analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe

Full analysis: https://app.any.run/tasks/8db5b0d3-1fc0-45e1-8448-ddfa223d2980
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 30, 2020, 20:09:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

76E1305BC8609511E253B7FA40257EC8

SHA1:

58EAEDA0C8FD199DFE19F6279BE8C78ABE710D52

SHA256:

6F21E53471BAA6B784FC43B7229F374927F7F3A4F25A9737B8968BF70ACE7F9B

SSDEEP:

196608:ugbPSi/H7KJV1kAAHXODf+nVQRHwfCwgB7zf:5Sif7KJ6X/QRiz6zf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
    • Application was dropped or rewritten from another process

      • aria2c.exe (PID: 2328)
    • Downloads executable files from the Internet

      • aria2c.exe (PID: 2328)
    • Changes settings of System certificates

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
    • Creates files in the program directory

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
    • Adds / modifies Windows certificates

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
  • INFO

    • Reads settings of System Certificates

      • MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe (PID: 2644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:09:16 08:56:10+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 1759232
InitializedDataSize: 805376
UninitializedDataSize: -
EntryPoint: 0x1216000
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: 网易游戏
FileDescription: MuMu安装器
FileVersion: 1.0.5.0
LegalCopyright: Copyright (C) 2017
ProductName: MuMu安装器
ProductVersion: 1.0.5.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Sep-2019 06:56:10
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000120

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 16-Sep-2019 06:56:10
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
0x00001000
0x00218000
0x000DC800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.92218
.rsrc
0x00219000
0x000420C8
0x0001BE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.98087
.idata
0x0025C000
0x00001000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.30872
0x0025D000
0x00960000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.256865
zzfjsvfq
0x00BBD000
0x00659000
0x00659000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.78641
npnrunor
0x01216000
0x00001000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.0158

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.16968
2016
UNKNOWN
English - United States
RT_MANIFEST
2
5.23216
1128
UNKNOWN
English - United States
RT_ICON
3
7.98599
34192
UNKNOWN
English - United States
RT_ICON
4
5.28025
4264
UNKNOWN
English - United States
RT_ICON
5
5.01189
9640
UNKNOWN
English - United States
RT_ICON
6
5.01384
16936
UNKNOWN
English - United States
RT_ICON
7
6.23902
90
UNKNOWN
English - United States
RT_STRING
8
5.3014
4264
UNKNOWN
English - United States
RT_ICON
9
4.93963
9640
UNKNOWN
English - United States
RT_ICON
10
4.80616
16936
UNKNOWN
English - United States
RT_ICON

Imports

comctl32.dll
kernel32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start mumuinstaller_1.1.0.2_gw-overseas_all_1568798119.exe no specs mumuinstaller_1.1.0.2_gw-overseas_all_1568798119.exe aria2c.exe

Process information

PID
CMD
Path
Indicators
Parent process
2808"C:\Users\admin\Desktop\MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe" C:\Users\admin\Desktop\MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeexplorer.exe
User:
admin
Company:
网易游戏
Integrity Level:
MEDIUM
Description:
MuMu安装器
Exit code:
3221226540
Version:
1.0.5.0
2644"C:\Users\admin\Desktop\MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe" C:\Users\admin\Desktop\MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe
explorer.exe
User:
admin
Company:
网易游戏
Integrity Level:
HIGH
Description:
MuMu安装器
Version:
1.0.5.0
2328C:\Users\admin\AppData\Local\Temp\aria2c.exe --log=C:\Users\admin\AppData\Local\Temp\nemu-downloader-aria.log --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49476 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=trunc --connect-timeout=5 --rpc-max-request-size=1024M --max-overall-download-limit=50000K --stop-with-process=2644C:\Users\admin\AppData\Local\Temp\aria2c.exe
MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe
User:
admin
Integrity Level:
HIGH
Total events
1 261
Read events
64
Write events
0
Delete events
0

Modification events

No data
Executable files
6
Suspicious files
3
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
2328aria2c.exeC:\Users\admin\AppData\Local\Temp\nemu-hypervisor-5.0.14-x86-0318113755.exe
MD5:
SHA256:
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\config.initext
MD5:9C7F0BCFA6513BA9857AA672650CCE7E
SHA256:2267C2001C4F80B5F503D8D735C458F7E46642619D5EB04E6D5CAE4850979110
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\skin.zipcompressed
MD5:406C76B40D46EC966BE453B73BD4CF48
SHA256:87E0DD40BB05EEE83FB1F37D90ED0EB41987F5B1109A20F32ED30C2489398DE7
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\WinRing0.Sysexecutable
MD5:A73EE34A7A50BE60E77CC277A96D7BA8
SHA256:4448BEFF8366E42E3393E8C7F8261AEE0B0340356C31AA3B97DE07452AE01888
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\WinRing0x64.Sysexecutable
MD5:1C57D067B9FC5E9EF9AEB14223481243
SHA256:D5BCA2CA464A6CC91344BD85E812A7BAC6E7C67038C4929A29E0BC60C7EABE4D
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\winring0x64.catcat
MD5:E7CEE7F541C057F490D486927D659122
SHA256:317D01D9956F052D929FDBAC258F1A2DC5163D3432FC488023A1F4D332AE3D45
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\WinRing0x64.Infbinary
MD5:0F6D3047D1B670058D71C411707EF16E
SHA256:3FDED2F4457B0BEB415B841B40F6EDE5ED527DD537E53E2F70F2FB4A6E24EBFD
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\CrashRptProbe1403.dllexecutable
MD5:30A06B1EF5CEE29F34E001083FFBBE02
SHA256:73399BC22C93DF125A5476DBD15B7D71E3126A1D8F88333A01871DCEED9BA9D4
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\CrashRpt1403.dllexecutable
MD5:770D84E09190608189BD67D0D3D7D687
SHA256:2056A9580CA9569E96634F33BDCCE756BD3552C7E5E574E1833F9AC2AFF1A249
2644MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exeC:\Users\admin\AppData\Local\Temp\crashrpt_lang.initext
MD5:4CA209C131119E28C581447D10F5F9DB
SHA256:EB3DD1604138B82F9BA13A180D71E513599D201B4A6EABA814179D12BFE97ABB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
9
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2328
aria2c.exe
GET
200
52.222.162.23:80
http://a11.gdl.netease.com/nemu-hypervisor-5.0.14-x86-0318113755.exe
US
executable
32.2 Mb
whitelisted
2328
aria2c.exe
GET
52.222.162.23:80
http://a11.gdl.netease.com/nemu-2.3.2-x86-overseas-0318111722.exe
US
whitelisted
2328
aria2c.exe
GET
52.222.162.23:80
http://a11.gdl.netease.com/nemu-2.3.2-x86-overseas-0318111722.exe
US
whitelisted
2328
aria2c.exe
GET
52.222.162.23:80
http://a11.gdl.netease.com/nemu-2.3.2-x86-overseas-0318111722.exe
US
whitelisted
2328
aria2c.exe
GET
52.222.162.23:80
http://a11.gdl.netease.com/nemu-2.3.2-x86-overseas-0318111722.exe
US
whitelisted
2328
aria2c.exe
GET
52.222.162.23:80
http://a11.gdl.netease.com/nemu-2.3.2-x86-overseas-0318111722.exe
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2328
aria2c.exe
52.222.162.23:80
a11.gdl.netease.com
Amazon.com, Inc.
US
suspicious
2644
MuMuInstaller_1.1.0.2_gw-overseas_all_1568798119.exe
59.111.0.200:443
mumu.nie.netease.com
Guangzhou NetEase Computer System Co., Ltd.
CN
unknown
52.222.162.23:80
a11.gdl.netease.com
Amazon.com, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
mumu.nie.netease.com
  • 59.111.0.200
unknown
a11.gdl.netease.com
  • 52.222.162.23
whitelisted

Threats

PID
Process
Class
Message
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
2328
aria2c.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
2328
aria2c.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2328
aria2c.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
2328
aria2c.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
No debug info