File name: | lwu1byplf.exe |
Full analysis: | https://app.any.run/tasks/60079e75-3656-4efc-8785-4069789c54ce |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | April 23, 2019, 09:30:03 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 917FFA7297CA29545219EB3B821684CD |
SHA1: | 20B00939BD79A23700D12B1B1AE6C8361E5AA65F |
SHA256: | 760CCB0EDEEEAFE0CAE52334884C431CCD8A753B070CD4F6CB3D2DC2ACAC2404 |
SSDEEP: | 1536:y0HSpO94Ns7C7D7PFs73wlL1Hr0Ouk6o+ycgL5vkUqiSyy9sAVA/wN:lHSpq4nDLFs73KZRgo3cK5vO51/Va |
.dll | | | Win32 Dynamic Link Library (generic) (43.5) |
---|---|---|
.exe | | | Win32 Executable (generic) (29.8) |
.exe | | | Generic Win/DOS Executable (13.2) |
.exe | | | DOS Executable Generic (13.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2014:04:09 00:07:12+02:00 |
PEType: | PE32 |
LinkerVersion: | 13 |
CodeSize: | 10240 |
InitializedDataSize: | 68608 |
UninitializedDataSize: | - |
EntryPoint: | 0x2608 |
OSVersion: | 5 |
ImageVersion: | - |
SubsystemVersion: | 5 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 08-Apr-2014 22:07:12 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000080 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 2 |
Time date stamp: | 08-Apr-2014 22:07:12 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00002750 | 0x00002800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.40047 |
.qwer | 0x00004000 | 0x00010B42 | 0x00010C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.92252 |
advapi32.dll |
authz.dll |
certcli.dll |
kernel32.dll |
resutils.dll |
shell32.dll |
user32.dll |
wtsapi32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2036 | "C:\Users\admin\AppData\Local\Temp\lwu1byplf.exe" | C:\Users\admin\AppData\Local\Temp\lwu1byplf.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3456 | --c34e0130 | C:\Users\admin\AppData\Local\Temp\lwu1byplf.exe | lwu1byplf.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3728 | "C:\Users\admin\AppData\Local\soundser\soundser.exe" | C:\Users\admin\AppData\Local\soundser\soundser.exe | lwu1byplf.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
596 | --3ab57678 | C:\Users\admin\AppData\Local\soundser\soundser.exe | soundser.exe | |
User: admin Integrity Level: MEDIUM | ||||
2784 | C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503} | C:\Windows\system32\DllHost.exe | — | svchost.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3124 | "C:\Program Files\Microsoft\Skype for Desktop\Skype.exe" | C:\Program Files\Microsoft\Skype for Desktop\Skype.exe | explorer.exe | |
User: admin Company: Skype Technologies S.A. Integrity Level: MEDIUM Description: Skype Version: 8.29.0.50 | ||||
3880 | "C:\Program Files\Microsoft\Skype for Desktop\Skype.exe" --reporter-url=https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload --application-name=skype-preview "--crashes-directory=C:\Users\admin\AppData\Local\Temp\skype-preview Crashes" --v=1 | C:\Program Files\Microsoft\Skype for Desktop\Skype.exe | Skype.exe | |
User: admin Company: Skype Technologies S.A. Integrity Level: MEDIUM Description: Skype Version: 8.29.0.50 | ||||
1336 | C:\Windows\system32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Skype for Desktop" /t REG_SZ /d "C:\Program Files\Microsoft\Skype for Desktop\Skype.exe" /f | C:\Windows\system32\reg.exe | Skype.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3808 | "C:\Program Files\Microsoft\Skype for Desktop\Skype.exe" --type=renderer --ms-disable-indexeddb-transaction-timeout --no-sandbox --service-pipe-token=A3E90A6EC5D149F690E1F9B56ADAC048 --lang=en-US --app-user-model-id=Microsoft.Skype.SkypeDesktop --app-path="C:\Program Files\Microsoft\Skype for Desktop\resources\app.asar" --node-integration=false --webview-tag=true --no-sandbox --preload="C:\Program Files\Microsoft\Skype for Desktop\resources\app.asar\Preload.js" --context-id=2 --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=A3E90A6EC5D149F690E1F9B56ADAC048 --renderer-client-id=3 --mojo-platform-channel-handle=1540 /prefetch:1 | C:\Program Files\Microsoft\Skype for Desktop\Skype.exe | — | Skype.exe |
User: admin Company: Skype Technologies S.A. Integrity Level: MEDIUM Description: Skype Exit code: 0 Version: 8.29.0.50 | ||||
4044 | C:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Skype /v RestartForUpdate | C:\Windows\system32\reg.exe | — | Skype.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3124 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OW25UJ8HFC0DE0GNT8YH.temp | — | |
MD5:— | SHA256:— | |||
1708 | Skype.exe | C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\operation_log.txt | text | |
MD5:F96E8C88DB88E16F129FB20264E724EC | SHA256:C340467A4209BA4ADDF4E9DDB55865EA2A45C7DCD61C8C942EE38EFAA94DFE8D | |||
3812 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\skylib\slimcore-1-2147483647.blog | binary | |
