analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://sxh.yimg.com/jf/dyc/IEinstall/hpset_2018.06.28.01.exe

Full analysis: https://app.any.run/tasks/8273ffd3-e5ec-4ddd-8d07-130079c137e3
Verdict: Malicious activity
Analysis date: August 13, 2019, 15:45:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

FF75C30E90CBCC1155362C61439C40D2

SHA1:

77B8E7BA4FA8D872B9A8EADC7E7D002FAF81CBB2

SHA256:

62CA2CDCE9F1AB4D946B11CC95F027EF7C45A375CE153020DE061503C6FE8874

SSDEEP:

3:N8QiMyTKPWqn2DF2gkA:2QXyTBOi2gJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ns5644.tmp (PID: 1716)
      • hpset_2018.06.28.01[1].exe (PID: 3356)
      • webExt_DL.exe (PID: 1404)
      • YSearchSetTool.exe (PID: 2292)
      • ns6CAB.tmp (PID: 3748)
    • Loads dropped or rewritten executable

      • hpset_2018.06.28.01[1].exe (PID: 3356)
      • YSearchSetTool.exe (PID: 2292)
      • webExt_DL.exe (PID: 1404)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2080)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2568)
      • iexplore.exe (PID: 4052)
      • hpset_2018.06.28.01[1].exe (PID: 3356)
      • webExt_DL.exe (PID: 1404)
    • Starts application with an unusual extension

      • hpset_2018.06.28.01[1].exe (PID: 3356)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 768)
    • Creates files in the user directory

      • YSearchSetTool.exe (PID: 2292)
      • hpset_2018.06.28.01[1].exe (PID: 3356)
    • Changes the started page of IE

      • YSearchSetTool.exe (PID: 2292)
    • Executes scripts

      • ns6CAB.tmp (PID: 3748)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2568)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2568)
      • iexplore.exe (PID: 4052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
10
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start iexplore.exe iexplore.exe hpset_2018.06.28.01[1].exe ysearchsettool.exe ns5644.tmp no specs webext_dl.exe ns6cab.tmp no specs wscript.exe no specs cmd.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2568"C:\Program Files\Internet Explorer\iexplore.exe" "https://sxh.yimg.com/jf/dyc/IEinstall/hpset_2018.06.28.01.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4052"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2568 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3356"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exe
iexplore.exe
User:
admin
Company:
Yahoo! Inc.
Integrity Level:
MEDIUM
Description:
Yahoo homepage Set Setup
Exit code:
0
Version:
2018.06.28.01
2292"C:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe" /partner=external-oo-hpbanner /yfrc_ie=yset_ie_syc_hp /yfrc_ff=yset_ff_syc_hp /yfrc_chr=yset_chr_syc_hp /ytc=yset_hpiebanner /ytchp=yset_hpiebanner /intl=us /setie /setchr /setffC:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe
hpset_2018.06.28.01[1].exe
User:
admin
Company:
Yahoo Inc.
Integrity Level:
MEDIUM
Description:
YSearchSetTool
Exit code:
0
Version:
2018, 06, 28, 01
1716"C:\Users\admin\AppData\Local\Temp\nsj55C6.tmp\ns5644.tmp" webExt_DL.exeC:\Users\admin\AppData\Local\Temp\nsj55C6.tmp\ns5644.tmphpset_2018.06.28.01[1].exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1404webExt_DL.exeC:\Users\admin\AppData\Local\Yahoo\yset\webExt_DL.exe
ns5644.tmp
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3748"C:\Users\admin\AppData\Local\Temp\nsj55C6.tmp\ns6CAB.tmp" wscript.exe invisible.vbs checksets.batC:\Users\admin\AppData\Local\Temp\nsj55C6.tmp\ns6CAB.tmphpset_2018.06.28.01[1].exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
768wscript.exe invisible.vbs checksets.batC:\Windows\system32\wscript.exens6CAB.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2080cmd /c ""C:\Users\admin\AppData\Local\Yahoo\yset\checksets.bat" "C:\Windows\system32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2956PING 127.0.0.1 -n 1800 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 664
Read events
1 487
Write events
0
Delete events
0

Modification events

No data
Executable files
13
Suspicious files
3
Text files
16
Unknown types
4

Dropped files

PID
Process
Filename
Type
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFB44294F66F3BF91E.TMP
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{7B6FDF36-BDE1-11E9-9885-5254004A04AF}.datbinary
MD5:DA36CA11161618AAD273561A4B1E369A
SHA256:4493C9283BB5D8C89CC11C3CDABE806928D3FF4FD1C764E497E1D0670DCD4904
4052iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019081320190814\index.datdat
MD5:58362BF4B1C7F704BEE5FD5462C0D682
SHA256:D83D86EAD2F2EDDBCD317193B11443CD109666456E1C7396343146C9E4DD6A25
4052iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FJ81ZQXG\hpset_2018.06.28.01[1].exeexecutable
MD5:159905DC2C40959349FE72BA2C729B80
SHA256:B3F9EDC6D66EBEDE32029914970E7F657A3084CCE1C8776C9E20878EE62F7E84
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019081320190814\index.datdat
MD5:9DF2BEAED5CB00B2BCD1B7D84E2D8B84
SHA256:AE535260CF9729921BD18B0568CFA4B9ED9DDA6917FCD5B6FA1729D8C21B1A73
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\hpset_2018.06.28.01[1].exeexecutable
MD5:159905DC2C40959349FE72BA2C729B80
SHA256:B3F9EDC6D66EBEDE32029914970E7F657A3084CCE1C8776C9E20878EE62F7E84
4052iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:7028553DDA0257C20468A22D5CA8D65B
SHA256:4232B2371596F6979BC6E8D69C1E370D4FA2BB4140D6DF920E343F6B21394DEB
3356hpset_2018.06.28.01[1].exeC:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exeexecutable
MD5:8CF6891B39F55057E958766FCBA08F89
SHA256:3C9971115278E434F0F7D1C0234988AC1FFBA2BD5EDE32985CEA3DE135DFF773
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
8
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2568
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2568
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4052
iexplore.exe
87.248.116.11:443
sxh.yimg.com
Yahoo! UK Services Limited
GB
shared
1404
webExt_DL.exe
54.192.200.156:443
addons.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
4052
iexplore.exe
87.248.116.12:443
sxh.yimg.com
Yahoo! UK Services Limited
GB
shared
1404
webExt_DL.exe
35.167.70.13:443
addons.mozilla.org
Amazon.com, Inc.
US
unknown
2292
YSearchSetTool.exe
212.82.100.137:443
search.yahoo.com
Yahoo! UK Services Limited
CH
shared
3356
hpset_2018.06.28.01[1].exe
188.125.72.139:443
geo.yahoo.com
CH
suspicious
2292
YSearchSetTool.exe
188.125.72.139:443
geo.yahoo.com
CH
suspicious

DNS requests

Domain
IP
Reputation
sxh.yimg.com
  • 87.248.116.11
  • 87.248.116.12
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
geo.yahoo.com
  • 188.125.72.139
whitelisted
addons.mozilla.org
  • 35.167.70.13
  • 52.35.252.165
  • 52.24.202.223
  • 34.216.10.43
  • 52.27.79.31
  • 52.42.149.107
shared
search.yahoo.com
  • 212.82.100.137
whitelisted
addons.cdn.mozilla.net
  • 54.192.200.156
shared

Threats

No threats detected
Process
Message
YSearchSetTool.exe
8-13-2019 16:46:44.820[2292,2952]: YSearchSetUtil called w/params: "C:\Users\admin\AppData\Local\Yahoo\yset\YSearchSetTool.exe" /partner=external-oo-hpbanner /yfrc_ie=yset_ie_syc_hp /yfrc_ff=yset_ff_syc_hp /yfrc_chr=yset_chr_syc_hp /ytc=yset_hpiebanner /ytchp=yset_hpiebanner /intl=us /setie /setchr /setff
YSearchSetTool.exe
8-13-2019 16:46:44.820[2292,2952]: RedirectKeysToInteractiveUser - LoadUserProfile call failed: 1314
YSearchSetTool.exe
8-13-2019 16:46:44.835[2292,2952]: YSearchSetUtil successfully loaded YSearchUtil.dll
YSearchSetTool.exe
8-13-2019 16:46:44.866[2292,2952]: Successfully found Firefox profile folder location: C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default
YSearchSetTool.exe
8-13-2019 16:46:44.882[2292,2952]: -- Successfully read Chrome's local state JSON file
YSearchSetTool.exe
8-13-2019 16:46:44.898[2292,2952]: -- Successfully parsed Chrome's local state JSON file
YSearchSetTool.exe
8-13-2019 16:46:44.976[2292,2952]: -- first run- sending acceptance beacon!
YSearchSetTool.exe
8-13-2019 16:46:45.632[2292,2952]: >> send tracking beacon: https://geo.yahoo.com/p?t=1565711204&browser=inst&chr=1&ctid=%7b57C3E116-E458-954A-9EE0-1A577252B299%7d&dc=ieinstaller&defbrows=ie&ff=1&fr=&ie=1&ino=1&intl=us&itype=accept&osname=Windows&osver=6.1&pc=hp_banner&s=151340135&ver=1.0.0.140&vtestid=default
YSearchSetTool.exe
8-13-2019 16:46:45.632[2292,2952]: Acting on set param: /setchr
YSearchSetTool.exe
8-13-2019 16:46:45.632[2292,2952]: Calling CYSearchSetChrome::getCurrentDefaultSP (using secure prefs: 0)