| File name: | MDE_File_Sample_5a3d778b829c0682d468b6c7d73891d0e5fae6fa (1).zip |
| Full analysis: | https://app.any.run/tasks/c930ba4b-f385-41cd-bec0-84fc8105d677 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 03, 2023, 07:09:40 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | DCD61691690A105D430EF4101772F798 |
| SHA1: | 545A1A5607FFB7C35D9BF173F4D45BCF68389775 |
| SHA256: | 930545276557C83D2206285F50ECC5AE811C18B6F1DC3F9A923296CD3AD88889 |
| SSDEEP: | 24576:cJke1aENUJKidCDJhVpbrYmukc1CgQ+EAKjKDQ67c7y:c6C5LDJ4Ix+EAKjcQ674y |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipFileName: | btweb_installer.exe |
|---|---|
| ZipUncompressedSize: | 1822280 |
| ZipCompressedSize: | 1294262 |
| ZipCRC: | 0xff658fd1 |
| ZipModifyDate: | 2023:04:03 07:06:06 |
| ZipCompression: | Deflated |
| ZipBitFlag: | 0x0001 |
| ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 876 | "C:\Windows\Temp\asw.408a6ce76e8a7e33\New_17020cc9\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.408a6ce76e8a7e33 /edition:15 /prod:ais /guid:e22fe244-cd49-421f-8467-1a68d7e585df /ga_clientid:3d54e99d-67a3-4686-a94e-022abe0fe75a /silent /ws /psh:92pTtVppTmAE7qoHGJAQQ7su32HC8E103Xz5GK9x8XNKMdEtkkUpQSg4DhjKpPjEKblQSolPJyWotg /cookie:mmm_irs_ppi_902_451_o /edat_dir:C:\Windows\Temp\asw.0b579184ff7fde4e /online_installer | C:\Windows\Temp\asw.408a6ce76e8a7e33\New_17020cc9\instup.exe | Instup.exe | ||||||||||||
User: admin Company: AVG Technologies CZ, s.r.o. Integrity Level: HIGH Description: AVG Antivirus Installer Exit code: 0 Version: 23.2.7961.0 Modules
| |||||||||||||||
| 1540 | "C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\component0_extract\saBSI.exe" /affid 91082 PaidDistribution=true | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\component0_extract\saBSI.exe | btweb_installer.tmp | ||||||||||||
User: admin Company: McAfee, LLC Integrity Level: HIGH Description: McAfee WebAdvisor(bootstrap installer) Exit code: 4294967295 Version: 4,1,1,663 Modules
| |||||||||||||||
| 1624 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1748 | "C:\Windows\Temp\asw.408a6ce76e8a7e33\New_17020cc9\sbr.exe" 876 "AVG Antivirus setup" "AVG Antivirus is being installed. Do not shut down your computer!" | C:\Windows\Temp\asw.408a6ce76e8a7e33\New_17020cc9\sbr.exe | — | instup.exe | |||||||||||
User: admin Company: AVG Technologies CZ, s.r.o. Integrity Level: HIGH Description: AVG Shutdown blocker Exit code: 0 Version: 23.2.7961.0 Modules
| |||||||||||||||
| 2316 | "C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\component1_extract\cookie_mmm_irs_ppi_902_451_o.exe" /silent /ws /psh:92pTtVppTmAE7qoHGJAQQ7su32HC8E103Xz5GK9x8XNKMdEtkkUpQSg4DhjKpPjEKblQSolPJyWotg | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\component1_extract\cookie_mmm_irs_ppi_902_451_o.exe | btweb_installer.tmp | ||||||||||||
User: admin Company: AVG Technologies CZ, s.r.o. Integrity Level: HIGH Description: AVG Antivirus Installer Exit code: 0 Version: 2.1.1279.0 Modules
| |||||||||||||||
| 2400 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb2680.28058\btweb_installer.exe" /SPAWNWND=$2017A /NOTIFYWND=$4015C | C:\Users\admin\AppData\Local\Temp\Rar$EXb2680.28058\btweb_installer.exe | btweb_installer.tmp | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: BitTorrent Web® Exit code: 0 Version: 1.3 Modules
| |||||||||||||||
| 2416 | "C:\Users\admin\AppData\Roaming\BitTorrent Web\btweb.exe" /RUNONSTARTUP | C:\Users\admin\AppData\Roaming\BitTorrent Web\btweb.exe | btweb_installer.tmp | ||||||||||||
User: admin Company: BitTorrent Inc. Integrity Level: MEDIUM Description: BitTorrent Web Exit code: 0 Version: 1.3.0.5655 Modules
| |||||||||||||||
| 2440 | "C:\Windows\Temp\asw.0b579184ff7fde4e\avg_antivirus_free_setup.exe" /silent /ws /psh:92pTtVppTmAE7qoHGJAQQ7su32HC8E103Xz5GK9x8XNKMdEtkkUpQSg4DhjKpPjEKblQSolPJyWotg /cookie:mmm_irs_ppi_902_451_o /ga_clientid:3d54e99d-67a3-4686-a94e-022abe0fe75a /edat_dir:C:\Windows\Temp\asw.0b579184ff7fde4e | C:\Windows\Temp\asw.0b579184ff7fde4e\avg_antivirus_free_setup.exe | cookie_mmm_irs_ppi_902_451_o.exe | ||||||||||||
User: admin Company: AVG Technologies CZ, s.r.o. Integrity Level: HIGH Description: AVG Antivirus Exit code: 0 Version: 23.2.7961.0 Modules
| |||||||||||||||
| 2664 | "C:\Users\admin\AppData\Local\Temp\is-CKHME.tmp\btweb_installer.tmp" /SL5="$30178,905130,843776,C:\Users\admin\AppData\Local\Temp\Rar$EXb2680.28058\btweb_installer.exe" /SPAWNWND=$2017A /NOTIFYWND=$4015C | C:\Users\admin\AppData\Local\Temp\is-CKHME.tmp\btweb_installer.tmp | btweb_installer.exe | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 2680 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\MDE_File_Sample_5a3d778b829c0682d468b6c7d73891d0e5fae6fa (1).zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2680) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3548 | btweb_installer.exe | C:\Users\admin\AppData\Local\Temp\is-BKDE6.tmp\btweb_installer.tmp | executable | |
MD5:— | SHA256:— | |||
| 2680 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2680.28058\btweb_installer.exe | executable | |
MD5:— | SHA256:— | |||
| 2400 | btweb_installer.exe | C:\Users\admin\AppData\Local\Temp\is-CKHME.tmp\btweb_installer.tmp | executable | |
MD5:— | SHA256:— | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\is-FLIP6.tmp | executable | |
MD5:— | SHA256:— | |||
| 2780 | btweb_install_rr.exe | C:\Users\admin\AppData\Roaming\BitTorrent Web\webui\version.txt | text | |
MD5:— | SHA256:— | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\btweb_install_rr.exe | executable | |
MD5:— | SHA256:— | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\Logo.png | image | |
MD5:D0743D0DB691B4E932DCF098F070C5FC | SHA256:93520D9E40F227FD89021341ABAD301D2351704D1509711587E3D4F6FE35FB59 | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\botva2.dll | executable | |
MD5:67965A5957A61867D661F05AE1F4773E | SHA256:450B9B0BA25BF068AFBC2B23D252585A19E282939BF38326384EA9112DFD0105 | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\is-O8PO2.tmp | image | |
MD5:F1F21BE822C2E22934C88478DDA2FD74 | SHA256:5F3223DBFD67DC3BA0E0A3C23F5294258251272E06A66FDEE6416DACC160FAD4 | |||
| 2664 | btweb_installer.tmp | C:\Users\admin\AppData\Local\Temp\is-7ESQ0.tmp\is-BQI1Q.tmp | compressed | |
MD5:3306273378D0D40FC1E6F28E3F52DD37 | SHA256:3D70BA97A68A00EFA090F26B70F30ABE0EE3172B711F2C446FD3782806B2C353 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
876 | instup.exe | GET | 200 | 95.100.146.56:80 | http://k6951768.avi18tiny.u.avcdn.net/avi18tiny/prod-vps.vpx | unknown | binary | 341 b | suspicious |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | POST | 204 | 34.117.223.223:80 | http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi | US | — | — | whitelisted |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | GET | 200 | 23.48.23.20:80 | http://iavs9x.avg.u.avcdn.net/avg/iavs9x/avg_antivirus_free_setup.exe | US | executable | 8.78 Mb | whitelisted |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | POST | 204 | 34.117.223.223:80 | http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi | US | — | — | whitelisted |
3532 | Instup.exe | GET | 200 | 95.100.146.51:80 | http://f2077074.iavs9x.avg.u.avcdn.net/avg/iavs9x/servers.def.vpx | unknown | binary | 1.36 Kb | whitelisted |
3532 | Instup.exe | GET | 200 | 95.100.146.51:80 | http://l9518228.iavs9x.avg.u.avcdn.net/avg/iavs9x/prod-pgm.vpx | unknown | binary | 571 b | whitelisted |
3532 | Instup.exe | GET | 200 | 95.100.146.51:80 | http://l9518228.iavs9x.avg.u.avcdn.net/avg/iavs9x/avdump_x86_ais-cc9.vpx | unknown | binary | 402 Kb | whitelisted |
3532 | Instup.exe | GET | 200 | 95.100.146.51:80 | http://l9518228.iavs9x.avg.u.avcdn.net/avg/iavs9x/avbugreport_ais-cc9.vpx | unknown | binary | 1.23 Mb | whitelisted |
2780 | btweb_install_rr.exe | POST | 200 | 34.226.45.204:80 | http://i-4102.b-5655.btweb.bench.utorrent.com/e?i=4102 | US | binary | 21 b | suspicious |
2780 | btweb_install_rr.exe | POST | 200 | 34.226.45.204:80 | http://i-4102.b-5655.btweb.bench.utorrent.com/e?i=4102 | US | binary | 21 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2664 | btweb_installer.tmp | 18.66.97.18:443 | api.playanext.com | — | US | suspicious |
2780 | btweb_install_rr.exe | 34.226.45.204:80 | i-4102.b-5655.btweb.bench.utorrent.com | AMAZON-AES | US | suspicious |
2664 | btweb_installer.tmp | 82.221.103.243:443 | download-lb.utorrent.com | Advania Island ehf | IS | suspicious |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | 142.250.185.206:80 | www.google-analytics.com | GOOGLE | US | whitelisted |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | 34.117.223.223:80 | v7event.stats.avast.com | GOOGLE-CLOUD-PLATFORM | US | unknown |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | 23.48.23.20:80 | iavs9x.avg.u.avcdn.net | Akamai International B.V. | DE | suspicious |
1540 | saBSI.exe | 54.200.146.120:443 | apis.mosaic.analytics.awscommon.mcafee.com | AMAZON-02 | US | unknown |
1540 | saBSI.exe | 23.35.236.52:443 | sadownload.mcafee.com | AKAMAI-AS | DE | suspicious |
2416 | btweb.exe | 18.66.112.80:443 | btweb.rainberrytv.com | AMAZON-02 | US | suspicious |
2416 | btweb.exe | 13.224.189.62:443 | web.utorrent.com | AMAZON-02 | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
d1was4hi8hlp7e.cloudfront.net |
| unknown |
dtyaopwujvlcj.cloudfront.net |
| unknown |
api.playanext.com |
| whitelisted |
download-lb.utorrent.com |
| whitelisted |
i-4102.b-5655.btweb.bench.utorrent.com |
| suspicious |
cu1pehnswad01.servicebus.windows.net |
| whitelisted |
www.google-analytics.com |
| whitelisted |
v7event.stats.avast.com |
| whitelisted |
iavs9x.avg.u.avcdn.net |
| whitelisted |
apis.mosaic.analytics.awscommon.mcafee.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2664 | btweb_installer.tmp | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2664 | btweb_installer.tmp | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2780 | btweb_install_rr.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
2780 | btweb_install_rr.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
2316 | cookie_mmm_irs_ppi_902_451_o.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1540 | saBSI.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
1540 | saBSI.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
— | — | Potential Corporate Privacy Violation | ET P2P BitTorrent DHT ping request |
2416 | btweb.exe | Potentially Bad Traffic | ET POLICY Executable served from Amazon S3 |
2416 | btweb.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in current directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in current directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in current directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in current directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|
saBSI.exe | NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
|