| File name: | VLC media player 64 Bit - CHIP-Installer.exe |
| Full analysis: | https://app.any.run/tasks/4898a59d-ee61-4228-b84d-996795fe5b46 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 17, 2020, 18:21:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | 22722279712CE6E7896AB7D5AB1E6710 |
| SHA1: | 674FB44A79609F40681B9A9896A566FE231FE221 |
| SHA256: | 8F4E34A4150B4EDFA357A6DC9D3E7F5D8632E9B84B7082E52FDF71EBDB997E31 |
| SSDEEP: | 24576:fq5TfcdHj4fmbpD2qY24Hywe4CaeRzs1Ay6z5R03+dT3yozyg0:fUTsam9xgHywe4C/s10dTy |
| .exe | | | Win64 Executable (generic) (30.7) |
|---|---|---|
| .exe | | | UPX compressed Win32 Executable (30.1) |
| .exe | | | Win32 EXE Yoda's Crypter (29.5) |
| .exe | | | Win32 Executable (generic) (5) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:12:12 13:13:10+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 344064 |
| InitializedDataSize: | 1007616 |
| UninitializedDataSize: | 1536000 |
| EntryPoint: | 0x1cb8d0 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.11.0.3 |
| ProductVersionNumber: | 2.11.0.3 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | German |
| CharacterSet: | Unicode |
| FileVersion: | 2.11.0.3 |
| Comments: | CHIP Secured Installer |
| FileDescription: | CHIP Secured Installer |
| ProductVersion: | 2.11.0.3 |
| LegalCopyright: | Copyright © 2020 Chip Digital GmbH |
| CompanyName: | CHIP Digital GmbH |
| InternalName: | CHIP Secured Installer |
| ProductName: | CHIP Secured Installer |
| OriginalFileName: | CHIP Secured Installer |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 12-Dec-2019 12:13:10 |
| Detected languages: |
|
| FileVersion: | 2.11.0.3 |
| Comments: | CHIP Secured Installer |
| FileDescription: | CHIP Secured Installer |
| ProductVersion: | 2.11.0.3 |
| LegalCopyright: | Copyright © 2020 Chip Digital GmbH |
| CompanyName: | CHIP Digital GmbH |
| InternalName: | CHIP Secured Installer |
| ProductName: | CHIP Secured Installer |
| OriginalFilename: | CHIP Secured Installer |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000108 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 12-Dec-2019 12:13:10 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
UPX0 | 0x00001000 | 0x00177000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
UPX1 | 0x00178000 | 0x00054000 | 0x00053C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.93599 |
.rsrc | 0x001CC000 | 0x000F6000 | 0x000F6000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.405 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.32366 | 1444 | Latin 1 / Western European | German - Germany | RT_MANIFEST |
4 | 3.75291 | 9640 | Latin 1 / Western European | English - United Kingdom | RT_ICON |
7 | 3.34702 | 1428 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
8 | 3.2817 | 1674 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
9 | 3.28849 | 1168 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
10 | 3.28373 | 1532 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
11 | 3.26322 | 1628 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
12 | 3.25812 | 1126 | Latin 1 / Western European | English - United Kingdom | RT_STRING |
99 | 2.0815 | 20 | Latin 1 / Western European | English - United Kingdom | RT_GROUP_ICON |
166 | 2.68292 | 80 | Latin 1 / Western European | English - United Kingdom | RT_MENU |
ADVAPI32.dll |
COMCTL32.dll |
COMDLG32.dll |
GDI32.dll |
IPHLPAPI.DLL |
KERNEL32.DLL |
MPR.dll |
OLEAUT32.dll |
PSAPI.DLL |
SHELL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 640 | "C:\Program Files\foxyspar\ff\instui.exe" /starter | C:\Program Files\foxyspar\ff\instui.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1044 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2140.0.1646253078\1185688958" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2140 "\\.\pipe\gecko-crash-server-pipe.2140" 1164 gpu | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 68.0.1 Modules
| |||||||||||||||
| 1244 | "C:\Users\admin\AppData\Local\Temp\VLC media player 64 Bit - CHIP-Installer.exe" | C:\Users\admin\AppData\Local\Temp\VLC media player 64 Bit - CHIP-Installer.exe | explorer.exe | ||||||||||||
User: admin Company: CHIP Digital GmbH Integrity Level: HIGH Description: CHIP Secured Installer Exit code: 0 Version: 2.11.0.3 Modules
| |||||||||||||||
| 1972 | "C:\Users\admin\AppData\Roaming\PService Software\PService.exe" | C:\Users\admin\AppData\Roaming\PService Software\PService.exe | — | PService.exe | |||||||||||
User: admin Company: Service Software Integrity Level: HIGH Description: Service Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2140 | "C:\Program Files\Mozilla Firefox\firefox.exe" -new-window "C:\Program Files\foxyspar\ff\foxyspar-1.0.1-fx.xpi" | C:\Program Files\Mozilla Firefox\firefox.exe | explorer.exe | ||||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 68.0.1 Modules
| |||||||||||||||
| 2372 | msiexec.exe /i https://www.foxyspar.com/update/FoxySpar.msi /qn | C:\Windows\system32\msiexec.exe | — | exec2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2816 | "C:\Users\admin\AppData\Local\Temp\VLC media player 64 Bit - CHIP-Installer.exe" | C:\Users\admin\AppData\Local\Temp\VLC media player 64 Bit - CHIP-Installer.exe | — | explorer.exe | |||||||||||
User: admin Company: CHIP Digital GmbH Integrity Level: MEDIUM Description: CHIP Secured Installer Exit code: 3221226540 Version: 2.11.0.3 Modules
| |||||||||||||||
| 2992 | "C:\Program Files\Mozilla Firefox\firefox.exe" -new-window "C:\Program Files\foxyspar\ff\foxyspar-1.0.1-fx.xpi" | C:\Program Files\Mozilla Firefox\firefox.exe | — | instui.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: HIGH Description: Firefox Exit code: 0 Version: 68.0.1 Modules
