File name:

KMSpico.exe

Full analysis: https://app.any.run/tasks/d98f1e72-8c69-4c87-aebb-05a406b9a70b
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 24, 2021, 14:11:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
stealer
vidar
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

824EEBB7A8C57BE4B68AA148B48DC23E

SHA1:

28409F024FF37EA8CB4F5C41534DB6D21A9446FE

SHA256:

674A49E2DD049B882A1E9F68CD9412D7A0A29B9A28C55BFDBD96C67CDC88CE5E

SSDEEP:

98304:PIzPtEKYNeJj9rP+C1pfYp1XiAJANNb7ff6Mmq6W66:gFbTP+CDu1XyBLihqL66

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • KMSpico-setup.exe (PID: 2792)
      • build.exe (PID: 2592)
      • KMSpico-setup.exe (PID: 1784)
      • KMSELDI.exe (PID: 3876)
      • UninsHs.exe (PID: 3436)
      • AutoPico.exe (PID: 2496)
      • KMSELDI.exe (PID: 2996)
      • KMSELDI.exe (PID: 3544)
    • Changes settings of System certificates

      • build.exe (PID: 2592)
      • WScript.exe (PID: 2484)
    • Drops executable file immediately after starts

      • KMSpico-setup.tmp (PID: 632)
    • Loads dropped or rewritten executable

      • build.exe (PID: 2592)
      • KMSELDI.exe (PID: 3876)
      • KMSELDI.exe (PID: 3544)
    • Steals credentials from Web Browsers

      • build.exe (PID: 2592)
    • Stealing of credential data

      • build.exe (PID: 2592)
    • VIDAR was detected

      • build.exe (PID: 2592)
    • Actions looks like stealing of personal data

      • build.exe (PID: 2592)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1316)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2628)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • KMSpico-setup.exe (PID: 2792)
      • KMSpico-setup.exe (PID: 1784)
      • KMSpico-setup.tmp (PID: 632)
      • KMSpico.exe (PID: 2664)
    • Adds / modifies Windows certificates

      • build.exe (PID: 2592)
      • WScript.exe (PID: 2484)
    • Executable content was dropped or overwritten

      • KMSpico-setup.exe (PID: 1784)
      • KMSpico-setup.tmp (PID: 632)
      • KMSpico.exe (PID: 2664)
      • build.exe (PID: 2592)
      • KMSpico-setup.exe (PID: 2792)
    • Drops a file that was compiled in debug mode

      • KMSpico-setup.tmp (PID: 632)
      • build.exe (PID: 2592)
    • Creates files in the user directory

      • build.exe (PID: 2592)
      • KMSpico.exe (PID: 2664)
      • WScript.exe (PID: 2484)
    • Creates files in the program directory

      • build.exe (PID: 2592)
      • KMSELDI.exe (PID: 3876)
      • AutoPico.exe (PID: 2496)
      • KMSELDI.exe (PID: 3544)
    • Reads the cookies of Google Chrome

      • build.exe (PID: 2592)
    • Reads the cookies of Mozilla Firefox

      • build.exe (PID: 2592)
    • Searches for installed software

      • build.exe (PID: 2592)
    • Creates a directory in Program Files

      • KMSpico-setup.tmp (PID: 632)
      • KMSELDI.exe (PID: 3876)
    • Modifies the phishing filter of IE

      • KMSpico-setup.tmp (PID: 632)
    • Creates files in the Windows directory

      • KMSpico-setup.tmp (PID: 632)
    • Starts CMD.EXE for commands execution

      • KMSpico-setup.tmp (PID: 632)
      • build.exe (PID: 2592)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2348)
    • Starts CMD.EXE for self-deleting

      • build.exe (PID: 2592)
    • Reads Environment values

      • KMSELDI.exe (PID: 3876)
      • AutoPico.exe (PID: 2496)
      • KMSELDI.exe (PID: 3544)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2656)
    • Creates or modifies windows services

      • KMSELDI.exe (PID: 3876)
    • Executes scripts

      • KMSpico.exe (PID: 2664)
  • INFO

    • Application was dropped or rewritten from another process

      • KMSpico-setup.tmp (PID: 632)
      • KMSpico-setup.tmp (PID: 2252)
    • Loads dropped or rewritten executable

