| File name: | 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8 |
| Full analysis: | https://app.any.run/tasks/ad01c0c0-414c-4553-96e4-de2c4bcd5578 |
| Verdict: | Malicious activity |
| Threats: | Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions. |
| Analysis date: | November 22, 2024, 06:31:59 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections |
| MD5: | 782D1DF822EB3C2CE6B101242520F351 |
| SHA1: | C66F117C552E0AE6B2DEE10CE560630495735BE0 |
| SHA256: | 80071BA8E5E1D9CB06419AEA135F7C29DBCADC4F520E486A99D0789889C3A6A8 |
| SSDEEP: | 49152:H3zEnq2UwbvbScpJDcCDhcGJCk/ZLv7Xqbqlnbcrj2M7qeH2MY+efKURsPrk7tLJ:XYbvbbQel/4fUQMePAB/j |
| .exe | | | Win32 Executable (generic) (42.6) |
|---|---|---|
| .exe | | | Win16/32 Executable Delphi generic (19.5) |
| .exe | | | Generic Win/DOS Executable (18.9) |
| .exe | | | DOS Executable Generic (18.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:09:09 08:40:23+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 1286144 |
| InitializedDataSize: | 848384 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x13ae90 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 7.0.0.752 |
| ProductVersionNumber: | 7.0.0.752 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | IObit |
| FileDescription: | IObit Box |
| FileVersion: | 7.0.0.752 |
| InternalName: | - |
| LegalCopyright: | © IObit. All rights reserved. |
| LegalTrademarks: | IObit |
| OriginalFileName: | imsctadn.exe |
| ProductName: | IObit PC Secure |
| ProductVersion: | 7 |
| Comments: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1804 | "C:\Users\admin\Desktop\80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe" | C:\Users\admin\Desktop\80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | — | explorer.exe | |||||||||||
User: admin Company: IObit Integrity Level: MEDIUM Description: IObit Box Exit code: 3221226540 Version: 7.0.0.752 Modules
| |||||||||||||||
| 3816 | "C:\Users\admin\Desktop\80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe" | C:\Users\admin\Desktop\80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | explorer.exe | ||||||||||||
User: admin Company: IObit Integrity Level: HIGH Description: IObit Box Exit code: 0 Version: 7.0.0.752 Modules
| |||||||||||||||
| 5464 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system |
| Operation: | write | Name: | DisableTaskMgr |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system |
| Operation: | write | Name: | DisableRegistryTools |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusOverride |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusDisableNotify |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallDisableNotify |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallOverride |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UpdatesDisableNotify |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UacDisableNotify |
Value: 1 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | GlobalUserOffline |
Value: 0 | |||
| (PID) Process: | (3816) 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3816 | 80071ba8e5e1d9cb06419aea135f7c29dbcadc4f520e486a99d0789889c3a6a8.exe | C:\Windows\system.ini | binary | |
MD5:0C215EFBB7BE5E929F0DCDF210F3F8DB | SHA256:A92988E8FB771C57F5C9A0AA929D405BA82511DA5ED23A9DBC124D491FFCCD00 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2564 | RUXIMICS.exe | GET | 200 | 23.216.77.18:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4932 | svchost.exe | GET | 200 | 23.216.77.18:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.18:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2564 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4932 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4932 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2564 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 104.126.37.131:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.216.77.18:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4932 | svchost.exe | 23.216.77.18:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2564 | RUXIMICS.exe | 23.216.77.18:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |