File name:

sample.exe

Full analysis: https://app.any.run/tasks/fd4de94a-758f-4b1e-9413-479a5351e82f
Verdict: Malicious activity
Analysis date: May 15, 2019, 16:01:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0B45F2BFE96D10FE21FE16CDA4E9C5EB

SHA1:

C2751E72BD5A8593F4EB4EBD000ACE791DB0A9C7

SHA256:

68ED565438E206E805F81980374E6439E6F4F60F63A3FCB6F0840C8A8DE189DA

SSDEEP:

49152:KCd6LaUWF/9jKxuB6kXlLp4by6GkixB/dShTKlH8m2gkc8ApOhgbEOWI:KCMmFVjKITXxp4by6Pi7Y4SvgEjkr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Engine.exe (PID: 2636)
      • SuperOrca.exe (PID: 2832)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • sample.exe (PID: 3480)
      • Engine.exe (PID: 2636)
    • Creates files in the program directory

      • Engine.exe (PID: 2636)
    • Creates COM task schedule object

      • Engine.exe (PID: 2636)
    • Creates a software uninstall entry

      • Engine.exe (PID: 2636)
    • Creates files in the user directory

      • Engine.exe (PID: 2636)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (49.2)
.exe | Win32 Executable Delphi generic (16.2)
.scr | Windows screen saver (14.9)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:20 00:22:17+02:00
PEType: PE32
LinkerVersion: 2.25
CodeSize: 162816
InitializedDataSize: 31232
UninitializedDataSize: -
EntryPoint: 0x28a6c
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.0.0.1
ProductVersionNumber: 11.0.0.1
FileFlagsMask: 0x0002
FileFlags: Pre-release
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Pantaray Research Ltd.
FileDescription: SuperOrca - Setup File
FileVersion: 11.0.0.1
InternalName: SuperOrca
LegalCopyright: Copyright © 2002-2008 Pantaray Research Ltd.
OriginalFileName: SuperOrca.exe
ProductName: SuperOrca
ProductVersion: 11.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start sample.exe engine.exe cacls.exe no specs regedit.exe no specs cacls.exe no specs cacls.exe no specs superorca.exe no specs sample.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2444C:\Windows\system32\cacls.exe "C:\Program Files\Common Files" /T /E /C /G Everyone:FC:\Windows\system32\cacls.exeEngine.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2636C:\Users\admin\AppData\Local\Temp\SETUP_34866\Engine.exe /TH_ID=_3496 /OriginExe="C:\Users\admin\AppData\Local\Temp\sample.exe"C:\Users\admin\AppData\Local\Temp\SETUP_34866\Engine.exe
sample.exe
User:
admin
Company:
Pantaray Research Ltd.
Integrity Level:
HIGH
Description:
Setup/Uninstall Engine
Exit code:
0
Version:
11.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\setup_34866\engine.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cabinet.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
2832"C:\Program Files\Pantaray\SuperOrca\SuperOrca.exe" C:\Program Files\Pantaray\SuperOrca\SuperOrca.exeEngine.exe
User:
admin
Company:
Pantaray Research Ltd.
Integrity Level:
HIGH
Description:
SuperOrca
Exit code:
0
Version:
11.0.0.0
Modules
Images
c:\program files\pantaray\superorca\superorca.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2888C:\Windows\system32\cacls.exe "C:\Program Files\Pantaray\SuperOrcaSetup_21233.exe" /E /C /G Everyone:FC:\Windows\system32\cacls.exeEngine.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3128"C:\Users\admin\AppData\Local\Temp\sample.exe" C:\Users\admin\AppData\Local\Temp\sample.exeexplorer.exe
User:
admin
Company:
Pantaray Research Ltd.
Integrity Level:
MEDIUM
Description:
SuperOrca - Setup File
Exit code:
3221226540
Version:
11.0.0.1
Modules
Images
c:\systemroot\system32\ntdll.dll
3480"C:\Users\admin\AppData\Local\Temp\sample.exe" C:\Users\admin\AppData\Local\Temp\sample.exe
explorer.exe
User:
admin
Company:
Pantaray Research Ltd.
Integrity Level:
HIGH
Description:
SuperOrca - Setup File
Exit code:
0
Version:
11.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\sample.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3784C:\Windows\system32\cacls.exe "C:\Program Files\Pantaray" /T /E /C /G Everyone:FC:\Windows\system32\cacls.exeEngine.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\cacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3984C:\Windows\regedit.exe /S "C:\Users\admin\AppData\Local\Temp\SETUP_34866\evalcom2.reg"C:\Windows\regedit.exeEngine.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
255
Read events
218
Write events
37
Delete events
0

Modification events

(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:DisplayName
Value:
SuperOrca
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:UnInstallString
Value:
"C:\Program Files\Pantaray\SuperOrcaSetup_21233.exe"
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:QuietUnInstallString
Value:
"C:\Program Files\Pantaray\SuperOrcaSetup_21233.exe" /silent
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:DisplayVersion
Value:
11.0.0.1
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:Publisher
Value:
Pantaray
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:Version
Value:
184549376
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:VersionMajor
Value:
11
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:VersionMinor
Value:
0
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:InstallLocation
Value:
"C:\Program Files\Pantaray"
(PID) Process:(2636) Engine.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperOrca
Operation:writeName:InstallDate
Value:
20190515
Executable files
8
Suspicious files
2
Text files
119
Unknown types
3

Dropped files

PID
Process
Filename
Type
2636Engine.exeC:\Program Files\Pantaray\SuperOrcaSetup_21233.txttext
MD5:
SHA256:
2636Engine.exeC:\Program Files\Pantaray\SuperOrca\SuperOrca_Manual.pdfpdf
MD5:
SHA256:
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\evalcom2.regtext
MD5:
SHA256:
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\LICENSE.RTFtext
MD5:
SHA256:
2636Engine.exeC:\Program Files\Pantaray\SuperOrcaSetup_21233.exeexecutable
MD5:
SHA256:
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\00003#SuperOrca_Manual.pdfpdf
MD5:
SHA256:
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\Modern_Icon.bmpimage
MD5:1DD88F67F029710D5C5858A6293A93F1
SHA256:B5DAD33CEB6EB1AC2A05FBDA76E29A73038403939218A88367925C3A20C05532
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\folder_blue_small.bmpimage
MD5:A14A183CE820E0ED7FE33A91A5E4B7DF
SHA256:38DC136C999991E17E9F1B8E151AF1A0B04E660371CE879DC20582BECCB35AD4
3480sample.exeC:\Users\admin\AppData\Local\Temp\SETUP_34866\folder_blue_large.bmpimage
MD5:1C1C9CEEBF00CB863DA9787DA07404EC
SHA256:4F4B8717B45D7314100A7C3BCE5D4C6F98E56140F6BF696BEF1DE430F052B5A7
2636Engine.exeC:\Program Files\Common Files\Microsoft Shared\MSI Tools\evalcom2.dllexecutable
MD5:A599901D5148CD4D310C6A825F832616
SHA256:3B4FE00F15C39CE4C80B2A1B29C04A28D8722BADC32ABAB4EC1C0A7D0E32D986
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info