File name:

Wi-Fi.exe

Full analysis: https://app.any.run/tasks/44539fcc-d7f4-433b-b4e7-45f38875388b
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 07, 2020, 08:57:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

BAF3E719AA30924E806988D44C17DC2A

SHA1:

4BA8A3C6A2065D3B97A743730BB9D928C9FB9B5C

SHA256:

7195034A17F362B4390420C9B77DC6DE7D5ED6002DB39878F95D17CF466B0A25

SSDEEP:

196608:YeNygKb+9OULyA/6v0hlPKQ8hY/r0qltVC/jsaVtf5XrIQQtIkX:RNJ6M+HYLHEjsoFNTQtt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Wi-Fi.exe (PID: 1444)
      • WMIC.exe (PID: 2552)
      • WMIC.exe (PID: 30108)
      • WMIC.exe (PID: 30344)
      • WMIC.exe (PID: 30492)
      • WMIC.exe (PID: 30636)
      • WMIC.exe (PID: 30592)
      • WMIC.exe (PID: 28880)
      • WMIC.exe (PID: 30980)
      • wmiprvse.exe (PID: 3376)
    • Starts NET.EXE to view/change users group

      • cmd.exe (PID: 3084)
      • cmd.exe (PID: 3000)
    • Starts NET.EXE to view/add/change user profiles

      • cmd.exe (PID: 636)
    • Connects to CnC server

      • svchost.exe (PID: 1044)
    • Executes PowerShell scripts

      • cmd.exe (PID: 28612)
    • Uses Task Scheduler to run other applications

      • powershell.exe (PID: 28428)
      • cmd.exe (PID: 28612)
    • Loads the Task Scheduler COM API

      • powershell.exe (PID: 28428)
      • schtasks.exe (PID: 31972)
      • schtasks.exe (PID: 30796)
      • schtasks.exe (PID: 32512)
      • schtasks.exe (PID: 32876)
      • schtasks.exe (PID: 32792)
      • schtasks.exe (PID: 33228)
      • schtasks.exe (PID: 36084)
      • schtasks.exe (PID: 34136)
      • schtasks.exe (PID: 36380)
      • schtasks.exe (PID: 33112)
      • schtasks.exe (PID: 35112)
      • schtasks.exe (PID: 32384)
    • Application was injected by another process

      • svchost.exe (PID: 680)
      • smss.exe (PID: 264)
      • csrss.exe (PID: 396)
      • wininit.exe (PID: 388)
      • lsm.exe (PID: 504)
      • svchost.exe (PID: 596)
      • svchost.exe (PID: 1044)
      • winlogon.exe (PID: 432)
      • svchost.exe (PID: 832)
      • svchost.exe (PID: 1212)
      • IMEDICTUPDATE.EXE (PID: 1364)
      • csrss.exe (PID: 352)
      • svchost.exe (PID: 1796)
      • services.exe (PID: 480)
      • explorer.exe (PID: 356)
      • SearchIndexer.exe (PID: 1356)
      • svchost.exe (PID: 860)
      • taskeng.exe (PID: 1976)
      • srvpost.exe (PID: 3260)
      • dwm.exe (PID: 2040)
      • ctfmon.exe (PID: 308)
      • svchost.exe (PID: 804)
      • svchost.exe (PID: 2740)
      • conhost.exe (PID: 27104)
      • svchost.exe (PID: 772)
      • spoolsv.exe (PID: 1184)
      • msiexec.exe (PID: 2656)
      • conhost.exe (PID: 26648)
      • conhost.exe (PID: 3080)
      • taskeng.exe (PID: 32292)
      • host.exe (PID: 32408)
      • host.exe (PID: 32640)
      • host.exe (PID: 32440)
      • host.exe (PID: 32748)
      • host.exe (PID: 32752)
      • host.exe (PID: 32608)
      • host.exe (PID: 32524)
      • host.exe (PID: 32312)
      • host.exe (PID: 32484)
      • host.exe (PID: 31844)
      • host.exe (PID: 32344)
      • host.exe (PID: 32472)
      • host.exe (PID: 31588)
      • host.exe (PID: 32516)
      • host.exe (PID: 32296)
      • host.exe (PID: 31484)
      • host.exe (PID: 3540)
      • host.exe (PID: 31408)
      • host.exe (PID: 31532)
      • host.exe (PID: 31732)
      • host.exe (PID: 34568)
      • host.exe (PID: 32528)
      • host.exe (PID: 32536)
      • host.exe (PID: 31616)
      • host.exe (PID: 1808)
      • host.exe (PID: 32384)
      • host.exe (PID: 33948)
      • host.exe (PID: 33148)
      • host.exe (PID: 34292)
      • host.exe (PID: 34528)
      • host.exe (PID: 32556)
      • host.exe (PID: 33888)
      • host.exe (PID: 31856)
      • host.exe (PID: 32960)
      • host.exe (PID: 33856)
      • host.exe (PID: 34576)
      • host.exe (PID: 33012)
      • host.exe (PID: 32900)
      • host.exe (PID: 1196)
      • host.exe (PID: 32936)
      • host.exe (PID: 33532)
      • host.exe (PID: 32832)
      • host.exe (PID: 34104)
      • host.exe (PID: 33992)
      • host.exe (PID: 33664)
      • host.exe (PID: 32868)
      • host.exe (PID: 33520)
      • host.exe (PID: 34640)
      • host.exe (PID: 33828)
      • host.exe (PID: 32380)
      • host.exe (PID: 32628)
      • host.exe (PID: 33460)
      • host.exe (PID: 34296)
      • host.exe (PID: 33052)
      • host.exe (PID: 33544)
      • host.exe (PID: 34240)
      • host.exe (PID: 32984)
      • host.exe (PID: 32368)
      • host.exe (PID: 32928)
      • host.exe (PID: 33016)
      • host.exe (PID: 33176)
      • host.exe (PID: 34560)
      • host.exe (PID: 32364)
      • host.exe (PID: 34440)
      • host.exe (PID: 34340)
      • host.exe (PID: 33504)
      • host.exe (PID: 34804)
      • host.exe (PID: 34036)
      • host.exe (PID: 34228)
      • host.exe (PID: 33564)
      • host.exe (PID: 33308)
      • host.exe (PID: 33136)
      • host.exe (PID: 30804)
      • host.exe (PID: 33472)
      • host.exe (PID: 33916)
      • host.exe (PID: 34632)
      • host.exe (PID: 34252)
      • host.exe (PID: 34028)
      • host.exe (PID: 33276)
      • host.exe (PID: 34480)
      • host.exe (PID: 31920)
      • host.exe (PID: 33824)
      • host.exe (PID: 34696)
      • host.exe (PID: 34148)
      • host.exe (PID: 33192)
      • host.exe (PID: 33104)
      • host.exe (PID: 33512)
      • host.exe (PID: 32784)
      • host.exe (PID: 34564)
      • host.exe (PID: 34536)
      • host.exe (PID: 33000)
      • host.exe (PID: 33188)
      • host.exe (PID: 33968)
      • host.exe (PID: 34044)
      • host.exe (PID: 33224)
      • host.exe (PID: 34056)
      • host.exe (PID: 33024)