MD5:FE5EE011C6A3435A3D71D931E5A8C14B | SHA256:3E6DB63EEB1B1400B67C330B37D6CA54C47CACDCDF9F20E94F7182432A68A17D | |||
2852 | Skype.exe | C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\operation_log.txt | text | |
MD5:AB2F552B6984F3DA15349E0398BA66E1 | SHA256:00626B1F214FA62E05871C6FB902B00BE701706F0B9188BDE6A618009EA879B9 | |||
3124 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\ecscache.json | text | |
MD5:74DB04373070910B6B1CF1AA2F98EBA2 | SHA256:8D638EF3CF4F08C67D778CFE6303FCE3ACCD19B65B50B6ECBC7AC556B5300424 | |||
3456 | lwu1byplf.exe | C:\Users\admin\AppData\Local\soundser\soundser.exe | executable | |
MD5:917FFA7297CA29545219EB3B821684CD | SHA256:760CCB0EDEEEAFE0CAE52334884C431CCD8A753B070CD4F6CB3D2DC2ACAC2404 | |||
3124 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b916037c1e115fe0.customDestinations-ms | binary | |
MD5:D31368DE7CA649D55C099503C8AB992E | SHA256:7498692662EEDC761C241D17AAAA0317113505EB51B033C58E21F1F5A168BF37 | |||
3808 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\skylib\slimcore-0-2566023890.blog | binary | |
MD5:FE5EE011C6A3435A3D71D931E5A8C14B | SHA256:3E6DB63EEB1B1400B67C330B37D6CA54C47CACDCDF9F20E94F7182432A68A17D | |||
3124 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\Cache\f_000005 | compressed | |
MD5:D5C72D6B953CC7AD92E14385FC338914 | SHA256:B3F625CD102D4B235D927FAD85B9EE7F22D247881FAC7BDD897858A282477493 | |||
3124 | Skype.exe | C:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\IndexedDB\file__0.indexeddb.leveldb\LOG | text | |
MD5:7635C6D20935FFB2B9E82F5E8E5761CF | SHA256:329A7A62983755099808C3B4BF37A2132784857498C9260125F12386B96D0CEE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
596 | soundser.exe | POST | — | 152.168.82.167:80 | http://152.168.82.167/chunk/devices/ | AR | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3124 | Skype.exe | 52.114.75.79:443 | pipe.skype.com | Microsoft Corporation | NL | suspicious |
596 | soundser.exe | 152.168.82.167:80 | — | CABLEVISION S.A. | AR | malicious |
3124 | Skype.exe | 13.107.3.128:443 | config.edge.skype.com | Microsoft Corporation | US | whitelisted |
3124 | Skype.exe | 13.68.117.223:443 | avatar.skype.com | Microsoft Corporation | US | whitelisted |
3124 | Skype.exe | 40.114.140.1:443 | a.config.skype.com | Microsoft Corporation | NL | unknown |
3124 | Skype.exe | 172.217.21.234:443 | www.googleapis.com | Google Inc. | US | whitelisted |
— | — | 13.90.95.57:443 | get.skype.com | Microsoft Corporation | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
get.skype.com |
| whitelisted |
a.config.skype.com |
| whitelisted |
pipe.skype.com |
| whitelisted |
www.googleapis.com |
| whitelisted |
avatar.skype.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
596 | soundser.exe | A Network Trojan was detected | ET CNC Feodo Tracker Reported CnC Server group 3 |
596 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |
Process | Message |
---|---|
Skype.exe | [2852:3548:0423/103108.900:VERBOSE1:crash_service_main.cc(78)] Session start. cmdline is [--reporter-url=https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload --application-name=skype-preview "--crashes-directory=C:\Users\admin\AppData\Local\Temp\skype-preview Crashes" --v=1]
|
Skype.exe | [2852:3548:0423/103108.900:VERBOSE1:crash_service.cc(145)] window handle is 00040120
|
Skype.exe | [2852:3548:0423/103108.900:VERBOSE1:crash_service.cc(300)] pipe name is \\.\pipe\skype-preview Crash Service
dumps at C:\Users\admin\AppData\Local\Temp\skype-preview Crashes
|
Skype.exe | [2852:3548:0423/103108.900:VERBOSE1:crash_service.cc(304)] checkpoint is C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\crash_checkpoint.txt
server is https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload
maximum 128 reports/day
reporter is electron-crash-service
|
Skype.exe | [2852:3548:0423/103108.900:ERROR:crash_service.cc(311)] could not start dumper
|
Skype.exe | [1708:1088:0423/103115.224:VERBOSE1:crash_service_main.cc(78)] Session start. cmdline is [--reporter-url=https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload --application-name=skype-preview "--crashes-directory=C:\Users\admin\AppData\Local\Temp\skype-preview Crashes" --v=1]
|
Skype.exe | [1708:1088:0423/103115.225:VERBOSE1:crash_service.cc(145)] window handle is 0008014E
|
Skype.exe | [1708:1088:0423/103115.225:VERBOSE1:crash_service.cc(300)] pipe name is \\.\pipe\skype-preview Crash Service
dumps at C:\Users\admin\AppData\Local\Temp\skype-preview Crashes
|
Skype.exe | [1708:1088:0423/103115.226:VERBOSE1:crash_service.cc(304)] checkpoint is C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\crash_checkpoint.txt
server is https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload
maximum 128 reports/day
reporter is electron-crash-service
|
Skype.exe | [1708:1088:0423/103115.227:ERROR:crash_service.cc(311)] could not start dumper
|