| File name: | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe |
| Full analysis: | https://app.any.run/tasks/964ef1c6-edf0-407f-863f-91db2a92fe60 |
| Verdict: | Malicious activity |
| Analysis date: | October 20, 2020, 10:20:28 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 69625BFFC746A143FAB6DF74E6386E67 |
| SHA1: | BE10778B0DE5EA98C130A371B136FD84252463B9 |
| SHA256: | 797AF44F179DB68BC9B17577E2CDB5C409F17EF3403A02931B933E9EA6B881DF |
| SSDEEP: | 12288:pl+o3SimMgvNehOkhjNha47pqioB1GVZyk1GeWfAhfMtkyVTp20S5WZNdBc:p0tigvNeRhaFFBgVZyAmfAk7OaNdK |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:09:23 10:49:24+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 14.16 |
| CodeSize: | 794624 |
| InitializedDataSize: | 28672 |
| UninitializedDataSize: | 1245184 |
| EntryPoint: | 0x1f27e0 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.2.0.8 |
| ProductVersionNumber: | 3.2.0.8 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| CompanyName: | - |
| FileDescription: | |
| FileVersion: | 3.2.0.8 |
| InternalName: | FastDownloader.exe |
| LegalCopyright: | Copyright (C) 2018 |
| OriginalFileName: | FastDownloader.exe |
| ProductName: | 软件下载器 |
| ProductVersion: | 3.2.0.8 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 23-Sep-2020 08:49:24 |
| Detected languages: |
|
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 3.2.0.8 |
| InternalName: | FastDownloader.exe |
| LegalCopyright: | Copyright (C) 2018 |
| OriginalFilename: | FastDownloader.exe |
| ProductName: | 软件下载器 |
| ProductVersion: | 3.2.0.8 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000130 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 23-Sep-2020 08:49:24 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00130000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x00131000 | 0x000C2000 | 0x000C1C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.92221 |
.rsrc | 0x001F3000 | 0x00007000 | 0x00006C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.02901 |
.data | 0x001FA000 | 0x00000003 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.051876 |
.textbss\x03 | 0x001FB000 | 0x00000003 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.051876 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.06216 | 651 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.24731 | 296 | UNKNOWN | Chinese - PRC | RT_ICON |
3 | 3.27183 | 3752 | UNKNOWN | Chinese - PRC | RT_ICON |
4 | 3.91452 | 2216 | UNKNOWN | Chinese - PRC | RT_ICON |
5 | 3.47417 | 1384 | UNKNOWN | Chinese - PRC | RT_ICON |
6 | 3.02843 | 9640 | UNKNOWN | Chinese - PRC | RT_ICON |
7 | 2.82055 | 4264 | UNKNOWN | Chinese - PRC | RT_ICON |
8 | 2.44525 | 1128 | UNKNOWN | Chinese - PRC | RT_ICON |
9 | 7.85065 | 16936 | UNKNOWN | Chinese - PRC | RT_ICON |
10 | 7.49067 | 1128 | UNKNOWN | Chinese - PRC | RT_ICON |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
IMM32.dll |
IPHLPAPI.DLL |
KERNEL32.DLL |
MSIMG32.dll |
OLEACC.dll |
OLEAUT32.dll |
SHELL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2232 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2900 | "C:\Users\admin\AppData\Local\Temp\797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe" | C:\Users\admin\AppData\Local\Temp\797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | — | explorer.exe | |||||||||||
User: admin Company: - Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 3.2.0.8 Modules
| |||||||||||||||
| 2952 | "C:\Windows\explorer.exe" /select,"C:\Download\\360safe_oemjmxt.exe" | C:\Windows\explorer.exe | — | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 4088 | "C:\Users\admin\AppData\Local\Temp\797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe" | C:\Users\admin\AppData\Local\Temp\797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | explorer.exe | ||||||||||||
User: admin Company: - Integrity Level: HIGH Description: Exit code: 0 Version: 3.2.0.8 Modules
| |||||||||||||||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters |
| Operation: | write | Name: | TrapPollTimeMilliSecs |
Value: 15000 | |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_CURRENT_USER\Software\UIDowner |
| Operation: | write | Name: | usestime |
Value: 1 | |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (4088) 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2232) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (2232) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 0700000001000000020000000B000000000000000A000000090000000800000006000000030000000500000004000000FFFFFFFF | |||
| (PID) Process: | (2232) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar |
| Operation: | write | Name: | Locked |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | C:\Download\360safe_oemjmxt.exe | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 120.52.95.242:80 | http://resource.aldtop.com/theme/20200925.dat | CN | binary | 103 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 58.49.193.225:80 | http://static.downerapi.com/upload/xml/360.xml?webid=28&channelid=&softid=5&token=5ea18bb987d01d0beaf4c9a9f23a1024 | CN | xml | 1.54 Kb | unknown |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/uKhixdbpTvJaU9uO8Llw5bqqGQnqbJ1ic80OCRum.png | CN | image | 11.7 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 60.205.177.239:80 | http://downloader.aldtop.com/client/error?step=0&theme=-1&softid=&webid=&channelid=&error=1&errorcode=1&user=86b1dd8a4431c07a7a10d921f83ac4f6&session=&city=0 | CN | text | 3 b | malicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/yo5jWQwgDDlXlD9TM6X9J3g4p8r32gFupyWGVM7W.png | CN | image | 5.15 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/hXxVxYrv4nOXUeTspFukV4lo1xWDwGHKYHsZKb8L.png | CN | image | 1.98 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/kKrrLCMtNhJoI2XqH3Zb1QIzKxIfZVB1vi3WjNCY.png | CN | image | 3.37 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/v2CIBxpglxqhNyBxorlJdRmTh6i6ypci614hW0Ay.png | CN | image | 2.78 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/l5G1LSzDTLRJTyEkIxIWfzIzuWEyPWYSFg7Km9IO.png | CN | image | 3.26 Kb | suspicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | GET | 200 | 116.207.118.44:80 | http://img.aldtop.com/storage/upload/RhgHzVa7ImwTynN5Kyyb6aFVjyBBFJnyFHWF07JA.png | CN | image | 7.20 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 58.49.193.225:80 | static.downerapi.com | No.31,Jin-rong Street | CN | unknown |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 60.205.177.239:80 | downloader.aldtop.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | malicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 116.207.118.44:80 | img.aldtop.com | No.31,Jin-rong Street | CN | unknown |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 104.192.108.21:443 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | malicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 218.12.76.150:80 | resource.aldtop.com | CHINA UNICOM China169 Backbone | CN | malicious |
— | — | 218.12.76.150:80 | resource.aldtop.com | CHINA UNICOM China169 Backbone | CN | malicious |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | 120.52.95.242:80 | resource.aldtop.com | China Unicom IP network | CN | malicious |
Domain | IP | Reputation |
|---|---|---|
downloader.aldtop.com |
| unknown |
static.downerapi.com |
| unknown |
resource.aldtop.com |
| suspicious |
img.aldtop.com |
| suspicious |
dl.360safe.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | Potentially Bad Traffic | ET MALWARE Downer.B Variant Checkin |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/RiskWare.Downer.A |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/RiskWare.Downer.A |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/RiskWare.Downer.A |
4088 | 797af44f179db68bc9b17577e2cdb5c409f17ef3403a02931b933e9ea6b881df.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/RiskWare.Downer.A |