File name:

kittens in windows.exe

Full analysis: https://app.any.run/tasks/533e2e47-65ef-410b-8b06-fd6e3af618a0
Verdict: Malicious activity
Analysis date: July 30, 2019, 01:50:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
obfuscated
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3079B1B37AE150FE1E886D81753C438E

SHA1:

9CAC5998DF0D990CD719ECD159146CD6FA26BCC2

SHA256:

7FD0BCFF207A36D2A8C45A2EAAED7CF3F4CEDB589A9DF85D9F9F5BA68886BA5D

SSDEEP:

12288:+Tl0UgDcSlx/AUhBUaPt4HyZkpNIsiL7yi:O2DFpAierGUIsiL7yi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Detected artifact of a known obfuscator

      • system.exe (PID: 2652)
      • kittens in windows.exe (PID: 3500)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 2124)
      • filename.exe (PID: 2028)
      • WScript.exe (PID: 1480)
    • Application was injected by another process

      • explorer.exe (PID: 292)
    • Runs injected code in another process

      • filename.exe (PID: 2644)
  • SUSPICIOUS

    • Executes scripts

      • system.exe (PID: 2652)
      • kittens in windows.exe (PID: 3500)
    • Starts itself from another location

      • system.exe (PID: 2652)
      • kittens in windows.exe (PID: 3500)
      • filename.exe (PID: 2028)
    • Executable content was dropped or overwritten

      • filename.exe (PID: 2028)
      • kittens in windows.exe (PID: 3500)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 292)
    • Creates files in the user directory

      • explorer.exe (PID: 292)
      • filename.exe (PID: 2028)
    • Application launched itself

      • filename.exe (PID: 1356)
      • filename.exe (PID: 1816)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3196)
    • Starts Microsoft Office Application

      • explorer.exe (PID: 292)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3196)
    • Manual execution by user

      • WINWORD.EXE (PID: 3196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (84.4)
.dll | Win32 Dynamic Link Library (generic) (6.7)
.exe | Win32 Executable (generic) (4.6)
.exe | Generic Win/DOS Executable (2)
.exe | DOS Executable Generic (2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:03:20 11:36:31+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 696320
InitializedDataSize: 61440
UninitializedDataSize: -
EntryPoint: 0x118c
OSVersion: 4
ImageVersion: 1.9
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.9.0.8
ProductVersionNumber: 1.9.0.8
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: saitama
FileDescription: QUILLAIAS
ProductName: trophophyte4
FileVersion: 1.09.0008
ProductVersion: 1.09.0008
InternalName: tiossem3
OriginalFileName: tiossem3.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 20-Mar-2009 10:36:31
Detected languages:
  • English - United States
CompanyName: saitama
FileDescription: QUILLAIAS
ProductName: trophophyte4
FileVersion: 1.09.0008
ProductVersion: 1.09.0008
InternalName: tiossem3
OriginalFilename: tiossem3.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 20-Mar-2009 10:36:31
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000A9B98
0x000AA000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.56246
.data
0x000AB000
0x00003124
0x00000000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x000AF000
0x0000A5AA
0x0000B000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.20563

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.27703
616
Unicode (UTF 16LE)
English - United States
RT_VERSION
30001
2.23733
1640
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
2.69496
744
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
3.62251
296
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30004
1.78403
19496
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30005
3.2113
3752
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30006
3.3384
2216
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30007
2.40526
1384
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30008
1.6218
7336
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30009
1.83622
3240
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
10
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start inject kittens in windows.exe winword.exe no specs filename.exe no specs wscript.exe filename.exe system.exe no specs wscript.exe filename.exe no specs filename.exe explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
292C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1356"C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exekittens in windows.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
1480"C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
system.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1816"C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exesystem.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2028C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exe
filename.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2124"C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
kittens in windows.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2644C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exe
filename.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
2652"C:\Users\admin\AppData\Roaming\system.exe"C:\Users\admin\AppData\Roaming\system.exefilename.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\appdata\roaming\system.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3196"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\leastcomplete.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3500"C:\Users\admin\AppData\Local\Temp\kittens in windows.exe" C:\Users\admin\AppData\Local\Temp\kittens in windows.exe
explorer.exe
User:
admin
Company:
saitama
Integrity Level:
MEDIUM
Description:
QUILLAIAS
Exit code:
0
Version:
1.09.0008
Modules
Images
c:\users\admin\appdata\local\temp\kittens in windows.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
8 452
Read events
7 734
Write events
686
Delete events
32

Modification events

(PID) Process:(292) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1325269022
(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\Zvpebfbsg Bssvpr\Bssvpr14\JVAJBEQ.RKR
Value:
00000000010000000000000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF00F3CA2D7946D50100000000
(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithList
Operation:writeName:a
Value:
WINWORD.EXE
(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithList
Operation:writeName:MRUList
Value:
a
(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Operation:writeName:Word.RTF.8
Value:
(PID) Process:(3196) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:xh:
Value:
78683A007C0C0000010000000000000000000000
(PID) Process:(3196) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3196) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3196) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1325269023
Executable files
2
Suspicious files
1
Text files
11
Unknown types
14

Dropped files

PID
Process
Filename
Type
3196WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR24F8.tmp.cvr
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~WRD0000.tmp
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~WRD0002.tmp
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~WRL0003.tmp
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~WRD0004.tmp
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~WRL0005.tmp
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\leastcomplete.rtf.LNKlnk
MD5:
SHA256:
3196WINWORD.EXEC:\Users\admin\Desktop\~$astcomplete.rtfpgc
MD5:
SHA256:
292explorer.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019073020190731\index.datdat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
18
DNS requests
2
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2644
filename.exe
95.179.210.180:8156
dephantomz.duckdns.org
Cosmoline Telecommunication Services S.A.
GR
unknown

DNS requests

Domain
IP
Reputation
dephantomz.duckdns.org
  • 95.179.210.180
malicious

Threats

PID
Process
Class
Message
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info