      • host.exe (PID: 34108)
      • host.exe (PID: 32816)
      • host.exe (PID: 33644)
      • host.exe (PID: 33736)
      • host.exe (PID: 32840)
      • host.exe (PID: 34716)
      • host.exe (PID: 34312)
      • host.exe (PID: 33428)
      • host.exe (PID: 33852)
      • host.exe (PID: 34124)
      • host.exe (PID: 34756)
      • host.exe (PID: 33264)
      • host.exe (PID: 34476)
      • host.exe (PID: 34380)
      • host.exe (PID: 32864)
      • host.exe (PID: 32856)
      • host.exe (PID: 36712)
      • host.exe (PID: 33780)
      • host.exe (PID: 35344)
      • host.exe (PID: 35100)
      • host.exe (PID: 33524)
      • host.exe (PID: 32992)
      • host.exe (PID: 36556)
      • host.exe (PID: 33604)
      • host.exe (PID: 35448)
      • host.exe (PID: 35276)
      • host.exe (PID: 33056)
      • host.exe (PID: 34584)
      • host.exe (PID: 33936)
      • host.exe (PID: 36056)
      • host.exe (PID: 36136)
      • host.exe (PID: 35648)
      • host.exe (PID: 35964)
      • host.exe (PID: 36392)
      • host.exe (PID: 33436)
      • host.exe (PID: 35356)
      • host.exe (PID: 36788)
      • host.exe (PID: 32880)
      • host.exe (PID: 36428)
      • host.exe (PID: 35756)
      • host.exe (PID: 33700)
      • host.exe (PID: 35232)
      • host.exe (PID: 35668)
      • host.exe (PID: 36700)
      • host.exe (PID: 35280)
      • host.exe (PID: 35860)
      • host.exe (PID: 35836)
      • host.exe (PID: 34444)
      • host.exe (PID: 36640)
      • host.exe (PID: 34344)
      • host.exe (PID: 36132)
      • host.exe (PID: 36192)
      • host.exe (PID: 36472)
      • host.exe (PID: 36332)
      • host.exe (PID: 33804)
      • host.exe (PID: 34236)
      • host.exe (PID: 36000)
      • host.exe (PID: 35132)
      • host.exe (PID: 36824)
      • host.exe (PID: 35300)
      • host.exe (PID: 36308)
      • host.exe (PID: 35616)
      • host.exe (PID: 35204)
      • host.exe (PID: 34008)
      • host.exe (PID: 34760)
      • host.exe (PID: 35940)
      • host.exe (PID: 36404)
      • host.exe (PID: 34984)
      • host.exe (PID: 36100)
      • host.exe (PID: 33668)
      • host.exe (PID: 36200)
      • host.exe (PID: 35472)
      • host.exe (PID: 36208)
      • host.exe (PID: 36244)
      • host.exe (PID: 35588)
      • host.exe (PID: 32828)
      • host.exe (PID: 35296)
      • host.exe (PID: 35576)
      • host.exe (PID: 32972)
      • host.exe (PID: 35308)
      • host.exe (PID: 36256)
      • host.exe (PID: 34644)
      • host.exe (PID: 34624)
      • host.exe (PID: 36316)
      • host.exe (PID: 36840)
      • host.exe (PID: 34928)
      • host.exe (PID: 35080)
      • host.exe (PID: 33784)
      • host.exe (PID: 34792)
      • host.exe (PID: 33580)
      • host.exe (PID: 35340)
      • host.exe (PID: 36348)
      • host.exe (PID: 35152)
      • host.exe (PID: 35220)
      • host.exe (PID: 33708)
      • host.exe (PID: 2916)
      • host.exe (PID: 34864)
      • host.exe (PID: 36284)
      • host.exe (PID: 36444)
      • host.exe (PID: 35200)
      • host.exe (PID: 36424)
      • host.exe (PID: 35720)
      • host.exe (PID: 36560)
      • host.exe (PID: 35192)
      • host.exe (PID: 35656)
      • host.exe (PID: 36116)
      • host.exe (PID: 33748)
      • host.exe (PID: 33744)
      • host.exe (PID: 34952)
      • host.exe (PID: 32772)
      • host.exe (PID: 35804)
      • host.exe (PID: 36072)
      • host.exe (PID: 35932)
      • host.exe (PID: 31300)
      • host.exe (PID: 32892)
      • host.exe (PID: 33448)
      • host.exe (PID: 34748)
      • host.exe (PID: 35128)
      • host.exe (PID: 33380)
      • host.exe (PID: 36812)
      • host.exe (PID: 34420)
      • host.exe (PID: 34448)
      • host.exe (PID: 35780)
      • host.exe (PID: 35068)
      • host.exe (PID: 35212)
      • host.exe (PID: 36248)
      • host.exe (PID: 35236)
      • host.exe (PID: 36648)
      • host.exe (PID: 33232)
      • host.exe (PID: 34428)
      • host.exe (PID: 36068)
      • host.exe (PID: 34356)
      • host.exe (PID: 35788)
      • host.exe (PID: 35764)
      • host.exe (PID: 33692)
      • host.exe (PID: 36704)
      • host.exe (PID: 33508)
      • host.exe (PID: 36140)
      • host.exe (PID: 34660)
      • host.exe (PID: 36508)
      • host.exe (PID: 33628)
      • host.exe (PID: 36280)
      • host.exe (PID: 35700)
      • host.exe (PID: 33848)
      • host.exe (PID: 33652)
      • host.exe (PID: 36216)
      • host.exe (PID: 34996)
      • host.exe (PID: 35456)
      • host.exe (PID: 34856)
      • host.exe (PID: 34988)
      • host.exe (PID: 36384)
      • host.exe (PID: 35684)
      • host.exe (PID: 35064)
      • host.exe (PID: 33108)
      • host.exe (PID: 35156)
      • host.exe (PID: 36232)
      • host.exe (PID: 34224)
      • host.exe (PID: 36668)
      • host.exe (PID: 34872)
      • host.exe (PID: 36252)
      • host.exe (PID: 36828)
      • host.exe (PID: 36660)
      • host.exe (PID: 2716)
      • host.exe (PID: 34852)
      • host.exe (PID: 35792)
      • host.exe (PID: 36220)
      • host.exe (PID: 36600)
      • host.exe (PID: 2360)
      • host.exe (PID: 32404)
      • host.exe (PID: 34592)
      • host.exe (PID: 28440)
      • host.exe (PID: 36772)
      • host.exe (PID: 36504)
      • host.exe (PID: 36664)
      • host.exe (PID: 34900)
      • host.exe (PID: 33420)
      • host.exe (PID: 36092)
      • host.exe (PID: 2484)
      • host.exe (PID: 36488)
      • host.exe (PID: 35240)
      • host.exe (PID: 35440)
      • host.exe (PID: 35412)
      • host.exe (PID: 27832)
      • host.exe (PID: 33288)
      • host.exe (PID: 36416)
      • host.exe (PID: 36804)
      • host.exe (PID: 34848)
      • host.exe (PID: 36156)
      • host.exe (PID: 33516)
      • host.exe (PID: 35044)
      • host.exe (PID: 34388)
      • host.exe (PID: 38552)
      • host.exe (PID: 38304)
      • host.exe (PID: 35516)
      • host.exe (PID: 25688)
      • host.exe (PID: 34052)
      • host.exe (PID: 36800)
      • host.exe (PID: 35416)
      • host.exe (PID: 38852)
      • host.exe (PID: 38660)
      • host.exe (PID: 37140)
      • host.exe (PID: 36176)
      • host.exe (PID: 33496)
      • host.exe (PID: 35000)
      • host.exe (PID: 37532)
      • host.exe (PID: 35732)
      • host.exe (PID: 37988)
      • host.exe (PID: 33956)
      • host.exe (PID: 38780)
      • host.exe (PID: 35144)
      • host.exe (PID: 36928)
      • host.exe (PID: 36180)
      • host.exe (PID: 33400)
      • host.exe (PID: 37748)
      • host.exe (PID: 34024)
      • host.exe (PID: 37112)
      • host.exe (PID: 37288)
      • host.exe (PID: 37168)
      • host.exe (PID: 38132)
      • host.exe (PID: 38260)
      • host.exe (PID: 31756)
      • host.exe (PID: 35520)
      • host.exe (PID: 38800)
      • host.exe (PID: 38636)
      • host.exe (PID: 37632)
      • host.exe (PID: 37048)
      • host.exe (PID: 38732)
      • host.exe (PID: 38288)
      • host.exe (PID: 37128)
      • host.exe (PID: 36868)
      • host.exe (PID: 38104)
      • host.exe (PID: 37400)
      • host.exe (PID: 33068)
      • host.exe (PID: 37744)
      • host.exe (PID: 37476)
      • host.exe (PID: 38596)
      • host.exe (PID: 38236)
      • host.exe (PID: 35400)
      • host.exe (PID: 36900)
      • host.exe (PID: 36984)
      • host.exe (PID: 37332)
      • host.exe (PID: 38548)
      • host.exe (PID: 38076)
      • host.exe (PID: 37976)
      • host.exe (PID: 38300)
      • host.exe (PID: 35016)
      • host.exe (PID: 37080)
      • host.exe (PID: 36920)
      • host.exe (PID: 37280)
      • host.exe (PID: 35556)
      • host.exe (PID: 34888)
      • host.exe (PID: 37184)
      • host.exe (PID: 35024)
      • host.exe (PID: 35464)
      • host.exe (PID: 32788)
      • host.exe (PID: 38808)
      • host.exe (PID: 36996)
      • host.exe (PID: 38232)
      • host.exe (PID: 37352)
      • host.exe (PID: 37492)
      • host.exe (PID: 35736)
      • host.exe (PID: 37844)
      • host.exe (PID: 37684)
      • host.exe (PID: 36512)
      • host.exe (PID: 37252)
      • host.exe (PID: 35560)
      • host.exe (PID: 37508)
      • host.exe (PID: 35336)
      • lsass.exe (PID: 496)
      • host.exe (PID: 38768)
      • host.exe (PID: 38904)
      • host.exe (PID: 37640)
      • host.exe (PID: 38000)
      • host.exe (PID: 38880)
      • host.exe (PID: 3412)
      • host.exe (PID: 36228)
      • host.exe (PID: 37116)
      • host.exe (PID: 38464)
      • host.exe (PID: 2448)
      • host.exe (PID: 37372)
      • host.exe (PID: 38512)
      • host.exe (PID: 37052)
      • host.exe (PID: 38112)
      • host.exe (PID: 28412)
      • host.exe (PID: 36896)
      • host.exe (PID: 36004)
      • host.exe (PID: 38796)
      • host.exe (PID: 37424)
      • host.exe (PID: 37388)
      • host.exe (PID: 35624)
      • host.exe (PID: 37656)
      • host.exe (PID: 37804)
      • host.exe (PID: 26984)
      • host.exe (PID: 38364)
      • host.exe (PID: 35508)
      • host.exe (PID: 37336)
      • host.exe (PID: 34656)
      • host.exe (PID: 38592)
      • host.exe (PID: 35360)
      • host.exe (PID: 26980)
      • host.exe (PID: 37272)
      • host.exe (PID: 38460)
      • host.exe (PID: 38500)
      • host.exe (PID: 32076)
      • host.exe (PID: 26976)
      • host.exe (PID: 38588)
      • host.exe (PID: 35248)
      • host.exe (PID: 35572)
      • host.exe (PID: 34956)
      • host.exe (PID: 36620)
      • host.exe (PID: 38616)
      • host.exe (PID: 38172)
      • host.exe (PID: 38032)
      • host.exe (PID: 37132)
      • host.exe (PID: 2684)
      • host.exe (PID: 34452)
      • host.exe (PID: 33728)
      • host.exe (PID: 32904)
      • host.exe (PID: 37056)
      • host.exe (PID: 28324)
      • host.exe (PID: 35384)
      • host.exe (PID: 35292)
      • host.exe (PID: 37356)
      • host.exe (PID: 38396)
      • host.exe (PID: 31688)
      • host.exe (PID: 35848)
      • host.exe (PID: 38816)
      • host.exe (PID: 37544)
      • host.exe (PID: 34784)
      • host.exe (PID: 33312)
      • host.exe (PID: 37712)
      • host.exe (PID: 36040)
      • host.exe (PID: 37808)
      • host.exe (PID: 36976)
      • host.exe (PID: 38388)
      • host.exe (PID: 38264)
      • host.exe (PID: 36972)
      • host.exe (PID: 37680)
      • host.exe (PID: 37468)
      • host.exe (PID: 37256)
      • host.exe (PID: 37584)
      • host.exe (PID: 36732)
      • host.exe (PID: 36980)
      • host.exe (PID: 37396)
      • host.exe (PID: 36916)
      • host.exe (PID: 33440)
      • host.exe (PID: 35536)
      • host.exe (PID: 2072)
      • host.exe (PID: 38668)
      • host.exe (PID: 37180)
      • host.exe (PID: 37300)
      • host.exe (PID: 37440)
      • host.exe (PID: 1840)
      • host.exe (PID: 36344)
      • host.exe (PID: 34348)
      • host.exe (PID: 3920)
      • host.exe (PID: 37432)
      • host.exe (PID: 35604)
      • host.exe (PID: 37720)
      • host.exe (PID: 37676)
      • host.exe (PID: 2364)
      • host.exe (PID: 33528)
      • host.exe (PID: 37924)
      • host.exe (PID: 34780)
      • host.exe (PID: 35592)
      • host.exe (PID: 34540)
      • host.exe (PID: 37148)
      • host.exe (PID: 37292)
      • host.exe (PID: 36356)
      • host.exe (PID: 38716)
      • host.exe (PID: 37724)
      • host.exe (PID: 38612)
      • host.exe (PID: 28376)
      • host.exe (PID: 38016)
      • host.exe (PID: 37864)
      • host.exe (PID: 37488)
      • host.exe (PID: 38624)
      • host.exe (PID: 3792)
      • host.exe (PID: 36196)
      • host.exe (PID: 34736)
      • host.exe (PID: 38528)
      • host.exe (PID: 37428)
      • host.exe (PID: 38012)
      • host.exe (PID: 37904)
    • Runs injected code in another process

