File name:

Factura pdf 68354.exe

Full analysis: https://app.any.run/tasks/02c8114b-4058-40db-a07c-f800b236f438
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 03, 2020, 18:06:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
betabot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9798A492A46F32CF2074C09778BB28D1

SHA1:

44003A38D3BCFA4B4CE16AD318B578E0FAE823B0

SHA256:

87D5B045F713C7029D1E48326535CA5FD11868EC714B4FAB5B3871988F385DFE

SSDEEP:

12288:DlQ9ffDVR/sZ23z3DKV6ErXmRUQBRodMNI7XJuK1qn6MossG8t9gVPq8km7s/ma:W9ffDVZA2DC7XJ+6N6bR1Gma

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Detected BetaBot Trojan

      • Factura pdf 68354.exe (PID: 2748)
      • explorer.exe (PID: 2060)
      • 5119MO~1.EXE (PID: 1060)
    • Connects to CnC server

      • explorer.exe (PID: 2060)
    • Changes internet zones settings

      • explorer.exe (PID: 2060)
    • Changes Image File Execution Options

      • explorer.exe (PID: 2060)
    • UAC/LUA settings modification

      • regedit.exe (PID: 960)
    • Changes the autorun value in the registry

      • regedit.exe (PID: 960)
      • explorer.exe (PID: 2060)
    • Modifies Windows security services settings

      • regedit.exe (PID: 960)
    • Changes firewall settings

      • 5119MO~1.EXE (PID: 1060)
  • SUSPICIOUS

    • Creates files in the program directory

      • Factura pdf 68354.exe (PID: 2748)
      • 5119MO~1.EXE (PID: 1060)
    • Executable content was dropped or overwritten

      • Factura pdf 68354.exe (PID: 2748)
      • explorer.exe (PID: 2060)
    • Application launched itself

      • Factura pdf 68354.exe (PID: 2480)
    • Executed via COM

      • DllHost.exe (PID: 3088)
    • Drops a file that was compiled in debug mode

      • Factura pdf 68354.exe (PID: 2748)
      • explorer.exe (PID: 2060)
    • Drops a file with a compile date too recent

      • Factura pdf 68354.exe (PID: 2748)
      • explorer.exe (PID: 2060)
    • Searches for installed software

      • explorer.exe (PID: 2060)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 2060)
    • Starts itself from another location

      • 5119mou9ua_1.exe (PID: 2184)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:24 16:00:24+01:00
PEType: PE32
LinkerVersion: 7.1
CodeSize: 106496
InitializedDataSize: 65536
UninitializedDataSize: -
EntryPoint: 0x6d000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Nov-2020 15:00:24
Detected languages:
  • Russian - Russia
Debug artifacts:
  • y:\test4\e58\Release\e58.pdb

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x0006C280

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 24-Nov-2020 15:00:24
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x0006D000
0x000198AF
0x0001A000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
3.0218
.rdata
0x00087000
0x000001B1
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.707751
.data
0x00088000
0x0000A800
0x00000000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00093000
0x000031C0
0x00004000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.09415

Resources

Title
Entropy
Size
Codepage
Language
Type
1
0.960066
744
UNKNOWN
Russian - Russia
RT_ICON
2
1.22449
11432
UNKNOWN
Russian - Russia
RT_ICON
103
3.34205
230
UNKNOWN
Russian - Russia
RT_DIALOG
129
2.55094
34
UNKNOWN
Russian - Russia
RT_GROUP_ICON

Imports

KERNEL32.dll
OLEAUT32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
9
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start factura  pdf  68354.exe no specs #BETABOT factura  pdf  68354.exe #BETABOT explorer.exe Shell Security Editor no specs 5119mou9ua.exe cmd.exe 5119mou9ua_1.exe no specs #BETABOT 5119mo~1.exe no specs regedit.exe

Process information

PID
CMD
Path
Indicators
Parent process
736"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\5119MO~1.EXE" /uac "" ‮&CLS ‮&echo Fixing issues ...&ECHO Issues fixed! ‮&exitC:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
960"C:\Windows\regedit.exe"C:\Windows\regedit.exe
5119MO~1.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1060"C:\Users\admin\AppData\Local\Temp\5119MO~1.EXE" /uac "" ?C:\Users\admin\AppData\Local\Temp\5119MO~1.EXE
5119mou9ua_1.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\5119mou9ua_1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1900"C:\ProgramData\Google Updater 2.09\5119mou9ua.exe" /uac /ifeo "" "C:\Windows\system32\eudcedit.exe" C:\ProgramData\Google Updater 2.09\5119mou9ua.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\programdata\google updater 2.09\5119mou9ua.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2060C:\Windows\explorer.exeC:\Windows\explorer.exe
Factura pdf 68354.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2184"C:\Users\admin\AppData\Local\Temp\5119MO~1.EXE" /uac "" ‮C:\Users\admin\AppData\Local\Temp\5119mou9ua_1.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\5119mou9ua_1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2480"C:\Users\admin\AppData\Local\Temp\Factura pdf 68354.exe" C:\Users\admin\AppData\Local\Temp\Factura pdf 68354.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\factura pdf 68354.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2748"C:\Users\admin\AppData\Local\Temp\Factura pdf 68354.exe" C:\Users\admin\AppData\Local\Temp\Factura pdf 68354.exe
Factura pdf 68354.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\factura pdf 68354.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3088C:\Windows\system32\DllHost.exe /Processid:{4D111E08-CBF7-4F12-A926-2C7920AF52FC}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
436
Read events
267
Write events
168
Delete events
1

Modification events

(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Google Updater
Operation:writeName:LastUpdate
Value:
567A3D80F321CE31A589FFBD87660AA2
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:c5fe37ada5e2997fca
Value:
1200080003000C00E407080003000C00E407
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:fdaec9afecefbf2957
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:038856d0e9def4a7b
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:6ec9c7784f
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:29fc3064dc0
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:15f19918878d6e
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:1b79b7aaa854bd5
Value:
00000000
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:618df04397fb8f508a
Value:
383A00444BFABCD3D36AE14CE078B518B023E8FA
(PID) Process:(2748) Factura pdf 68354.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\{4A66219C-EF3D-D22D-B995-E3A19B7A16BE}\14FD1F9A\46a66dd5b340073ff9
Operation:writeName:7031ddc53ae02c857a
Value:
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
Executable files
2
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2060explorer.exeC:\Users\admin\AppData\Local\Temp\5119mou9ua_1.exeexecutable
MD5:
SHA256:
2060explorer.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiestext
MD5:
SHA256:
2748Factura pdf 68354.exeC:\ProgramData\Google Updater 2.09\5119mou9ua.exeexecutable
MD5:
SHA256:
2060explorer.exeC:\Users\admin\AppData\Local\Temp\5119mou9ua_1.exe:14EDFC78binary
MD5:DF108E9C42B3E9FC686EA496455DDCCA
SHA256:B6D6A7E37E23E7A65E964BC982979CEB94AB98A49FCCF77CB888388FAFA974EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
4
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2060
explorer.exe
POST
200
23.19.227.14:80
http://russk16.icu/foruma/logout.php?pid=193
US
ini
715 b
malicious
2060
explorer.exe
POST
200
23.19.227.14:80
http://russk16.icu/foruma/logout.php?pid=983
US
binary
109 b
malicious
2060
explorer.exe
POST
200
23.19.227.14:80
http://russk16.icu/foruma/logout.php
US
binary
109 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2060
explorer.exe
104.215.148.63:80
microsoft.com
Microsoft Corporation
SG
malicious
2060
explorer.exe
23.19.227.14:80
russk16.icu
Nobis Technology Group, LLC
US
malicious

DNS requests

Domain
IP
Reputation
microsoft.com
  • 104.215.148.63
  • 40.76.4.15
  • 40.112.72.205
  • 40.113.200.201
  • 13.77.161.179
whitelisted
russk16.icu
  • 23.19.227.14
malicious

Threats

PID
Process
Class
Message
1044
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
2060
explorer.exe
A Network Trojan was detected
ET TROJAN Win32/Neurevt.A/Betabot Check-in 4
2060
explorer.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.icu domain
2060
explorer.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.icu domain
2060
explorer.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.icu domain
2 ETPRO signatures available at the full report
No debug info