | hpset_2018.06.28.01[1].exe | ||||||||||||
User: admin Company: Yahoo Inc. Integrity Level: MEDIUM Description: YSearchSetTool Exit code: 0 Version: 2018, 06, 28, 01 Modules
| |||||||||||||||
| 3604 | "C:\Users\admin\AppData\Local\Temp\nsr290.tmp\ns30E.tmp" webExt_DL.exe | C:\Users\admin\AppData\Local\Temp\nsr290.tmp\ns30E.tmp | — | hpset_2018.06.28.01[1].exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 4600000092000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {43170D4D-BDE1-11E9-9885-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 2 | |||
| (PID) Process: | (2468) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E307080002000D000F002C0029002702 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2468 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 2468 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 2468 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF12EFF939F84585FE.TMP | — | |
MD5:— | SHA256:— | |||
| 2888 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 2888 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019081320190814\index.dat | dat | |
MD5:— | SHA256:— | |||
| 2888 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 2888 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BGMW763A\hpset_2018.06.28.01[1].exe | executable | |
MD5:— | SHA256:— | |||
| 2468 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exe | executable | |
MD5:— | SHA256:— | |||
| 2468 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{43170D4E-BDE1-11E9-9885-5254004A04AF}.dat | binary | |
MD5:— | SHA256:— | |||
| 2468 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019081320190814\index.dat | dat | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2468 | iexplore.exe | GET | 200 | 13.107.21.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2888 | iexplore.exe | 87.248.116.12:443 | sxh.yimg.com | Yahoo! UK Services Limited | GB | shared |
2468 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2468 | iexplore.exe | 13.107.21.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2888 | iexplore.exe | 87.248.116.11:443 | sxh.yimg.com | Yahoo! UK Services Limited | GB | shared |
3572 | YSearchSetTool.exe | 188.125.72.139:443 | geo.yahoo.com | — | CH | suspicious |
2800 | webExt_DL.exe | 52.42.149.107:443 | addons.mozilla.org | Amazon.com, Inc. | US | unknown |
3572 | YSearchSetTool.exe | 212.82.100.137:443 | search.yahoo.com | Yahoo! UK Services Limited | CH | shared |
2800 | webExt_DL.exe | 99.86.4.60:443 | addons.cdn.mozilla.net | AT&T Services, Inc. | US | suspicious |
2160 | hpset_2018.06.28.01[1].exe | 188.125.72.139:443 | geo.yahoo.com | — | CH | suspicious |
Domain | IP | Reputation |
|---|---|---|
sxh.yimg.com |
| whitelisted |
www.bing.com |
| whitelisted |
dns.msftncsi.com |
| shared |
geo.yahoo.com |
| whitelisted |
addons.mozilla.org |
| shared |
search.yahoo.com |
| whitelisted |
addons.cdn.mozilla.net |
| shared |
Process | Message |
|---|---|
YSearchSetTool.exe | 8-13-2019 16:45:08.863[3572,4056]: YSearchSetUtil called w/params: "C:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe" /partner=external-oo-hpbanner /yfrc_ie=yset_ie_syc_hp /yfrc_ff=yset_ff_syc_hp /yfrc_chr=yset_chr_syc_hp /ytc=yset_hpiebanner /ytchp=yset_hpiebanner /intl=us /setie /setchr /setff
|
YSearchSetTool.exe | 8-13-2019 16:45:08.863[3572,4056]: RedirectKeysToInteractiveUser - LoadUserProfile call failed: 1314
|
YSearchSetTool.exe | 8-13-2019 16:45:08.879[3572,4056]: YSearchSetUtil successfully loaded YSearchUtil.dll
|
YSearchSetTool.exe | 8-13-2019 16:45:08.894[3572,4056]: Successfully found Firefox profile folder location: C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default
|
YSearchSetTool.exe | 8-13-2019 16:45:08.894[3572,4056]: -- Successfully read Chrome's local state JSON file
|
YSearchSetTool.exe | 8-13-2019 16:45:08.910[3572,4056]: -- Successfully parsed Chrome's local state JSON file
|
YSearchSetTool.exe | 8-13-2019 16:45:08.926[3572,4056]: -- first run- sending acceptance beacon!
|
YSearchSetTool.exe | 8-13-2019 16:45:09.410[3572,4056]: Acting on set param: /setchr
|
YSearchSetTool.exe | 8-13-2019 16:45:09.410[3572,4056]: Acting on set param: /setchr
|
YSearchSetTool.exe | 8-13-2019 16:45:09.410[3572,4056]: Calling CYSearchSetChrome::getCurrentDefaultSP (using secure prefs: 0)
|