| File name: | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe |
| Full analysis: | https://app.any.run/tasks/292d1127-907a-4933-9fe4-b3cc4e0f2937 |
| Verdict: | Malicious activity |
| Analysis date: | February 22, 2020, 07:54:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 1DAAB0D2830109F90A2A7BBAA8340B61 |
| SHA1: | 3160B5E2683A115F1CCB8566F9D1D14FCF4499CB |
| SHA256: | 931AAA2D97D47BE228C9617E8C719DA83AFFAFC3224BAEE1C4048437DFC66716 |
| SSDEEP: | 6144:4efB4h1P59FGd2l9E2hJNGO9wrtm3+x8AN326HHsChQ+LOTY6wTU:ZB69UO9E2h3R018q3/HsChTOUU |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:10:31 08:30:47+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 306688 |
| InitializedDataSize: | 121856 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x546f |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x004f |
| FileFlags: | (none) |
| FileOS: | Unknown (0x40534) |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (457D) |
| CharacterSet: | Unknown (F56B) |
| InternalName: | jofira.exe |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 31-Oct-2017 07:30:47 |
| Detected languages: |
|
| InternalName: | jofira.exe |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 9 |
| Time date stamp: | 31-Oct-2017 07:30:47 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0004AD0D | 0x0004AE00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.60779 |
.data | 0x0004C000 | 0x0000E0C8 | 0x0000D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.477924 |
.mysec2 | 0x0005B000 | 0x0000000A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.version\x0a | 0x0005C000 | 0x0000000A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.mysec1 | 0x0005D000 | 0x0000000A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.mysec3 | 0x0005E000 | 0x0000000A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.version\x01\x10 | 0x0005F000 | 0x00001001 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x00061000 | 0x0000D388 | 0x0000D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.8247 |
.reloc | 0x0006F000 | 0x00001958 | 0x00001A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 2.98022 | 276 | UNKNOWN | English - United States | RT_VERSION |
2 | 6.52269 | 38056 | UNKNOWN | English - United States | RT_ICON |
3 | 5.69398 | 1128 | UNKNOWN | English - United States | RT_ICON |
10 | 3.36317 | 496 | UNKNOWN | English - United States | RT_STRING |
163 | 6.46012 | 11448 | UNKNOWN | English - United States | RT_BITMAP |
235 | 2.54942 | 48 | UNKNOWN | English - United States | RT_GROUP_ICON |
ADVAPI32.dll |
GDI32.dll |
KERNEL32.DLL |
MSIMG32.dll |
SHELL32.dll |
USER32.dll |
WINHTTP.dll |
Title | Ordinal | Address |
|---|---|---|
MyFunc31 | 1 | 0x00048CC0 |
MyFunc32 | 2 | 0x00048CB0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 272 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1844 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" --Admin IsNotAutoStart IsNotTask | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2752 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" --Service 2808 x5I74v4h003xJ0iyhUfHQ8W6o0RDSicmSfg72KVA 6se9RaIxXF9m70zWmx7nL3bVRp691w4SNY8UCir0 | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | — | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2808 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" --ForNetRes x5I74v4h003xJ0iyhUfHQ8W6o0RDSicmSfg72KVA 6se9RaIxXF9m70zWmx7nL3bVRp691w4SNY8UCir0 IsNotAutoStart IsNotTask | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2824 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" --Service 3884 x5I74v4h003xJ0iyhUfHQ8W6o0RDSicmSfg72KVA 6se9RaIxXF9m70zWmx7nL3bVRp691w4SNY8UCir0 | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3432 | icacls "C:\Users\admin\AppData\Local\0115b3d4-b5d3-4dba-81f7-49c8c30568b4" /deny *S-1-1-0:(OI)(CI)(DE,DC) | C:\Windows\system32\icacls.exe | — | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3796 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3884 | "C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe" --Admin IsNotAutoStart IsNotTask | C:\Users\admin\Desktop\931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 259 Modules
| |||||||||||||||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDD4EEAE6000AC7F40C3802C171E30148030C072 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (3796) 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDD4EEAE6000AC7F40C3802C171E30148030C072 |
| Operation: | delete key | Name: | |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\CabB0CA.tmp | — | |
MD5:— | SHA256:— | |||
| 3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\TarB0CB.tmp | — | |
MD5:— | SHA256:— | |||
| 3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\geo[1].json | — | |
MD5:— | SHA256:— | |||
| 3884 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\CabC740.tmp | — | |
MD5:— | SHA256:— | |||
| 3884 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\TarC741.tmp | — | |
MD5:— | SHA256:— | |||
| 3884 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\geo[1].json | — | |
MD5:— | SHA256:— | |||
| 272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\CabCC80.tmp | — | |
MD5:— | SHA256:— | |||
| 272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\TarCC90.tmp | — | |
MD5:— | SHA256:— | |||
| 272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\geo[1].json | — | |
MD5:— | SHA256:— | |||
| 1844 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | C:\Users\admin\AppData\Local\Temp\CabD308.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | GET | 200 | 151.139.128.14:80 | http://crl.usertrust.com/AddTrustExternalCARoot.crl | US | der | 673 b | whitelisted |
272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | GET | 304 | 151.139.128.14:80 | http://crl.usertrust.com/AddTrustExternalCARoot.crl | US | — | — | whitelisted |
3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D | US | der | 727 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
272 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 151.139.128.14:80 | ocsp.usertrust.com | Highwinds Network Group, Inc. | US | suspicious |
3796 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 151.139.128.14:80 | ocsp.usertrust.com | Highwinds Network Group, Inc. | US | suspicious |
3884 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
2824 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
1844 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
2808 | 931aaa2d97d47be228c9617e8c719da83affafc3224baee1c4048437dfc66716.exe | 77.123.139.189:443 | api.2ip.ua | Volia | UA | unknown |
Domain | IP | Reputation |
|---|---|---|
api.2ip.ua |
| shared |
ocsp.usertrust.com |
| whitelisted |
crl.usertrust.com |
| whitelisted |
rosalos.ug |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1052 | svchost.exe | A Network Trojan was detected | ET POLICY External IP Address Lookup DNS Query |