| |||||||||||||||
| 3180 | "C:\Program Files\foxyspar\ff\instui.exe" /install /url=? /preurl=? /uinsturl=? /waitforenterprise=0 /forceenterprise=0 /tag=? | C:\Program Files\foxyspar\ff\instui.exe | msiexec.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3804 | "C:\Program Files\foxyspar\ff\PService.exe" 366764160.2E4082848754494F979D9D5A92E3ECF3EDF0E1F8B4EFFBFF034C3F5353555B5E4F5720AAA2B0 366764160.4E5D666D676A5B72 | C:\Program Files\foxyspar\ff\PService.exe | instui.exe | ||||||||||||
User: admin Company: Service Software Integrity Level: HIGH Description: Service Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (1244) VLC media player 64 Bit - CHIP-Installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1244) VLC media player 64 Bit - CHIP-Installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_CURRENT_USER\Software\OCS |
| Operation: | write | Name: | CID |
Value: 37291874-0c3d-4cbf-b508-bcd5860d91ab | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_CURRENT_USER\Software\OCS |
| Operation: | write | Name: | PID |
Value: chipderedesign | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_CURRENT_USER\Software\OCS |
| Operation: | write | Name: | lastPID |
Value: chipderedesign | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (4036) dmr_72.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Cab26C7.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Tar26C8.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Cab26D9.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Tar26DA.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Cab2777.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Temp\Tar2778.tmp | — | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 | binary | |
MD5:— | SHA256:— | |||
| 1244 | VLC media player 64 Bit - CHIP-Installer.exe | C:\Users\admin\AppData\Local\Temp\DMR\nzshgzuyvfaflitk.dat | text | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\progress[1].php | htm | |
MD5:— | SHA256:— | |||
| 4036 | dmr_72.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\main[1].css | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/jquery.js | DE | text | 102 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/jquery.corner.js | DE | text | 94 b | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/main.css?v=1461939270 | DE | text | 6.02 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/img/background%20progressad.gif | DE | image | 1.81 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/geoip/geoip.php?ip=39392e3233392e32372e3334&givezip=true | DE | text | 7 b | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/MarselisSlabWeb.eot?&1440165143 | DE | eot | 61.7 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/main.js?v=12 | DE | text | 8.74 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/img/bg-icon-speedometer.png | DE | image | 5.35 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/track/uac.php?clientid=37291874-0c3d-4cbf-b508-bcd5860d91ab&cid=54504926&pid=chipderedesign&source=BLUB2&setupid=1348fada33d34b9486c1f60742a1a7b9&langcountry=en-US&state=WithoutUAC | DE | binary | 124 Kb | malicious |
4036 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/img/kasper-progresspg-ongrey-en.gif | DE | image | 2.30 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4036 | dmr_72.exe | 148.251.213.132:80 | api2.chip-secured-download.de | Hetzner Online GmbH | DE | malicious |
4036 | dmr_72.exe | 13.226.162.2:443 | chip-installer.burda-tagging.com | — | US | unknown |
4036 | dmr_72.exe | 176.9.97.245:80 | static.chip-secured-download.de | Hetzner Online GmbH | DE | suspicious |
4036 | dmr_72.exe | 172.217.22.6:443 | ad.doubleclick.net | Google Inc. | US | whitelisted |
4036 | dmr_72.exe | 2.16.186.26:80 | dl.cdn.chip.de | Akamai International B.V. | — | whitelisted |
4036 | dmr_72.exe | 2.16.181.41:443 | downloaderapi.chip.de | Akamai International B.V. | — | whitelisted |
4036 | dmr_72.exe | 2.16.181.41:80 | downloaderapi.chip.de | Akamai International B.V. | — | whitelisted |
4036 | dmr_72.exe | 104.99.233.105:443 | bits.avcdn.net | Akamai Technologies, Inc. | US | unknown |
4024 | msiexec.exe | 63.34.125.24:443 | www.foxyspar.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | unknown |
— | — | 205.185.216.42:80 | www.download.windowsupdate.com | Highwinds Network Group, Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
api2.chip-secured-download.de |
| unknown |
ocs3.chdi-server.de |
| unknown |
chip-installer.burda-tagging.com |
| whitelisted |
x.ss2.us |
| whitelisted |
www.download.windowsupdate.com |
| whitelisted |
static.chip-secured-download.de |
| suspicious |
ad.doubleclick.net |
| whitelisted |
downloaderapi.chip.de |
| whitelisted |
bits.avcdn.net |
| whitelisted |
dl.cdn.chip.de |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4036 | dmr_72.exe | A Network Trojan was detected | MALWARE [PTsecurity] DownloadSponsor inbound artifact m1 |
4036 | dmr_72.exe | A Network Trojan was detected | MALWARE [PTsecurity] DownloadSponsor inbound artifact m1 |
4036 | dmr_72.exe | A Network Trojan was detected | MALWARE [PTsecurity] DownloadSponsor img_welcome PNG artifact |
4036 | dmr_72.exe | A Network Trojan was detected | MALWARE [PTsecurity] DownloadSponsor inbound artifact m1 |
4036 | dmr_72.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4036 | dmr_72.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
4036 | dmr_72.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4036 | dmr_72.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |