| File name: | frostwire-6.13.2.windows.exe |
| Full analysis: | https://app.any.run/tasks/e4454704-a637-453c-8f90-e0bf665b1304 |
| Verdict: | Malicious activity |
| Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
| Analysis date: | August 30, 2024, 12:59:59 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | BD352ADA33C61CEB9DB09D3601B302BC |
| SHA1: | 2ECE05E008ECA40C17172AE72B5C0D29F81B664B |
| SHA256: | 887C5AF40BA3A354696EE0BE278D482BDCA6A262E3A0520BB32368CA17AC5357 |
| SSDEEP: | 98304:d+QqZ8f9adP3sBI6IauBPDZONh4DkLmDYfuXqGQoHbHL7WdY5J18sFbtm/PXLdGV:rrAnyi |
| .exe | | | Inno Setup installer (67.7) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (25.6) |
| .exe | | | Win32 Executable (generic) (2.7) |
| .exe | | | Win16/32 Executable Delphi generic (1.2) |
| .exe | | | Generic Win/DOS Executable (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:11:15 09:48:30+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 741376 |
| InitializedDataSize: | 183296 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb5eec |
| OSVersion: | 6.1 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 6.13.2.0 |
| ProductVersionNumber: | 6.13.2.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | Frostwire Installer |
| FileVersion: | 6.13.2 |
| LegalCopyright: | © Frostwire |
| OriginalFileName: | |
| ProductName: | Frostwire |
| ProductVersion: | 6.13.2 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 208 | "C:\WINDOWS\system32\runonce.exe" -r | C:\Windows\System32\runonce.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Run Once Wrapper Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 488 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 780 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | rsClientSvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1064 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | "C:\Users\admin\AppData\Local\Temp\frostwire-6.13.2.windows.exe" | C:\Users\admin\AppData\Local\Temp\frostwire-6.13.2.windows.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Frostwire Installer Exit code: 3221226525 Version: 6.13.2 Modules
| |||||||||||||||
| 1172 | "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2316 --field-trial-handle=1780,i,4246807896506585022,5789366815264684985,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1 | C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe | — | rsAppUI.exe | |||||||||||
User: admin Company: Reason Cybersecurity Ltd. Integrity Level: LOW Description: ReasonLabs Application Version: 1.4.2 Modules
| |||||||||||||||
| 1280 | "C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe" | C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Reason Cybersecurity Ltd. Integrity Level: SYSTEM Description: Reason EDR Service Version: 2.2.0 Modules
| |||||||||||||||
| 1288 | "C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\frostwire-6.13.2.windows.exe" /S | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\frostwire-6.13.2.windows.exe | frostwire-6.13.2.windows.tmp | ||||||||||||
User: admin Company: FrostWire LLC Integrity Level: HIGH Description: FrostWire - Search, Download, Play, Share. Exit code: 0 Version: 6.13.1.321 Modules
| |||||||||||||||
| 1288 | "C:\WINDOWS\system32\runonce.exe" -r | C:\Windows\System32\runonce.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Run Once Wrapper Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1448 | "C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe" | C:\Program Files\ReasonLabs\DNS\rsDNSSvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Reason Software Company Inc. Integrity Level: SYSTEM Description: rsDNSSvc Version: 3.15.0.0 Modules
| |||||||||||||||
| (PID) Process: | (7052) frostwire-6.13.2.windows.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: 8C1B0000E9DE0F8ADCFADA01 | |||
| (PID) Process: | (7052) frostwire-6.13.2.windows.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: 4EB47F2E75EE03CDE99255A611F7A07751A7E65ABF92FA212C9E3D8FE15CFC17 | |||
| (PID) Process: | (7052) frostwire-6.13.2.windows.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1288) frostwire-6.13.2.windows.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\is-CIG83.tmp | — | |
MD5:— | SHA256:— | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\frostwire-6.13.2.windows.exe | — | |
MD5:— | SHA256:— | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\finish.png | image | |
MD5:D317489166A62CD09E017685085BCC45 | SHA256:2681A3A584B983B5497D7B5D082F779AB40F35B55B97F297A4F93C87C483A34A | |||
| 1076 | frostwire-6.13.2.windows.exe | C:\Users\admin\AppData\Local\Temp\is-K28I0.tmp\frostwire-6.13.2.windows.tmp | executable | |
MD5:F2715A9E9A8BAE265B65108B9F823C4B | SHA256:98F0A2BBE10EE11749C9EE6E6B8A222E3FAC7121B9113053124C1EF6D39E21D5 | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\is-I90QM.tmp | image | |
MD5:CD09F361286D1AD2622BA8A57B7613BD | SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8 | |||
| 5140 | frostwire-6.13.2.windows.exe | C:\Users\admin\AppData\Local\Temp\is-KOQGJ.tmp\frostwire-6.13.2.windows.tmp | executable | |
MD5:F2715A9E9A8BAE265B65108B9F823C4B | SHA256:98F0A2BBE10EE11749C9EE6E6B8A222E3FAC7121B9113053124C1EF6D39E21D5 | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\error.png | image | |
MD5:DECD851D87B1FB968A15C6728B8BCC83 | SHA256:67033B3B605C445543AC6E8D40F4B58EF7C5F22A63CDDAD7D4AF61D9538D3F16 | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\RAV_Cross.png | image | |
MD5:CD09F361286D1AD2622BA8A57B7613BD | SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8 | |||
| 7052 | frostwire-6.13.2.windows.tmp | C:\Users\admin\AppData\Local\Temp\is-VC5JL.tmp\zbShieldUtils.dll | executable | |
MD5:B83F5833E96C2EB13F14DCCA805D51A1 | SHA256:00E667B838A4125C8CF847936168BB77BB54580BC05669330CB32C0377C4A401 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1764 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6368 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6368 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1288 | frostwire-6.13.2.windows.exe | GET | 404 | 54.172.26.106:80 | http://logs.frostwire.com/ctr/?fwversion=6.13.1.321&id=97486673&state=update&fpc=-1 | unknown | — | — | whitelisted |
7160 | UnifiedStub-installer.exe | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBTOQYLFSE5GO%2FpaRVfYu7d9gZEbQAQU2UEpsA8PY2zvadf1zSmepEhqMOYCEzMAAAAEllBL0tvuy4gAAAAAAAQ%3D | unknown | — | — | whitelisted |
1288 | frostwire-6.13.2.windows.exe | GET | 404 | 54.172.26.106:80 | http://logs.frostwire.com/ctr/?fwversion=6.13.1.321&id=97486673&state=start&fpc=-1 | unknown | — | — | whitelisted |
1288 | frostwire-6.13.2.windows.exe | GET | 404 | 54.172.26.106:80 | http://logs.frostwire.com/ctr/?fwversion=6.13.1.321&id=97486673&state=success&fpc=-1 | unknown | — | — | whitelisted |
7160 | UnifiedStub-installer.exe | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBTDHsfuqfubd3pihvq4mgQVWgHWNwQUyH7SaoUqG8oZmAQHJ89QEE9oqKICEzMAAAAHh6M0o3uljhwAAAAAAAc%3D | unknown | — | — | whitelisted |
7160 | UnifiedStub-installer.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ID%20Verified%20CS%20AOC%20CA%2002.crl | unknown | — | — | whitelisted |
7160 | UnifiedStub-installer.exe | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ0NE46krjtIffEj0l00lckKsLufgQUJEWZoXeQKnzDyoOwbmQWhCr4LGcCEzMAAVks49Nwjyk%2BFSMAAAABWSw%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7072 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6276 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7052 | frostwire-6.13.2.windows.tmp | 52.222.232.188:443 | d35suiogz1ybp7.cloudfront.net | AMAZON-02 | US | whitelisted |
7072 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3260 | svchost.exe | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1764 | svchost.exe | 20.190.159.64:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1764 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
6368 | SIHClient.exe | 40.127.169.103:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
d35suiogz1ybp7.cloudfront.net |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
shield.reasonsecurity.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1288 | frostwire-6.13.2.windows.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
1288 | frostwire-6.13.2.windows.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
1288 | frostwire-6.13.2.windows.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
4364 | FrostWire.exe | Potential Corporate Privacy Violation | ET P2P BitTorrent DHT ping request |
Process | Message |
|---|---|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | ED255D9151912E40DF048A56288E969A8D0DAFA3
|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | VerifyLibrary: error while getting certificate informations
|
rsEngineSvc.exe | Native library pre-loader is trying to load native SQLite library "C:\Program Files\ReasonLabs\EPP\x64\SQLite.Interop.dll"...
|
rsEDRSvc.exe | Native library pre-loader is trying to load native SQLite library "C:\Program Files\ReasonLabs\EDR\x64\SQLite.Interop.dll"...
|