File name:

2.bin.exe

Full analysis: https://app.any.run/tasks/acce42b4-b6ef-411a-beb5-1e3f452b1c7f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 03, 2024, 15:28:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
vodkagats
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0511A0C819ADE47392A2F3A51EAF1F0B

SHA1:

39B0471E8D501702179BFCB744728C00DCCED7BA

SHA256:

635A73433A258FA5A9B3B015F57CA84E1C296E9B65888FB64EBB602213A9D49D

SSDEEP:

24576:Uu6Z8dgdmi9NgdHwtFRfDWm98krcfWKRMkUxV9RikIjfo1syl4Ik5uv47c:Uu6Z8dgdtvgdKFRrWm98krcfWKRMkUpn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 2.bin.exe (PID: 3956)
      • 2.bin.exe (PID: 1696)
    • Changes the autorun value in the registry

      • 2.bin.exe (PID: 1696)
    • VODKAGATS has been detected (SURICATA)

      • 2.bin.exe (PID: 240)
  • SUSPICIOUS

    • Application launched itself

      • 2.bin.exe (PID: 3956)
      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 3776)
    • Checks Windows Trust Settings

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Reads settings of System Certificates

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Reads security settings of Internet Explorer

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Reads the Internet Settings

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Uses ICACLS.EXE to modify access control lists

      • 2.bin.exe (PID: 1696)
    • Creates file in the systems drive root

      • ntvdm.exe (PID: 2900)
  • INFO

    • Reads the computer name

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Checks supported languages

      • 2.bin.exe (PID: 3956)
      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 3776)
      • 2.bin.exe (PID: 240)
    • Checks proxy server information

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Reads the machine GUID from the registry

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Reads the software policy settings

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
    • Creates files or folders in the user directory

      • 2.bin.exe (PID: 1696)
      • 2.bin.exe (PID: 240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:10:28 23:17:51+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 760320
InitializedDataSize: 35047424
UninitializedDataSize: -
EntryPoint: 0x54bd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 91.0.0.0
ProductVersionNumber: 98.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0294)
CharacterSet: Unknown (85B3)
FileVersions: 64.5.34.31
InternalName: Astronomy.exe
OriginalFileName: Hugidfgy.exe
ProductName: Hdfgodifjg
ProductVersion: 2.8.47.63
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2.bin.exe no specs 2.bin.exe icacls.exe no specs 2.bin.exe #VODKAGATS 2.bin.exe ntvdm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Users\admin\Desktop\2.bin.exe" --Admin IsNotAutoStart IsNotTaskC:\Users\admin\Desktop\2.bin.exe
2.bin.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\2.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
1696"C:\Users\admin\Desktop\2.bin.exe" C:\Users\admin\Desktop\2.bin.exe
2.bin.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
1972icacls "C:\Users\admin\AppData\Local\ed947ef2-9229-4da9-b6c8-5fd7face3a6e" /deny *S-1-1-0:(OI)(CI)(DE,DC)C:\Windows\System32\icacls.exe2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
2900"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\System32\ntvdm.exe2.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
NTVDM.EXE
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3776"C:\Users\admin\Desktop\2.bin.exe" --Admin IsNotAutoStart IsNotTaskC:\Users\admin\Desktop\2.bin.exe
2.bin.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\2.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3956"C:\Users\admin\Desktop\2.bin.exe" C:\Users\admin\Desktop\2.bin.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
10 048
Read events
9 934
Write events
86
Delete events
28

Modification events

(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1696) 2.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
1
Suspicious files
2
Text files
6
Unknown types
3

Dropped files

PID
Process
Filename
Type
16962.bin.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464binary
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464binary
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\geo[1].jsontext
MD5:
SHA256:
16962.bin.exeC:\Users\admin\AppData\Local\ed947ef2-9229-4da9-b6c8-5fd7face3a6e\2.bin.exeexecutable
MD5:
SHA256:
2402.bin.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\geo[1].jsontext
MD5:
SHA256:
2402.bin.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\4ERC5WF2.txttext
MD5:
SHA256:
2402.bin.exeC:\Users\admin\AppData\Local\3dae1ed7-8109-4ee0-a865-012287bc9dd5\build2.exehtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
16
DNS requests
8
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1696
2.bin.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?03671427bed3c3b1
unknown
unknown
1696
2.bin.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
unknown
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1b8fee253118cbef
unknown
unknown
240
2.bin.exe
GET
200
199.59.242.150:80
http://colisumy.com/dl/build2.exe
unknown
unknown
1696
2.bin.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0754c686571bd23f
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
1696
2.bin.exe
188.114.96.3:443
api.2ip.ua
CLOUDFLARENET
NL
unknown
1696
2.bin.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1696
2.bin.exe
142.250.186.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
240
2.bin.exe
188.114.96.3:443
api.2ip.ua
CLOUDFLARENET
NL
unknown
240
2.bin.exe
49.13.77.253:80
zexeq.com
Hetzner Online GmbH
DE
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
240
2.bin.exe
199.59.242.150:80
colisumy.com
BODIS-1
US
unknown

DNS requests

Domain
IP
Reputation
api.2ip.ua
  • 188.114.96.3
  • 188.114.97.3
shared
ctldl.windowsupdate.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
ocsp.pki.goog
  • 142.250.186.131
whitelisted
colisumy.com
  • 199.59.242.150
unknown
zexeq.com
  • 49.13.77.253
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1080
svchost.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Address Lookup DNS Query (2ip .ua)
1696
2.bin.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (api .2ip .ua in TLS SNI)
240
2.bin.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (api .2ip .ua in TLS SNI)
240
2.bin.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
240
2.bin.exe
A Network Trojan was detected
ET MALWARE Win32/Vodkagats Loader Requesting Payload
240
2.bin.exe
A Network Trojan was detected
ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
1 ETPRO signatures available at the full report
No debug info