File name:

LaunchPad.exe

Full analysis: https://app.any.run/tasks/b1e78f1e-188a-41aa-bb95-20a145830fe7
Verdict: Malicious activity
Analysis date: November 25, 2020, 09:35:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

106BBD1995696BEAB6B3D8FE522FE706

SHA1:

03BD5A846C648F9EA930DC607A9FA4A9C743129D

SHA256:

8445780E501DD62F2E7802176A93FB551FC325516A9370B0CC343C5508566B19

SSDEEP:

98304:/8I49/1+P6XUMANeHb74jgJ/4b5X+rjo/x14pL+J00:/Z4996sKS/40w5Xp14t+J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • LaunchPad.exe (PID: 700)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • LaunchPad.exe (PID: 700)
    • Drops a file with too old compile date

      • LaunchPad.exe (PID: 700)
    • Drops a file that was compiled in debug mode

      • LaunchPad.exe (PID: 700)
    • Creates files in the user directory

      • LaunchPad.exe (PID: 700)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:16 20:43:49+01:00
PEType: PE32
LinkerVersion: 7.1
CodeSize: 255488
InitializedDataSize: 374272
UninitializedDataSize: -
EntryPoint: 0x35959
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Dec-2009 19:43:49
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 16-Dec-2009 19:43:49
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0003E57F
0x0003E600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.24162
.rdata
0x00040000
0x00014EDA
0x00015000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.00403
.data
0x00055000
0x0002F3F8
0x00029E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.80487
mProject\x08\x08
0x00085000
0x00000808
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_WRITE
0.016818
.rsrc
0x00086000
0x00019F8E
0x0001A000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.52347

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.49381
2216
UNKNOWN
UNKNOWN
RT_ICON
2
3.5928
1384
UNKNOWN
UNKNOWN
RT_ICON
3
3.97958
3752
UNKNOWN
UNKNOWN
RT_ICON
4
4.36199
1128
UNKNOWN
English - United States
RT_ICON
107
2.54942
48
UNKNOWN
UNKNOWN
RT_GROUP_ICON
109
1.79879
16
UNKNOWN
UNKNOWN
RT_ACCELERATOR
129
2.76799
82936
UNKNOWN
English - United States
RT_BITMAP

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
RPCRT4.dll
SHELL32.dll
USER32.dll
VERSION.dll
WININET.dll
WS2_32.dll

Exports

Title
Ordinal
Address
mApplication_FunctionTable
1
0x0007C370
mComponent_FunctionTable
2
0x0007C8A0
mFTP_FunctionTable
3
0x0007CD90
mFile_FunctionTable
4
0x0007C9E0
mMenu_FunctionTable
5
0x0007D128
mRegistry_FunctionTable
6
0x0007D358
mSystem_FunctionTable
7
0x0007D4D8
mWindow_FunctionTable
8
0x0007DBF0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start launchpad.exe

Process information

PID
CMD
Path
Indicators
Parent process
700"C:\Users\admin\AppData\Local\Temp\LaunchPad.exe" C:\Users\admin\AppData\Local\Temp\LaunchPad.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\launchpad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-ole32-l1-1-0.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
Total events
43
Read events
43
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
16

Dropped files

PID
Process
Filename
Type
700LaunchPad.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
MD5:
SHA256:
700LaunchPad.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.solsol
MD5:
SHA256:
700LaunchPad.exeC:\Users\admin\AppData\Roaming\LaunchPad\temp_95AAAF7A\flash.10.0.32.18.ocxexecutable
MD5:43C6ACDFB92A18C3E516E6BD5F1ACD51
SHA256:E87AEC8F4FD23C6E2BE44B504804E011154B80DCDE5CBF9888D4660B0436A889
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info