| File name: | BUG32.exe |
| Full analysis: | https://app.any.run/tasks/17be68af-914c-4181-b4d3-85dfc9be03c7 |
| Verdict: | Malicious activity |
| Analysis date: | March 17, 2018, 17:22:51 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 149CC2EC1900CB778AFB50D8026EADF5 |
| SHA1: | A7BC1BBC7BDC970757EC369EF0B51DC53989F131 |
| SHA256: | 817A695E53A1D6E24F2C701751B4D18468F20698F30FADA420DFBA6E21A09797 |
| SSDEEP: | 49152:Or2U5IahDUGN97rkqOAackLjQ0rZEAh3oA6wHE+K60Kk0aCLkfAZKt0OJTcL:4H2ahFNNrg3QbQoA6wHEnFN4IJu |
| .exe | | | Win32 Executable MS Visual C++ (generic) (35) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (30.9) |
| .scr | | | Windows screen saver (14.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (7.3) |
| .exe | | | Win32 Executable (generic) (5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:05:04 09:30:05+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 49152 |
| InitializedDataSize: | 3142144 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 04-May-2016 07:30:05 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 04-May-2016 07:30:05 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.code | 0x00001000 | 0x000020C7 | 0x00002200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.43644 |
.text | 0x00004000 | 0x00009C1A | 0x00009E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.5668 |
.rdata | 0x0000E000 | 0x0000097E | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.60937 |
.data | 0x0000F000 | 0x00001784 | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.79557 |
.rsrc | 0x00011000 | 0x002FD224 | 0x002FD400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.24898 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.09999 | 668 | Latin 1 / Western European | UNKNOWN | RT_MANIFEST |
B | 5.2833 | 513 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
D | 3.46772 | 14 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
F | 7.24883 | 3131121 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
I | 4.85116 | 316 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
N | 3 | 8 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
O | 0.650022 | 6 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
COMCTL32.DLL |
GDI32.DLL |
KERNEL32.dll |
MSVCRT.dll |
OLE32.DLL |
SHELL32.DLL |
SHLWAPI.DLL |
USER32.DLL |
WINMM.DLL |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 616 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 616 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\CertificateTransparency\562\_platform_specific\all\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 640 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\ru\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 800 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake\0.10_0\_locales\ar\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 988 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1004 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\sv\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1264 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Mozilla\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1264 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\CertificateTransparency\562\_platform_specific\all\sths\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1696 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_locales\ro\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1808 | "C:\Windows\System32\cmd.exe" /c ren "C:\Users\admin\AppData\Local\Adobe\AcroCef\*.*" "*.exe" | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2640) BUG32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2640) BUG32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2848) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2848) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3564) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | Consentpromptbehavioradmin |
Value: 0 | |||
| (PID) Process: | (3564) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3564) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3336) wmplayer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3336) wmplayer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2104) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\914C.vbs | text | |
MD5:739EFD2B7B9737D3D191E9FC5B983824 | SHA256:1B51EF43C6E66683199C084B53B5B13D39A02EA6A94CA5F7293C7D68BA362583 | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\bx.cur | image | |
MD5:664A5626D7F9F5B991976B7C2FCD6176 | SHA256:691BBBAD6B1D9B7C010CF63976E55E9C2B06EC0E9B29A7F16D8CF3B28E408CF8 | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\emptyone.vbs | text | |
MD5:9DBBDC7D01EA45C41F089D9C345B8100 | SHA256:9A3CFE496CF2C6B1EFCBA29320353194B3974EBEB49CADCBF83A72745C50FEF6 | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\ad.exe | executable | |
MD5:7999F942FF7190CB7C9F0E04D6DC3D41 | SHA256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776 | |||
| 3564 | wscript.exe | C:\BUG32\admin.vbs | text | |
MD5:052BC547687F4B9136A4D21CCB9BE339 | SHA256:2B1C03EC095BAA8004183D2D9DC2A42D012C22969EE9923215CF73982E4BB122 | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\jaq.vbs | text | |
MD5:E77AAD670E295B9849A0D3D4F8501EC2 | SHA256:C1FFAC115387D943660D11ACEA27A06A920F505A0F3142969C25C9FA2E830B6F | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\icon.ico | image | |
MD5:E22AB01202357460EEC9871C74E6212B | SHA256:1BD0DBDBE78D8218968CF3D5F203ABF52824870A39610C505E8FBA695FD329BB | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\msc.wav | wav | |
MD5:77BB6C1E12D47EFF938D2EFB28E7FB9D | SHA256:926E24D85E847789A62F8AE3DAE7AF494FF329893A9A3C133B073B4B9CDDBCCB | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\jsc.exe | executable | |
MD5:367B7179319F010F84B37ACFC65082BA | SHA256:035CC52A0ABB363A463E21787DC061A3B42376BA0B082BC9C2D7E2399365862F | |||
| 2640 | BUG32.exe | C:\Users\admin\AppData\Local\Temp\913C.tmp\BUG32\kill.bat | text | |
MD5:9E116F6EB010B8BFF3211210E5B979FE | SHA256:CDEABD549E74E525E1BAAD3252246209667967399563F8BE2B3275C8C276FC3E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAi4elAbvpzaLRZNPjlRv1U%3D | US | der | 471 b | whitelisted |
— | — | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAtqs7A%2Bsan2xGCSaqjN%2FrM%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 52.114.76.34:443 | mobile.pipe.aria.microsoft.com | Microsoft Corporation | IE | whitelisted |
— | — | 23.101.158.111:443 | a.config.skype.com | Microsoft Corporation | US | whitelisted |
— | — | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
a.config.skype.com |
| whitelisted |
mobile.pipe.aria.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |