| File name: | DamewareRE.exe |
| Full analysis: | https://app.any.run/tasks/6950f084-b975-46c2-83c3-a79c0c71e00a |
| Verdict: | Malicious activity |
| Analysis date: | November 30, 2023, 22:47:13 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | FC462C0DE12863A20836976DC3EF69ED |
| SHA1: | 0A83F57EACF9A92CD101770F38DBF5FB3F1A7C13 |
| SHA256: | 7F613D6B3F30ADC096690F8B95E266DC214E781D43D505B2A3ED1C67BB14F570 |
| SSDEEP: | 98304:3+tgpr7TLlyxe1XLgAU/zPtrRzaftnCoaHcdG0O4arQ5KTSFYqg7Xky3rmk+qaxr:uqkFiiq4g8zT/EreV/iV3n |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:04:02 05:20:09+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24064 |
| InitializedDataSize: | 120320 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x326c |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 552 | C:\Users\admin\AppData\Local\Temp\DamewareRE.exe | C:\Users\admin\AppData\Local\Temp\DamewareRE.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2480 | "C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupApp.exe" -from_installer | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupApp.exe | DamewareRE.exe | ||||||||||||
User: admin Company: N-able Take Control Integrity Level: MEDIUM Description: N-able Take Control Applet Exit code: 0 Version: 7.50.2.1502 Modules
| |||||||||||||||
| 2584 | "C:\Users\admin\AppData\Local\DAMEWA~1\BASupApp.exe" -sas | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupApp.exe | BASupApp.exe | ||||||||||||
User: admin Company: N-able Take Control Integrity Level: HIGH Description: N-able Take Control Applet Exit code: 0 Version: 7.50.2.1502 Modules
| |||||||||||||||
| 2972 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2980 | "C:\Windows\System32\cmd.exe" /k C:\Users\admin\AppData\Local\Temp\DamewareRE.exe | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2480) BASupApp.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2972) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{504F209B-8415-41A9-A5F5-5D46FB5C0495}\{5A03542F-93F4-4618-BCC9-179F23F69801} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2972) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{504F209B-8415-41A9-A5F5-5D46FB5C0495} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2972) wmpnscfg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{FCB8E35C-C475-4780-ACB0-3A7FB93D6870} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2480) BASupApp.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2480) BASupApp.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2480) BASupApp.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2480) BASupApp.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2584) BASupApp.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Temp\nshE54D.tmp\System.dll | executable | |
MD5:5DFCBB8A6F997F761C42140852D1E97B | SHA256:D6D897439781F43DFA1DAB63FA3530A8A98EAB3FE07D879C380DCA4DC69F3CE2 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppIT.dll | executable | |
MD5:F4F02D43D990A6971CA649ECAA0A4DD6 | SHA256:7B86F44CF394E57A6328239648C0CEF61BE493F3C54C2534063CB0D4D1339630 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupSysShell64.exe | executable | |
MD5:099D5A81EF1AB851865B46A1569B83C2 | SHA256:CA0CFAC0D9179E5824D0F4A8F71717310B4A1641189D501F99C90F86C29E678B | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppElev.exe | executable | |
MD5:FF9E810AB85ABAD366624B181DE08A6E | SHA256:D98549252A427DF7FD6648D1E53CB983655C54B0F5FD88C12CBFF54082650DF4 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppES.dll | executable | |
MD5:45FAE75F380AF2085AE0F29D246C991D | SHA256:7BF1C8C31008E936D880D5A459121367C97F3F2091DBFC6E9BD757679BE5E546 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppEN.dll | executable | |
MD5:2369B4F8ADF75A54D7BCC8B8117A4C83 | SHA256:5205A04A9B50772C926DF64F0224B9CBC2DC32E52EE05BA672FD701D2CFB1269 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppPT.dll | executable | |
MD5:36287BFDC9628CA7B8066EBF16AD403C | SHA256:F5C6580C27846D90452201D0349583C832C4FC1EEEA04A35A95D4819D0632F85 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupApp.exe | executable | |
MD5:33E725BF91F41F656DCFB423DDE43391 | SHA256:303D1CD1E43F09B950EF2162FE785DAF22869B40D4AFFA3CFC5B4696ACA44601 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BASupAppDE.dll | executable | |
MD5:547A9C9EDBF76BBD904F6E81A68001CF | SHA256:82BCD093B87C3045D19810D3527D8BA3207B95FF2DE14903FCBFD13516BB3C17 | |||
| 552 | DamewareRE.exe | C:\Users\admin\AppData\Local\Dameware Remote Everywhere Applet\BAWHook.dll | executable | |
MD5:212B242768E3AF09042D59FFFE612327 | SHA256:113B558EC8391298302B74DE14F7FDCE5440955087CE0A65DC5A0BF2492E55B1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2480 | BASupApp.exe | GET | 200 | 87.248.204.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e0db84bfd8f003ce | unknown | compressed | 4.66 Kb | unknown |
2480 | BASupApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEAQJGBtf1btmdVNDtW%2BVUAg%3D | unknown | binary | 471 b | unknown |
2480 | BASupApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSnR4FoxLLkI7vkvsUIFlZt%2BlGH3gQUWsS5eyoKo6XqcQPAYPkt9mV1DlgCEA8fXbsaZYto%2B%2BgfHxxj8JQ%3D | unknown | binary | 471 b | unknown |
1080 | svchost.exe | GET | 304 | 87.248.204.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5c94acfb5b892539 | unknown | — | — | unknown |
2480 | BASupApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTjzY2p9Pa8oibmj%2BNSMWsz63kmWgQUuhbZbU2FL3MpdpovdYxqII%2BeyG8CEAVEr%2FOUnQg5pr%2FbP1%2FlYRY%3D | unknown | binary | 727 b | unknown |
1080 | svchost.exe | GET | 200 | 87.248.204.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?8c278ce706dba7cc | unknown | compressed | 65.2 Kb | unknown |
2480 | BASupApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D | unknown | binary | 471 b | unknown |
2480 | BASupApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAc2N7ckVHzYR6z9KGYqXls%3D | unknown | binary | 727 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2480 | BASupApp.exe | 87.248.204.0:80 | ctldl.windowsupdate.com | LLNW | US | unknown |
2480 | BASupApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
1080 | svchost.exe | 87.248.204.0:80 | ctldl.windowsupdate.com | LLNW | US | unknown |
2480 | BASupApp.exe | 104.18.38.243:443 | comserver.us3.swi-rc.com | CLOUDFLARENET | — | unknown |
2480 | BASupApp.exe | 172.64.149.13:443 | comserver.us3.swi-rc.com | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
comserver.us3.swi-rc.com |
| unknown |
images.us3.swi-rc.com |
| unknown |