File name:

q.exe

Full analysis: https://app.any.run/tasks/50ad4a36-0ff0-4533-8211-4a5220dd3531
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 18, 2019, 12:33:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

11055EE92E763C986F8EC22479A754B7

SHA1:

FB17EC05F1FD3509E0AD1F44ADBF4764F6E54F32

SHA256:

91F1D54D1058432F0FC8CF309CCB23B8290B8B20F020A30D25DB8B9AA3AB90AF

SSDEEP:

49152:S42AISACRqAmtBM5hC/gHNrUbcZXkwW3m+1a2f8BLRP9sd9Og:nOSbRctBcCIHtUbcZXkwWzdGLPsdE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • q.exe (PID: 3440)
    • Loads the Task Scheduler COM API

      • rundll32.exe (PID: 3480)
    • Changes internet zones settings

      • rundll32.exe (PID: 3088)
  • SUSPICIOUS

    • Executes scripts

      • q.exe (PID: 3440)
    • Uses RUNDLL32.EXE to load library

      • cscript.exe (PID: 2968)
      • rundll32.exe (PID: 3088)
    • Reads Internet Cache Settings

      • rundll32.exe (PID: 2436)
      • rundll32.exe (PID: 2764)
      • rundll32.exe (PID: 3480)
    • Creates files in the user directory

      • rundll32.exe (PID: 4000)
      • rundll32.exe (PID: 3088)
      • rundll32.exe (PID: 2764)
      • rundll32.exe (PID: 3480)
    • Modifies the phishing filter of IE

      • rundll32.exe (PID: 3088)
    • Starts CMD.EXE for commands execution

      • q.exe (PID: 3440)
    • Creates files in the Windows directory

      • ieunatt.exe (PID: 3656)
    • Changes the started page of IE

      • rundll32.exe (PID: 3088)
    • Application launched itself

      • rundll32.exe (PID: 3088)
    • Creates files in the program directory

      • rundll32.exe (PID: 3088)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • rundll32.exe (PID: 2764)
      • rundll32.exe (PID: 3480)
    • Starts Internet Explorer

      • rundll32.exe (PID: 3480)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 2808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:01:16 06:17:00+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 913408
InitializedDataSize: 376832
UninitializedDataSize: -
EntryPoint: 0x5ca000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 2.0.0.0
FileDescription: 麒麟文章原创度检测工具v2.0
ProductName: 麒麟文章原创度检测工具v2.0
ProductVersion: 2.0.0.0
CompanyName: 麒麟文章原创度检测工具v2.0
LegalCopyright: 麒麟文章原创度检测工具v2.0
Comments: 麒麟文章原创度检测工具v2.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Jan-2019 05:17:00
Detected languages:
  • Chinese - PRC
  • Italian - Italy
FileVersion: 2.0.0.0
FileDescription: 麒麟文章原创度检测工具v2.0
ProductName: 麒麟文章原创度检测工具v2.0
ProductVersion: 2.0.0.0
CompanyName: 麒麟文章原创度检测工具v2.0
LegalCopyright: 麒麟文章原创度检测工具v2.0
Comments: 麒麟文章原创度检测工具v2.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 16-Jan-2019 05:17:00
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
0x00001000
0x00174000
0x0007D000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.98298
.rsrc
0x00175000
0x0001D044
0x00007000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.02178
.idata
0x00193000
0x00001000
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.220958
0x00194000
0x00286000
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.041681
ktjsvcdn
0x0041A000
0x001B0000
0x001B0000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.86059
gcgwdxjn
0x005CA000
0x00001000
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.503641

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.02094
697
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
2.18858
296
Latin 1 / Western European
Chinese - PRC
RT_ICON
3
3.8212
304
Latin 1 / Western European
UNKNOWN
RT_ICON
4
2.8657
1640
Latin 1 / Western European
UNKNOWN
RT_ICON
5
4.36389
3752
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.00198
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
7
2.38593
1384
Latin 1 / Western European
UNKNOWN
RT_ICON
8
2.92578
67624
Latin 1 / Western European
UNKNOWN
RT_ICON
9
3.20402
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
10
3.34549
4264
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

comctl32.dll
kernel32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
11
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start q.exe cscript.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs cmd.exe no specs ieunatt.exe no specs rundll32.exe no specs rundll32.exe no specs iexplore.exe no specs q.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2436rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess 3328C:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2532cmd /C DEL /F /QC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\*.txtC:\Windows\system32\cmd.exeq.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2764rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess 3071C:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2808"C:\Program Files\Internet Explorer\iexplore.exe" -ResetDestinationListC:\Program Files\Internet Explorer\iexplore.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2968cscript.exe HY.vbsC:\Windows\system32\cscript.exeq.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3088"C:\Windows\System32\rundll32.exe" InetCpl.cpl,ResetIEtoDefaultsC:\Windows\System32\rundll32.execscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3128"C:\Users\admin\AppData\Local\Temp\q.exe" C:\Users\admin\AppData\Local\Temp\q.exeexplorer.exe
User:
admin
Company:
麒麟文章原创度检测工具v2.0
Integrity Level:
MEDIUM
Description:
麒麟文章原创度检测工具v2.0
Exit code:
3221226540
Version:
2.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\q.exe
c:\systemroot\system32\ntdll.dll
3440"C:\Users\admin\AppData\Local\Temp\q.exe" C:\Users\admin\AppData\Local\Temp\q.exe
explorer.exe
User:
admin
Company:
麒麟文章原创度检测工具v2.0
Integrity Level:
HIGH
Description:
麒麟文章原创度检测工具v2.0
Exit code:
0
Version:
2.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\q.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3480rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess 3071C:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3656C:\Windows\system32\ieunatt.exe specializeC:\Windows\system32\ieunatt.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IE 7.0 Unattended Install Utility
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ieunatt.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
5 733
Read events
411
Write events
5 193
Delete events
129

Modification events

(PID) Process:(2968) cscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2968) cscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3088) rundll32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Safety\PrivacIE
Operation:writeName:DisableLogging
Value:
0
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3440) q.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\q_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
0
Suspicious files
3
Text files
72
Unknown types
36

Dropped files

PID
Process
Filename
Type
3440q.exeC:\Users\admin\AppData\Local\Temp\HY.vbstext
MD5:
SHA256:
3088rundll32.exeC:\Users\admin\Favorites\Microsoft Websites\IE Add-on site.urltext
MD5:2A58591017EA14E620EEB8601BAF646F
SHA256:4277685F26A736EEA792C0FCFD6786B7A49254CC87A989D986D73D058BE184A1
3088rundll32.exeC:\Users\admin\Favorites\Links\Web Slice Gallery.url
MD5:
SHA256:
4000rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
4000rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
3088rundll32.exeC:\Users\admin\Favorites\MSN Websites\MSN Money.urltext
MD5:0A12FB5CAC3ECA000153F9337EE5DAAC
SHA256:7FB0CC9927CEEEDD0CEC19B5D9520561A9825913FAEB81C04D6DA81BA46B0753
3656ieunatt.exeC:\Windows\Panther\UnattendGC\setuperr.log
MD5:
SHA256:
3088rundll32.exeC:\Users\admin\Favorites\Windows Live\Windows Live Mail.urltext
MD5:F1D69EC4BC8F3BC62804487B1AFC91FC
SHA256:846EBF1AAFF5D3DBA6707BBC5B013EFA437E1811C87CDE6137D46882E4519313
3088rundll32.exeC:\Users\admin\Favorites\Microsoft Websites\Microsoft Store.urltext
MD5:F2423E1BC5EA0A0E6E015BAD7F8BF01D
SHA256:C553BB9DC3379F33E130592EE852A6AD8556BC24D89D19143D67BBD1CBC6DAAD
3088rundll32.exeC:\Users\admin\Favorites\Windows Live\Windows Live Spaces.urltext
MD5:113F4E9D0DB8CDDE7FC2C85B0FDC9FFB
SHA256:B643AED41E6A6B44F6CCDAC91BFB15186C4ED5D1C7A0D2B3451D81BB15885B1F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1
DNS requests
1
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3440
q.exe
GET
200
103.70.77.186:80
http://hy.zy1906.com/data/ql.txt
HK
text
134 b
malicious
3440
q.exe
GET
200
103.70.77.186:80
http://hy.zy1906.com/data/hb/ql.jpg
HK
image
48.1 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3440
q.exe
103.70.77.186:80
hy.zy1906.com
NETSEC NOC
HK
suspicious

DNS requests

Domain
IP
Reputation
hy.zy1906.com
  • 103.70.77.186
malicious

Threats

PID
Process
Class
Message
3440
q.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
3440
q.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.Win32.Renaz.czjehx
3440
q.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
1 ETPRO signatures available at the full report
Process
Message
q.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------