      • wmiprvse.exe (PID: 3376)
  • SUSPICIOUS

    • Creates or modifies windows services

      • svchost.exe (PID: 860)
      • services.exe (PID: 480)
    • Application launched itself

      • Wi-Fi.exe (PID: 848)
    • Starts CMD.EXE for commands execution

      • Wi-Fi.exe (PID: 1444)
      • tnLZQUwO.exe (PID: 26056)
      • WScript.exe (PID: 28120)
      • powershell.exe (PID: 28428)
    • Loads Python modules

      • Wi-Fi.exe (PID: 1444)
    • Uses WMIC.EXE to obtain a system information

      • cmd.exe (PID: 2344)
    • Executable content was dropped or overwritten

      • Wi-Fi.exe (PID: 848)
      • cmd.exe (PID: 28612)
    • Creates files in the Windows directory

      • cmd.exe (PID: 636)
      • cmd.exe (PID: 28612)
      • svchost.exe (PID: 860)
    • Executes PowerShell scripts

      • Wi-Fi.exe (PID: 1444)
    • Creates files in the user directory

      • powershell.exe (PID: 1764)
    • Uses IPCONFIG.EXE to discover IP address

      • cmd.exe (PID: 3244)
      • Wi-Fi.exe (PID: 1444)
    • Uses NETSTAT.EXE to discover network connections

      • Wi-Fi.exe (PID: 1444)
    • Executed as Windows Service

      • tnLZQUwO.exe (PID: 26056)
    • Executes scripts

      • cmd.exe (PID: 27020)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 28612)
      • cmd.exe (PID: 35884)
      • powershell.exe (PID: 28428)
    • PowerShell script executed

      • powershell.EXE (PID: 32444)
      • powershell.EXE (PID: 33172)
      • powershell.EXE (PID: 34704)
    • Executed via Task Scheduler

      • powershell.EXE (PID: 32444)
      • powershell.EXE (PID: 33172)
      • powershell.EXE (PID: 34704)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:01:05 13:16:15+01:00
PEType: PE32
LinkerVersion: 14
CodeSize: 128512
InitializedDataSize: 172032
UninitializedDataSize: -
EntryPoint: 0x7a6a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date: 05-Jan-2020 12:16:15

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 05-Jan-2020 12:16:15
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0001F4D4
0x0001F600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.6643
.rdata
0x00021000
0x0000B19E
0x0000B200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.11204
.data
0x0002D000
0x0000E680
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.93811
.gfids
0x0003C000
0x000000B8
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.86299
.rsrc
0x0003D000
0x0000EA38
0x0000EC00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.29706
.reloc
0x0004C000
0x000017D4
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.65456

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.58652
3752
UNKNOWN
UNKNOWN
RT_ICON
2
6.05629
2216
UNKNOWN
UNKNOWN
RT_ICON
3
5.5741
1384
UNKNOWN
UNKNOWN
RT_ICON
4
7.95079
37019
UNKNOWN
UNKNOWN
RT_ICON
5
5.29119
9640
UNKNOWN
UNKNOWN
RT_ICON
6
5.43869
4264
UNKNOWN
UNKNOWN
RT_ICON
7
5.89356
1128
UNKNOWN
UNKNOWN
RT_ICON
101
2.71858
104
UNKNOWN
UNKNOWN
RT_GROUP_ICON

Imports

ADVAPI32.dll
KERNEL32.dll
WS2_32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
589
Monitored processes
573
Malicious processes
12
Suspicious processes
3

Behavior graph

Click at the process to see the details
start inject inject inject inject inject inject wi-fi.exe wi-fi.exe cmd.exe no specs wmic.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs cmd.exe no specs net.exe no specs net.exe no specs net1.exe no specs net1.exe no specs powershell.exe no specs cmd.exe no specs ipconfig.exe no specs ipconfig.exe no specs netstat.exe no specs tnlzquwo.exe no specs cmd.exe no specs wscript.exe no specs cmd.exe powershell.exe no specs netsh.exe no specs netsh.exe no specs powershell.exe cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs powershell.exe no specs schtasks.exe no specs schtasks.exe no specs powershell.exe no specs schtasks.exe no specs schtasks.exe no specs powershell.exe no specs wmiprvse.exe no specs cmd.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs smss.exe csrss.exe wininit.exe csrss.exe winlogon.exe services.exe lsass.exe lsm.exe svchost.exe svchost.exe ctfmon.exe explorer.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe spoolsv.exe svchost.exe searchindexer.exe imedictupdate.exe svchost.exe taskeng.exe dwm.exe msiexec.exe svchost.exe srvpost.exe host.exe conhost.exe conhost.exe conhost.exe host.exe taskeng.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe host.exe

Process information

PID
CMD
Path
Indicators
Parent process
180ipconfig /allC:\Windows\system32\ipconfig.exeWi-Fi.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\ws2_32.dll
264\SystemRoot\System32\smss.exeC:\Windows\System32\smss.exe
System
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Session Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\systemroot\system32\smss.exe
c:\windows\system32\ntdll.dll
308C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
352%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
356C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
388wininit.exeC:\Windows\System32\wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Start-Up Application
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
396%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
432winlogon.exeC:\Windows\System32\winlogon.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Logon Application
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winsta.dll
480C:\Windows\system32\services.exeC:\Windows\System32\services.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Services and Controller app
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\services.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
496C:\Windows\system32\lsass.exeC:\Windows\System32\lsass.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Local Security Authority Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\lsass.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspisrv.dll
c:\windows\system32\lsasrv.dll
c:\windows\system32\sechost.dll
c:\windows\system32\sspicli.dll
Total events
8 109
Read events
7 513
Write events
591
Delete events
5

Modification events

(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:APPSTARTING
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:ARROW
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:CROSS
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:HAND
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:HELP
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:IBEAM
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:NO
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:SIZEALL
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:SIZENESW
Value:
%SystemRoot%\cursors\clearcur.cur
(PID) Process:(3920) host.exeKey:HKEY_CURRENT_USER\Control Panel\Cursors
Operation:writeName:SIZENS
Value:
%SystemRoot%\cursors\clearcur.cur
Executable files
56
Suspicious files
2
Text files
14
Unknown types
6

