File name:

streamer.exe

Full analysis: https://app.any.run/tasks/b1038a69-1f76-4985-8f08-e5c0a803f4c7
Verdict: Malicious activity
Analysis date: March 26, 2024, 13:29:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

040CD888E971F2872D6D5DAFD52E6194

SHA1:

1AA1255ADE0FF100FF4E5E727CEAA42FC1C1CB09

SHA256:

77C2372364B6DD56BC787FDA46E6F4240AAA0353EAD1E3071224D454038A545E

SSDEEP:

12288:pCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgawQUQZ:pCdxte/80jYLT3U1jfsWawQUQZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • streamer.exe (PID: 3992)
  • SUSPICIOUS

    • Non-standard symbols in registry

      • WINWORD.EXE (PID: 240)
      • WINWORD.EXE (PID: 2388)
      • WINWORD.EXE (PID: 3044)
  • INFO

    • Checks supported languages

      • streamer.exe (PID: 3992)
      • streamer.exe (PID: 1740)
      • streamer.exe (PID: 1976)
      • streamer.exe (PID: 2788)
      • streamer.exe (PID: 3976)
      • streamer.exe (PID: 664)
      • MSASCui.exe (PID: 2468)
      • streamer.exe (PID: 2148)
      • streamer.exe (PID: 3068)
    • Reads mouse settings

      • streamer.exe (PID: 3992)
      • streamer.exe (PID: 1740)
      • streamer.exe (PID: 1976)
      • streamer.exe (PID: 2788)
      • streamer.exe (PID: 3976)
      • streamer.exe (PID: 664)
      • streamer.exe (PID: 3068)
      • streamer.exe (PID: 2148)
    • Manual execution by a user

      • explorer.exe (PID: 3936)
      • streamer.exe (PID: 1740)
      • streamer.exe (PID: 1976)
      • streamer.exe (PID: 2788)
      • streamer.exe (PID: 664)
      • streamer.exe (PID: 3976)
      • WINWORD.EXE (PID: 240)
      • WINWORD.EXE (PID: 2388)
      • WINWORD.EXE (PID: 3044)
      • firefox.exe (PID: 1072)
      • MSASCui.exe (PID: 2468)
      • streamer.exe (PID: 2148)
      • streamer.exe (PID: 3068)
    • Application launched itself

      • firefox.exe (PID: 1072)
      • firefox.exe (PID: 3600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:18 11:09:14+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 268800
UninitializedDataSize: -
EntryPoint: 0x27f4a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 10.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
Comments: This is the AutoIt script parser built for Ultra Virus Killer
CompanyName: Carifred
FileDescription: Ultra Virus Killer AutoIt script parser
FileVersion: 1.0.0.0
InternalName: AutoItRun
LegalCopyright: Carifred © 2010 - 2016
LegalTrademarks: Carifred.com
OriginalFileName: AutoItRun.exe
ProductName: Ultra Virus Killer
ProductVersion: 10.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
24
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start streamer.exe no specs explorer.exe no specs streamer.exe no specs streamer.exe no specs streamer.exe no specs streamer.exe no specs winword.exe no specs winword.exe no specs streamer.exe no specs streamer.exe PhotoViewer.dll no specs streamer.exe no specs PhotoViewer.dll no specs winword.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msascui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\welcomeeconomy.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
664"C:\Users\admin\Downloads\streamer.exe" C:\Users\admin\Downloads\streamer.exeexplorer.exe
User:
admin
Company:
Carifred
Integrity Level:
MEDIUM
Description:
Ultra Virus Killer AutoIt script parser
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\streamer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1072"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1308"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3600.5.1324845590\73254293" -childID 4 -isForBrowser -prefsHandle 3852 -prefMapHandle 3816 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4e0fc7a-e2aa-4d65-9fb9-e40fe39e522d} 3600 "\\.\pipe\gecko-crash-server-pipe.3600" 3840 183529b0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1740"C:\Users\admin\Downloads\streamer.exe" C:\Users\admin\Downloads\streamer.exeexplorer.exe
User:
admin
Company:
Carifred
Integrity Level:
MEDIUM
Description:
Ultra Virus Killer AutoIt script parser
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\streamer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1792C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1824"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3600.3.907888296\750664957" -childID 2 -isForBrowser -prefsHandle 2868 -prefMapHandle 2864 -prefsLen 34225 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d79f6d68-7138-429a-aa95-b697e9901360} 3600 "\\.\pipe\gecko-crash-server-pipe.3600" 2880 1699b280 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1976"C:\Users\admin\Downloads\streamer.exe" C:\Users\admin\Downloads\streamer.exeexplorer.exe
User:
admin
Company:
Carifred
Integrity Level:
MEDIUM
Description:
Ultra Virus Killer AutoIt script parser
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\streamer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2148"C:\Users\admin\Downloads\streamer.exe" C:\Users\admin\Downloads\streamer.exeexplorer.exe
User:
admin
Company:
Carifred
Integrity Level:
MEDIUM
Description:
Ultra Virus Killer AutoIt script parser
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\streamer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2308C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
24 592
Read events
22 937
Write events
798
Delete events
857

