analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

6ai

Full analysis: https://app.any.run/tasks/b8d3fb9b-20c3-4a43-bbe2-527168753cdb
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: December 06, 2018, 09:12:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
emotet
feodo
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

590C02FFAD5A2D4D96D521C1119FFB35

SHA1:

A3B08B2499DC67FB27FD4C70AC0F632202AACF47

SHA256:

7FD3358F59A75D9980045E27F2D4A703EC12D5C035FF99CE9A2B06767BBC1580

SSDEEP:

3072:SATyhYC8Kqmeos4igbNpjeP7HPb3dLq/DlMJLduPudezd4Hwps:SATy9N3BiGPyP7HDtLqblMJLdau0zd4K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • archivesymbol.exe (PID: 3908)
    • EMOTET was detected

      • archivesymbol.exe (PID: 3908)
    • Changes the autorun value in the registry

      • archivesymbol.exe (PID: 3908)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 6ai.exe (PID: 1960)
    • Starts itself from another location

      • 6ai.exe (PID: 1960)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3808)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2360)
    • Changes internet zones settings

      • iexplore.exe (PID: 3808)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

ProductName: Micros
OriginalFileName: -
LegalTrademarks: Mozilla, Netscape
InternalName: kbdla (3.13)
ProductVersion: 1.4: 2003062408
FileVersion: 6.1.7600.16385
FileDescription: -
CompanyName: Mozilla, Netscape
LegalCopyright: License: MPL 1.1/GPL 2.0/LGPL 2.1
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Dynamic link library
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.4.0.0
FileVersionNumber: 1.4.20030.62408
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 1
OSVersion: 5
EntryPoint: 0x73a9
UninitializedDataSize: -
InitializedDataSize: 131072
CodeSize: 36864
LinkerVersion: 12
PEType: PE32
TimeStamp: 2018:12:06 09:30:18+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 06-Dec-2018 08:30:18

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 9
Time date stamp: 06-Dec-2018 08:30:18
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x0000D000
0x000003FA
0x00001000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_NO_PAD
1.59008
.data
0x0000A000
0x00002F80
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.9907
.crt0
0x0000E000
0x00003003
0x00004000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.30646
x7R
0x00012000
0x000028A8
0x00003000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.89771
W
0x00015000
0x000050AD
0x00006000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.30433
hJFZn6
0x0001B000
0x000056C3
0x00006000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.6547
js
0x00021000
0x0000721F
0x00008000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.59593
.rsrc
0x00029000
0x00000390
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.959738

Imports

CRYPT32.dll
GDI32.dll
KERNEL32.dll
LZ32.dll
SETUPAPI.dll
SHLWAPI.dll
Secur32.dll
USER32.dll
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start 6ai.exe no specs 6ai.exe archivesymbol.exe no specs #EMOTET archivesymbol.exe iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3516"C:\Users\admin\AppData\Local\Temp\6ai.exe" C:\Users\admin\AppData\Local\Temp\6ai.exeexplorer.exe
User:
admin
Company:
Mozilla, Netscape
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385
1960"C:\Users\admin\AppData\Local\Temp\6ai.exe"C:\Users\admin\AppData\Local\Temp\6ai.exe
6ai.exe
User:
admin
Company:
Mozilla, Netscape
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385
3288"C:\Users\admin\AppData\Local\archivesymbol\archivesymbol.exe"C:\Users\admin\AppData\Local\archivesymbol\archivesymbol.exe6ai.exe
User:
admin
Company:
Mozilla, Netscape
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385
3908"C:\Users\admin\AppData\Local\archivesymbol\archivesymbol.exe"C:\Users\admin\AppData\Local\archivesymbol\archivesymbol.exe
archivesymbol.exe
User:
admin
Company:
Mozilla, Netscape
Integrity Level:
MEDIUM
Version:
6.1.7600.16385
3808"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2360"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3808 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
400
Read events
340
Write events
60
Delete events
0

Modification events

(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{2E6638B1-F937-11E8-834A-5254004A04AF}
Value:
0
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(3808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070C000400060009000D001800AA01
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3808iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
3808iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
19606ai.exeC:\Users\admin\AppData\Local\archivesymbol\archivesymbol.exeexecutable
MD5:590C02FFAD5A2D4D96D521C1119FFB35
SHA256:7FD3358F59A75D9980045E27F2D4A703EC12D5C035FF99CE9A2B06767BBC1580
3808iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].pngimage
MD5:9FB559A691078558E77D6848202F6541
SHA256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3908
archivesymbol.exe
GET
114.55.106.210:443
http://114.55.106.210:443/
CN
malicious
3908
archivesymbol.exe
GET
200
54.39.179.152:80
http://54.39.179.152/
FR
binary
132 b
malicious
3808
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3808
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3908
archivesymbol.exe
114.55.106.210:443
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious
3908
archivesymbol.exe
54.39.179.152:80
OVH SAS
FR
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
3908
archivesymbol.exe
A Network Trojan was detected
SC SPYWARE Spyware Emotet Win32
3908
archivesymbol.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo HTTP request
3908
archivesymbol.exe
A Network Trojan was detected
SC SPYWARE Spyware Emotet Win32
3908
archivesymbol.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo HTTP request
2 ETPRO signatures available at the full report
No debug info