File name: | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe |
Full analysis: | https://app.any.run/tasks/9eb0fbce-5326-41d4-b450-09b46651771c |
Verdict: | Malicious activity |
Analysis date: | June 27, 2022, 13:20:50 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 5264B14F0E7D1E03EFF10964221DBFE4 |
SHA1: | F6AE2269FD8F70F6724EA0735F6F1E54848D302C |
SHA256: | 8E36FB86B83792A426E9F420A65F0689C2595F4A8C97307BA7917EE453074416 |
SSDEEP: | 6144:+2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:+2TFafJiHCWBWPMjVWrXf1v |
.exe | | | Generic Win/DOS Executable (50) |
---|---|---|
.exe | | | DOS Executable Generic (49.9) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 5.1 |
ImageVersion: | - |
OSVersion: | 5.1 |
EntryPoint: | 0x23d3e |
UninitializedDataSize: | - |
InitializedDataSize: | 107008 |
CodeSize: | 227328 |
LinkerVersion: | 10 |
PEType: | PE32 |
TimeStamp: | 2013:10:31 12:53:49+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 31-Oct-2013 11:53:49 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000F8 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 5 |
Time date stamp: | 31-Oct-2013 11:53:49 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x000377A0 | 0x00037800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.68467 |
.rdata | 0x00039000 | 0x00007DCE | 0x00007E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.28854 |
.data | 0x00041000 | 0x00004CA4 | 0x00002C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.89597 |
.rsrc | 0x00046000 | 0x0000C5DC | 0x0000C600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.15524 |
.reloc | 0x00053000 | 0x000030B2 | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.60519 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.17423 | 3752 | Latin 1 / Western European | English - United States | RT_ICON |
IDI_APP | 2.01924 | 20 | Latin 1 / Western European | English - United States | RT_GROUP_ICON |
ADVAPI32.dll |
GDI32.dll |
IPHLPAPI.DLL |
KERNEL32.dll |
OLEAUT32.dll |
SHELL32.dll |
SHLWAPI.dll |
USER32.dll |
WININET.dll |
WINMM.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2548 | "C:\Users\admin\AppData\Local\Temp\8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe" | C:\Users\admin\AppData\Local\Temp\8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | Explorer.EXE | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2904 | "C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe" /START "C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe" | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe | — | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe |
User: admin Integrity Level: MEDIUM | ||||
2708 | "C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe" | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe | — | winit32.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\nthserv.img | binary | |
MD5:445A407C2CD4053A4A946986450B1C02 | SHA256:3190203C2E75D37AD633E304CD5ADFF36A484311F9247AF5E09F5867FC37F4BD | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe | executable | |
MD5:B097B72DE69C8641BFCA634728AEFF7A | SHA256:BD39464CFDEF67A0C053419447A04D662BB1FC55DEB1C83506F74249B01E8F6E | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\icxml\cygwin32.bin | binary | |
MD5:345D2FD9F442A4CDAC1B18243B40CF07 | SHA256:E46ECF12F53B526AA261BB157DC08E7FB9A7BC1ACF3EED263470F31C945613B1 | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\icxml\msys.bin | binary | |
MD5:14A52C60D1A354C5C9BCB7605F614BDF | SHA256:B2D66635961A3DB852256BC839CE434E44029E59C0EA60A5F701B3BF7152A5D1 | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\lust\srv_x86.exe | flc | |
MD5:8C52B503A362B4288DAD1903D30C88E0 | SHA256:BFFB8BDF4037850EC45DC4D06DCA46C24B27F1D851A03C99FE148EA800745658 | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\lust\msys.exe | binary | |
MD5:8845CEBCE92F4FA5CEE395826DA6C303 | SHA256:222980CECEA8E230DCAD6FD4658D1717AD62204ADCC11331EC04F8B6C86F33B7 | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\apds.dll | binary | |
MD5:561D1454703854B717A42C81B08A73E6 | SHA256:D71453B5E124F272A1DBBB1B9A5349EF07D0226750F047E42EC50A90EB94F56A | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\mdata.exe | binary | |
MD5:06E1CDFDFCB0774E7E41E5E0B5FCDF4C | SHA256:1D955D630AC99EE88CAB7C461B3F48D0635F862C44C572B7C435BEB90FCA757F | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\cygwin32.img | binary | |
MD5:F92F22C5169F3D8C9E832912AC3A9C9A | SHA256:36C87980EB86E83E2DD70B7CF03F3BEC62974EF64C3DE46579DB5CC060EF2F6D | |||
2548 | 8e36fb86b83792a426e9f420a65f0689c2595f4a8c97307ba7917ee453074416.exe | C:\Users\admin\AppData\Roaming\Microsoft\SysWOW_x86_64\apds.dmp | binary | |
MD5:718E9B6CF8CE1549D3C98D1C31BD2942 | SHA256:1DC6A34740DCC69ADF05D23155AD9B23DB25EAB8846472833992B388C7C2DD1F |
Domain | IP | Reputation |
---|---|---|
nwoccs.zapto.org |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.zapto .org |