analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

TSVNCache.exe

Full analysis: https://app.any.run/tasks/e201f765-4c87-44c8-9e09-cc2c49df7dd1
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 30, 2020, 10:14:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

ED79BA463D49F1FE5450CE559E69A75E

SHA1:

E7DDA79452DBE36E4ECA488DF20E57E24C4E9BB5

SHA256:

7BA6C36E2D833806CCE532DC15323518BF1F5C149727F42BFAE51F06EF94A74F

SSDEEP:

6144:Qvzaply4i+lAo1jV30+EPOOWOOqsJMBmk:cKy4i+2ojHE2O1OqsUH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Emotet process was detected

      • wabmetagen.exe (PID: 900)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • TSVNCache.exe (PID: 3156)
    • Starts itself from another location

      • TSVNCache.exe (PID: 3156)
    • Reads Internet Cache Settings

      • wabmetagen.exe (PID: 3160)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • TSVNCache.exe (PID: 3156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:01:29 00:00:40+01:00
PEType: PE32
LinkerVersion: 12
CodeSize: 65536
InitializedDataSize: 151552
UninitializedDataSize: -
EntryPoint: 0x3f03
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.9.6.27867
ProductVersionNumber: 1.9.6.27867
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: http://tortoisesvn.net
FileDescription: ApiSet Stub DLL
FileVersion: 1.9.6.27867
InternalName: TSVNCache.exe
LegalCopyright: Copyright © 2003-2017 - TortoiseSVN
OriginalFileName: apisetstub
ProductName: TortoiseSVN
ProductVersion: 6.1.7600.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start tsvncache.exe no specs tsvncache.exe #EMOTET wabmetagen.exe no specs wabmetagen.exe

Process information

PID
CMD
Path
Indicators
Parent process
2632"C:\Users\admin\AppData\Local\Temp\TSVNCache.exe" C:\Users\admin\AppData\Local\Temp\TSVNCache.exeexplorer.exe
User:
admin
Company:
http://tortoisesvn.net
Integrity Level:
MEDIUM
Description:
ApiSet Stub DLL
Exit code:
0
Version:
1.9.6.27867
3156"C:\Users\admin\AppData\Local\Temp\TSVNCache.exe"C:\Users\admin\AppData\Local\Temp\TSVNCache.exe
TSVNCache.exe
User:
admin
Company:
http://tortoisesvn.net
Integrity Level:
MEDIUM
Description:
ApiSet Stub DLL
Exit code:
0
Version:
1.9.6.27867
900"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe
TSVNCache.exe
User:
admin
Company:
http://tortoisesvn.net
Integrity Level:
MEDIUM
Description:
ApiSet Stub DLL
Exit code:
0
Version:
1.9.6.27867
3160"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe
wabmetagen.exe
User:
admin
Company:
http://tortoisesvn.net
Integrity Level:
MEDIUM
Description:
ApiSet Stub DLL
Version:
1.9.6.27867
Total events
61
Read events
59
Write events
2
Delete events
0

Modification events

(PID) Process:(3160) wabmetagen.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3160) wabmetagen.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3156TSVNCache.exeC:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exeexecutable
MD5:ED79BA463D49F1FE5450CE559E69A75E
SHA256:7BA6C36E2D833806CCE532DC15323518BF1F5C149727F42BFAE51F06EF94A74F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3160
wabmetagen.exe
191.98.77.181:22
EPM Telecomunicaciones S.A. E.S.P.
CO
malicious

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3160
wabmetagen.exe
Attempted Information Leak
ET SCAN Potential SSH Scan OUTBOUND
No debug info