URL:

https://dl.clubic.com/generate/cPkqFasOIg4IHKTE2spAXw/5e03541b/soft/logiciel/jdownloader_2_fr_275252.rar

Full analysis: https://app.any.run/tasks/f01b77c1-eed0-422b-bf32-8d4b8cc69141
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 08, 2020, 16:37:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

516BC1F330B83FEA5D270AE72410362A

SHA1:

E7F959703F18658D4899A2CA1B2372AF034A4116

SHA256:

8014FFF1909CCC8531C5FEA34AFC353D7B5963EA4820EF0B318165F268C4DADE

SSDEEP:

3:N8RaQHMG1LyYtU4WqtMnQA89HN8KE+7dX6X+XLX+:2lsAymWqtMe9+K6+bO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Install JDownloader.exe (PID: 2308)
      • 132229751100435000.exe (PID: 3156)
    • Application was dropped or rewritten from another process

      • Install JDownloader.exe (PID: 2308)
      • Install JDownloader.exe (PID: 2992)
      • nsE790.tmp (PID: 956)
      • 132229751100435000.exe (PID: 3156)
      • nsE5CA.tmp (PID: 2552)
      • 13222975111543500017.exe (PID: 1576)
    • Downloads executable files from the Internet

      • Install JDownloader.exe (PID: 2308)
      • 132229751100435000.exe (PID: 3156)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3000)
      • 132229751100435000.exe (PID: 3156)
      • Install JDownloader.exe (PID: 2308)
    • Uses WMIC.EXE to obtain a list of AntiViruses

      • nsE790.tmp (PID: 956)
      • nsE5CA.tmp (PID: 2552)
    • Starts application with an unusual extension

      • 132229751100435000.exe (PID: 3156)
    • Uses WMIC.EXE to obtain a system information

      • nsE5CA.tmp (PID: 2552)
      • nsE790.tmp (PID: 956)
    • Reads Environment values

      • 13222975111543500017.exe (PID: 1576)
    • Creates files in the program directory

      • 13222975111543500017.exe (PID: 1576)
    • Reads internet explorer settings

      • 13222975111543500017.exe (PID: 1576)
    • Uses RUNDLL32.EXE to load library

      • 13222975111543500017.exe (PID: 1576)
    • Creates files in the user directory

      • 13222975111543500017.exe (PID: 1576)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2416)
    • Application launched itself

      • iexplore.exe (PID: 2416)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2416)
      • iexplore.exe (PID: 3576)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
12
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe winrar.exe install jdownloader.exe no specs install jdownloader.exe 132229751100435000.exe nse5ca.tmp no specs wmic.exe no specs nse790.tmp no specs wmic.exe no specs 13222975111543500017.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
956"C:\Users\admin\AppData\Local\Temp\nsnE5C9.tmp\nsE790.tmp" wmic /NAMESPACE:\\root\SecurityCenter2 path AntiVirusProduct get displayNameC:\Users\admin\AppData\Local\Temp\nsnE5C9.tmp\nsE790.tmp132229751100435000.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsne5c9.tmp\nse790.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1576C:\Users\admin\AppData\Local\Temp\13222975111543500017.exeC:\Users\admin\AppData\Local\Temp\13222975111543500017.exe
132229751100435000.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Poheleta Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\13222975111543500017.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1584wmic /NAMESPACE:\\root\SecurityCenter2 path AntiVirusProduct get displayNameC:\Windows\System32\Wbem\wmic.exensE790.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2104"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\in0DB19A7D\607AB4F5_stp.datC:\Windows\system32\rundll32.exe13222975111543500017.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2308"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.994\Install JDownloader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.994\Install JDownloader.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3000.994\install jdownloader.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2416"C:\Program Files\Internet Explorer\iexplore.exe" "https://dl.clubic.com/generate/cPkqFasOIg4IHKTE2spAXw/5e03541b/soft/logiciel/jdownloader_2_fr_275252.rar"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2552"C:\Users\admin\AppData\Local\Temp\nsnE5C9.tmp\nsE5CA.tmp" wmic /NAMESPACE:\\root\SecurityCenter path AntiVirusProduct get displayNameC:\Users\admin\AppData\Local\Temp\nsnE5C9.tmp\nsE5CA.tmp132229751100435000.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsne5c9.tmp\nse5ca.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2992"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.994\Install JDownloader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.994\Install JDownloader.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3000.994\install jdownloader.exe
c:\systemroot\system32\ntdll.dll
3000"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U09UY1ET\jdownloader_2_fr_275252[1].rar"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3096wmic /NAMESPACE:\\root\SecurityCenter path AntiVirusProduct get displayNameC:\Windows\System32\Wbem\wmic.exensE5CA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
2 355
Read events
2 211
Write events
141
Delete events
3