Dropped files

PID
Process
Filename
Type
860svchost.exeC:\Windows\appcompat\programs\RecentFileCache.bcftxt
MD5:
SHA256:
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_Salsa20.pydexecutable
MD5:109D8DEBCC68A2EEB2B347274E96AA93
SHA256:E5150B76D4AB88C70A12A3238EFAB19AA804645C5279F16435D3AF49A464BC68
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_ARC4.pydexecutable
MD5:5BEA098BC78CDD468C7B38689EB8496D
SHA256:D175B9E5FDF2CB9C2F881730C436EBDEDE4A770D079C2FAB43046E9C5B3C24B4
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_blowfish.pydexecutable
MD5:18E8D7404DBF0F40908DD8F81EFBBF40
SHA256:F382C54E8B352B64F822E5AB2C757C24146D737FAE9D5593CE1C3A683F56168B
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_aes.pydexecutable
MD5:73622DE2438D3C0355562F6F3FE6C7D0
SHA256:2E45474267A65254BBCAFADC06AF3F13B619E6A9FD11F49AFF5B73E48B02E6CF
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_eksblowfish.pydexecutable
MD5:B5F0D002A6308A56FF680079363067B3
SHA256:871BBF33D0C0608EB02C10ED95D3FB16FBD07F03A38936628C539EF2A5C26C47
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_des3.pydexecutable
MD5:C72D6C3C04E63648888441ED2AB3BE5D
SHA256:C3E175F75C662DEBB1834C57401A1527DA8361456498DB10844AA5066724FA8A
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_ctr.pydexecutable
MD5:E08959C8C10498B5F76A8DCD938E0E7F
SHA256:133E5CBC9266F6BEA623BA209011CBD5E8DFBCD0B4101056829907C19FAE12A1
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_des.pydexecutable
MD5:FB897CB29924B25E9ED9F2FF3110F67A
SHA256:D4DF8B24BAC7E0F1BD8A3C371DFC9B1DBF32808DA058F2DD7864B0F468363BB1
848Wi-Fi.exeC:\Users\admin\AppData\Local\Temp\_MEI8482\Crypto\Cipher\_raw_aesni.pydexecutable
MD5:A9B7F0BA372E578B4A37D7900CAC3F0F
SHA256:D54A14F48C4767B4DAC325A314823598D272848F32D86922785C4A3021CEDBF9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
12 210
DNS requests
10
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
28428
powershell.exe
GET
200
161.35.107.193:80
http://t.amynx.com/gim.jsp
US
text
7.27 Kb
malicious
1444
Wi-Fi.exe
GET
200
79.98.145.42:80
http://ip.42.pl/raw
PL
text
12 b
suspicious
1444
Wi-Fi.exe
GET
301
45.79.77.20:80
http://jsonip.com/
US
html
169 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1444
Wi-Fi.exe
45.79.77.20:80
jsonip.com
Linode, LLC
US
suspicious
1444
Wi-Fi.exe
79.98.145.42:80
ip.42.pl
Nitronet Sp. z o.o.
PL
suspicious
1444
Wi-Fi.exe
45.79.77.20:443
jsonip.com
Linode, LLC
US
suspicious
1444
Wi-Fi.exe
192.168.1.2:445
suspicious
1444
Wi-Fi.exe
192.168.1.2:1433
suspicious
1444
Wi-Fi.exe
10.0.0.1:445
unknown
1444
Wi-Fi.exe
10.0.0.3:445
unknown
1444
Wi-Fi.exe
10.0.0.2:445
unknown
1444
Wi-Fi.exe
10.0.0.4:445
unknown
1444
Wi-Fi.exe
10.0.0.5:445
unknown

DNS requests

Domain
IP
Reputation
info.amynx.com
malicious
ip.42.pl
  • 79.98.145.42
suspicious
info.ackng.com
  • 127.0.0.1
malicious
jsonip.com
  • 45.79.77.20
whitelisted
info.zz3r0.com
malicious
t.amynx.com
  • 161.35.107.193
  • 66.42.43.37
malicious
t.zz3r0.com
malicious
t.zer9g.com
  • 127.0.0.1
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1044
svchost.exe
A Network Trojan was detected
ET TROJAN Win32/Beapy CnC Domain in DNS Lookup
1044
svchost.exe
A Network Trojan was detected
ET TROJAN Win32/Beapy CnC Domain in DNS Lookup
1444
Wi-Fi.exe
Attempted Information Leak
ET POLICY Python-urllib/ Suspicious User Agent
1444
Wi-Fi.exe
Misc activity
SUSPICIOUS [PTsecurity] IP Check (possible APT signed impacket_lateral_movement sample)
1444
Wi-Fi.exe
Attempted Information Leak
ET POLICY Python-urllib/ Suspicious User Agent
1444
Wi-Fi.exe
Misc activity
ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection
1444
Wi-Fi.exe
Misc activity
ET SCAN Behavioral Unusual Port 1433 traffic Potential Scan or Infection
28428
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] LemonDuck
1444
Wi-Fi.exe
Misc activity
ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection
1444
Wi-Fi.exe
Misc activity
ET SCAN Behavioral Unusual Port 1433 traffic Potential Scan or Infection
2 ETPRO signatures available at the full report
No debug info