Modification events

(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:?|"
Value:
3F7C2200F0000000010000000000000000000000
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(240) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
1
Suspicious files
14
Text files
15
Unknown types
87

Dropped files

PID
Process
Filename
Type
240WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRB83F.tmp.cvr
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\Desktop\~$lcomeeconomy.rtfbinary
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\welcomeeconomy.rtf.LNKbinary
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:
SHA256:
2388WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRD339.tmp.cvr
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\Desktop\~$fttell.rtfbinary
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\lefttell.rtf.LNKbinary
MD5:
SHA256:
3044WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR8687.tmp.cvr
MD5:
SHA256:
240WINWORD.EXEC:\Users\admin\Desktop\~$iendlyship.rtfbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
47
DNS requests
114
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3600
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
3600
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
3600
firefox.exe
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
3600
firefox.exe
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
3600
firefox.exe
POST
200
142.250.184.195:80
http://ocsp.pki.goog/gts1c3
unknown
3600
firefox.exe
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
3600
firefox.exe
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
3600
firefox.exe
POST
200
2.16.202.114:80
http://r3.o.lencr.org/
unknown
3600
firefox.exe
POST
200
95.101.54.115:80
http://r3.o.lencr.org/
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3600
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
unknown
3600
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3600
firefox.exe
2.16.202.114:80
r3.o.lencr.org
Akamai International B.V.
NL
unknown
3600
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
3600
firefox.exe
34.117.188.166:443
spocs.getpocket.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3600
firefox.exe
172.217.18.10:443
safebrowsing.googleapis.com
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
unknown
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
unknown
contile.services.mozilla.com
  • 34.117.237.239
unknown
example.org
  • 93.184.216.34
unknown
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
unknown
spocs.getpocket.com
  • 34.117.188.166
unknown
r3.o.lencr.org
  • 2.16.202.114
  • 2.16.202.115
  • 95.101.54.200
  • 95.101.54.137
  • 95.101.54.139
  • 95.101.54.195
  • 95.101.54.115
  • 95.101.54.216
  • 95.101.54.217
  • 95.101.54.121
  • 95.101.54.107
  • 2.16.202.121
  • 95.101.54.122
  • 2.16.202.128
  • 95.101.54.99
  • 95.101.54.202
unknown
a1887.dscq.akamai.net
  • 95.101.54.139
  • 95.101.54.200
  • 95.101.54.115
  • 2.16.202.114
  • 2.16.202.115
  • 95.101.54.137
  • 95.101.54.216
  • 95.101.54.217
  • 95.101.54.195
  • 2a02:26f0:480:e::210:f10f
  • 2a02:26f0:480:e::210:f108
  • 2.16.202.121
  • 95.101.54.99
  • 2.16.202.128
  • 95.101.54.202
  • 95.101.54.107
  • 95.101.54.122
  • 95.101.54.121
  • 2a02:26f0:780::5f65:3689
  • 2a02:26f0:780::5f65:3680
  • 2a02:26f0:780::5f65:367b
  • 2a02:26f0:780::5f65:366b
  • 2a02:26f0:780::5f65:3682
unknown
firefox.settings.services.mozilla.com
  • 34.149.100.209
unknown
prod.remote-settings.prod.webservices.mozgcp.net
  • 34.149.100.209
unknown

Threats

No threats detected
No debug info