      • KMSpico-setup.tmp (PID: 632)
    • Creates a software uninstall entry

      • KMSpico-setup.tmp (PID: 632)
    • Creates files in the program directory

      • KMSpico-setup.tmp (PID: 632)
    • Reads Microsoft Office registry keys

      • KMSELDI.exe (PID: 3876)
      • AutoPico.exe (PID: 2496)
      • KMSELDI.exe (PID: 3544)
    • Manual execution by user

      • KMSELDI.exe (PID: 2996)
      • KMSELDI.exe (PID: 3544)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:03:26 11:02:47+01:00
PEType: PE32
LinkerVersion: 14
CodeSize: 198144
InitializedDataSize: 91648
UninitializedDataSize: -
EntryPoint: 0x1e1f9
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 26-Mar-2020 10:02:47
Detected languages:
  • Process Default Language
Debug artifacts:
  • D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 26-Mar-2020 10:02:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00030581
0x00030600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.70021
.rdata
0x00032000
0x0000A332
0x0000A400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.23888
.data
0x0003D000
0x000238B0
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.83994
.gfids
0x00061000
0x000000E8
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.12166
.rsrc
0x00062000
0x00008BF0
0x00008C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.13426
.reloc
0x0006B000
0x0000210C
0x00002200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.61039

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.25329
1875
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
7
3.66634
508
Latin 1 / Western European
UNKNOWN
RT_STRING
8
3.71728
582
Latin 1 / Western European
UNKNOWN
RT_STRING
9
3.73856
422
Latin 1 / Western European
UNKNOWN
RT_STRING
10
3.55807
220
Latin 1 / Western European
UNKNOWN
RT_STRING
11
3.89762
1124
Latin 1 / Western European
UNKNOWN
RT_STRING
12
3.68258
356
Latin 1 / Western European
UNKNOWN
RT_STRING
13
3.61824
272
Latin 1 / Western European
UNKNOWN
RT_STRING
14
3.61995
344
Latin 1 / Western European
UNKNOWN
RT_STRING
15
3.4037
232
Latin 1 / Western European
UNKNOWN
RT_STRING

Imports

KERNEL32.dll
USER32.dll (delay-loaded)
gdiplus.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
19
Malicious processes
8
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start kmspico.exe wscript.exe #VIDAR build.exe kmspico-setup.exe kmspico-setup.tmp no specs kmspico-setup.exe kmspico-setup.tmp cmd.exe no specs cmd.exe no specs uninshs.exe no specs sc.exe no specs schtasks.exe no specs kmseldi.exe cmd.exe no specs taskkill.exe no specs timeout.exe no specs autopico.exe kmseldi.exe no specs kmseldi.exe

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Users\admin\AppData\Local\Temp\is-9IM8R.tmp\KMSpico-setup.tmp" /SL5="$40140,2952592,69120,C:\Users\admin\AppData\Roaming\KMSpico-setup.exe" /SPAWNWND=$3014C /NOTIFYWND=$40156 C:\Users\admin\AppData\Local\Temp\is-9IM8R.tmp\KMSpico-setup.tmp
KMSpico-setup.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-9im8r.tmp\kmspico-setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\oleaut32.dll
1316"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""C:\Windows\system32\cmd.exeKMSpico-setup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1784"C:\Users\admin\AppData\Roaming\KMSpico-setup.exe" /SPAWNWND=$3014C /NOTIFYWND=$40156 C:\Users\admin\AppData\Roaming\KMSpico-setup.exe
KMSpico-setup.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
KMSpico Setup
Exit code:
0
Version:
10.2.0
Modules
Images
c:\users\admin\appdata\roaming\kmspico-setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2252"C:\Users\admin\AppData\Local\Temp\is-5JBFJ.tmp\KMSpico-setup.tmp" /SL5="$40156,2952592,69120,C:\Users\admin\AppData\Roaming\KMSpico-setup.exe" C:\Users\admin\AppData\Local\Temp\is-5JBFJ.tmp\KMSpico-setup.tmpKMSpico-setup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-5jbfj.tmp\kmspico-setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2348"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""C:\Windows\system32\cmd.exeKMSpico-setup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2412timeout /t 6 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
2484"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\script.vbs" C:\Windows\System32\WScript.exe
KMSpico.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2496"C:\Program Files\KMSpico\AutoPico.exe" /silentC:\Program Files\KMSpico\AutoPico.exe
KMSpico-setup.tmp
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
AutoPico
Exit code:
0
Version:
16.1.0.0
Modules
Images
c:\program files\kmspico\autopico.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2524taskkill /im build.exe /f C:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
2592"C:\Users\admin\AppData\Roaming\build.exe" C:\Users\admin\AppData\Roaming\build.exe
KMSpico.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\build.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
Total events
1 518
Read events
1 388
Write events
122
Delete events
8

Modification events

(PID) Process:(2664) KMSpico.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2664) KMSpico.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2592) build.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2592) build.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
26
Suspicious files
8
Text files
453
Unknown types
22

Dropped files

PID
Process
Filename
Type
2592build.exeC:\Users\admin\AppData\Local\Temp\Cab56FA.tmp
MD5:
SHA256:
2592build.exeC:\Users\admin\AppData\Local\Temp\Tar56FB.tmp
MD5:
SHA256:
2592build.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\WBXVDBEK.txt
MD5:
SHA256:
2484WScript.exeC:\Users\admin\AppData\Local\Temp\Cab5A17.tmp
MD5:
SHA256:
2484WScript.exeC:\Users\admin\AppData\Local\Temp\Tar5A18.tmp
MD5:
SHA256:
2664KMSpico.exeC:\Users\admin\AppData\Roaming\script.vbstext
MD5:
SHA256:
2592build.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cder
MD5:
SHA256:
2592build.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cbinary
MD5:
SHA256:
2592build.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\E67NSU82.txttext
MD5:
SHA256:
2664KMSpico.exeC:\Users\admin\AppData\Roaming\build.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
9
DNS requests
8
Threats
34

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2484
WScript.exe
GET
200
23.55.163.73:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
US
der
1.16 Kb
whitelisted
2592
build.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D
US
der
471 b
whitelisted
2592
build.exe
POST
200
78.46.142.223:80
http://ciaociao.top/399
DE
text
401 b
malicious
2484
WScript.exe
GET
200
23.55.163.58:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgOeGLq2cQI0U2dni%2FRuc7DeIg%3D%3D
US
der
503 b
shared
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/freebl3.dll
DE
executable
326 Kb
malicious
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/mozglue.dll
DE
executable
133 Kb
malicious
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/nss3.dll
DE
executable
1.19 Mb
malicious
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/msvcp140.dll
DE
executable
429 Kb
malicious
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/softokn3.dll
DE
executable
141 Kb
malicious
2592
build.exe
GET
200
78.46.142.223:80
http://ciaociao.top/vcruntime140.dll
DE
executable
81.8 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2592
build.exe
104.17.63.50:443
api.faceit.com
Cloudflare Inc
US
shared
2592
build.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2484
WScript.exe
88.99.66.31:443
ezstat.ru
Hetzner Online GmbH
DE
malicious
2592
build.exe
78.46.142.223:80
ciaociao.top
Hetzner Online GmbH
DE
malicious
2484
WScript.exe
23.55.163.73:80
crl.identrust.com
Akamai International B.V.
US
unknown
2484
WScript.exe
23.55.163.58:80
r3.o.lencr.org
Akamai International B.V.
US
unknown
2496
AutoPico.exe
5.9.57.158:123
3.pool.ntp.org
Hetzner Online GmbH
DE
unknown
78.46.78.167:123
3.pool.ntp.org
Hetzner Online GmbH
DE
unknown
3876
KMSELDI.exe
90.187.99.165:123
2.pool.ntp.org
Vodafone Kabel Deutschland GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
api.faceit.com
  • 104.17.63.50
  • 104.17.62.50
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ezstat.ru
  • 88.99.66.31
shared
ciaociao.top
  • 78.46.142.223
malicious
crl.identrust.com
  • 23.55.163.73
  • 23.55.163.57
whitelisted
r3.o.lencr.org
  • 23.55.163.58
  • 23.55.163.48
shared
2.pool.ntp.org
  • 90.187.99.165
  • 46.165.221.137
  • 195.50.171.101
  • 78.47.158.133
whitelisted
3.pool.ntp.org
  • 5.9.57.158
  • 78.46.78.167
  • 80.153.195.191
  • 78.47.118.0
whitelisted

Threats

PID
Process
Class
Message
2484
WScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
2484
WScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
1040
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2592
build.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] Possible Generic.Trojan Boundary
2592
build.exe
A Network Trojan was detected
STEALER [PTsecurity] Arkei/Vidar Stealer
2592
build.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
2592
build.exe
A Network Trojan was detected
STEALER [PTsecurity] Vidar Stealer Server Response
2592
build.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .dll file with no User-Agent
2592
build.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2592
build.exe
Misc activity
ET INFO Possible EXE Download From Suspicious TLD
7 ETPRO signatures available at the full report
No debug info