Modification events

(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{43889E09-3235-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E407010003000800100026000E00A603
Executable files
11
Suspicious files
6
Text files
60
Unknown types
4

Dropped files

PID
Process
Filename
Type
2416iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2416iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2416iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF420829A3351D55E5.TMP
MD5:
SHA256:
2416iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF23CD31824EFF144D.TMP
MD5:
SHA256:
2416iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{43889E09-3235-11EA-AB41-5254004A04AF}.dat
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012020010820200109\index.datdat
MD5:
SHA256:
3156132229751100435000.exeC:\Users\admin\AppData\Local\Temp\nsnE5C9.tmp\nsE790.tmp
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U09UY1ET\jdownloader_2_fr_275252[1].rarcompressed
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.logtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
7
DNS requests
40
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3156
132229751100435000.exe
GET
302
85.131.130.148:80
http://installer.jdownloader.org/rand_13222975111543500017/2434/1/windows/32/__/0/jdownloader2
DE
malicious
2308
Install JDownloader.exe
GET
200
85.131.130.148:80
http://installer.jdownloader.org/wb132229751100435000two
DE
executable
77.8 Kb
malicious
3156
132229751100435000.exe
GET
200
148.251.68.18:80
http://fetch.jdcdn.org/download/dl/forward?rand_13222975111543500017/2434/1/windows/32/__/0/jdownloader2
DE
executable
2.54 Mb
suspicious
2416
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1576
13222975111543500017.exe
HEAD
85.131.130.148:80
http://installer.jdownloader.org/version_821/ic/JD2SilentSetup_x86.exe
DE
malicious
1576
13222975111543500017.exe
GET
200
85.131.130.148:80
http://installer.jdownloader.org/version_821/ic/JD2SilentSetup_x86.exe
DE
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3576
iexplore.exe
5.196.86.124:443
dl.clubic.com
OVH SAS
FR
suspicious
2308
Install JDownloader.exe
85.131.130.148:80
installer.jdownloader.org
Link11 GmbH
DE
suspicious
2416
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3156
132229751100435000.exe
85.131.130.148:80
installer.jdownloader.org
Link11 GmbH
DE
suspicious
3156
132229751100435000.exe
148.251.68.18:80
fetch.jdcdn.org
Hetzner Online GmbH
DE
suspicious
1576
13222975111543500017.exe
85.131.130.148:80
installer.jdownloader.org
Link11 GmbH
DE
suspicious
85.131.130.148:80
installer.jdownloader.org
Link11 GmbH
DE
suspicious

DNS requests

Domain
IP
Reputation
dl.clubic.com
  • 5.196.86.124
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
installer.jdownloader.org
  • 85.131.130.148
malicious
fetch.jdcdn.org
  • 148.251.68.18
suspicious
dev.henomi-tonoc.com
malicious
vpn.henomi-tonoc.com
malicious
bbs.henomi-tonoc.com
unknown

Threats

PID
Process
Class
Message
2308
Install JDownloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2308
Install JDownloader.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3156
132229751100435000.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3156
132229751100435000.exe
Misc activity
ET INFO EXE - Served Inline HTTP
3156
132229751100435000.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2 ETPRO signatures available at the full report
No debug info