analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Auslogics.BoostSpeed.v11.2.0.3.zip

Full analysis: https://app.any.run/tasks/4f12ea6e-4c5d-49dd-b30a-0334aafe31e5
Verdict: Malicious activity
Analysis date: December 02, 2019, 22:47:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

1978408F4E6443D8D7B5D8FD3C92B0C9

SHA1:

ADEF60584FC0417E49A989B08FD27B8C78304520

SHA256:

9429123F5DDE587D189CE92656793ADEC9A2808064896FA75F41286A848FAC87

SSDEEP:

393216:25oqBMgQBFAfnNiBeXyl886wi91H4YoQmDKQj7X/ROp8e6aVY/Nbo5XvkEw4UW:OowNivdRi9x4NQqLRM8e3cU5XsE7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 1608)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 2296)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
      • ns1630.tmp (PID: 1160)
      • ns19BB.tmp (PID: 1936)
      • Integrator.exe (PID: 2428)
      • AusLogicsBoostSpeed11Portable.exe (PID: 4088)
      • AusLogicsBoostSpeed11Portable.exe (PID: 3928)
      • taboneclickscanner.exe (PID: 3072)
      • tabcleanup.exe (PID: 3884)
      • tabdashboard.exe (PID: 2828)
      • taboptimize.exe (PID: 1584)
      • tabreports.exe (PID: 1908)
      • taballtools.exe (PID: 3404)
      • tabcarecenter.exe (PID: 2440)
      • tabmaintain.exe (PID: 3600)
      • tabprotect.exe (PID: 2176)
      • DeepDiskCleaner.exe (PID: 3144)
      • DeepDiskCleaner.exe (PID: 3016)
    • Loads dropped or rewritten executable

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
      • SearchProtocolHost.exe (PID: 3604)
      • Integrator.exe (PID: 2428)
      • AusLogicsBoostSpeed11Portable.exe (PID: 3928)
      • tabdashboard.exe (PID: 2828)
      • taboneclickscanner.exe (PID: 3072)
      • tabcleanup.exe (PID: 3884)
      • tabreports.exe (PID: 1908)
      • taboptimize.exe (PID: 1584)
      • tabcarecenter.exe (PID: 2440)
      • tabmaintain.exe (PID: 3600)
      • tabprotect.exe (PID: 2176)
      • taballtools.exe (PID: 3404)
      • DllHost.exe (PID: 4008)
      • DeepDiskCleaner.exe (PID: 3016)
      • DeepDiskCleaner.exe (PID: 3144)
    • Loads the Task Scheduler COM API

      • Integrator.exe (PID: 2428)
      • tabdashboard.exe (PID: 2828)
      • taboptimize.exe (PID: 1584)
    • Actions looks like stealing of personal data

      • tabprotect.exe (PID: 2176)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3912)
      • AusLogicsBoostSpeed11Portable.exe (PID: 3928)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
    • Starts application with an unusual extension

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
    • Uses NETSH.EXE for network configuration

      • ns1630.tmp (PID: 1160)
    • Creates COM task schedule object

      • AusLogicsBoostSpeed11Portable.exe (PID: 3928)
    • Reads the machine GUID from the registry

      • Integrator.exe (PID: 2428)
      • tabreports.exe (PID: 1908)
      • tabcleanup.exe (PID: 3884)
      • tabdashboard.exe (PID: 2828)
      • taboneclickscanner.exe (PID: 3072)
      • taballtools.exe (PID: 3404)
      • taboptimize.exe (PID: 1584)
      • tabprotect.exe (PID: 2176)
      • tabmaintain.exe (PID: 3600)
      • tabcarecenter.exe (PID: 2440)
      • DeepDiskCleaner.exe (PID: 3144)
      • DeepDiskCleaner.exe (PID: 3016)
    • Reads Windows Product ID

      • Integrator.exe (PID: 2428)
      • tabdashboard.exe (PID: 2828)
      • tabcleanup.exe (PID: 3884)
      • taboneclickscanner.exe (PID: 3072)
      • tabreports.exe (PID: 1908)
      • taballtools.exe (PID: 3404)
      • tabprotect.exe (PID: 2176)
      • tabmaintain.exe (PID: 3600)
      • taboptimize.exe (PID: 1584)
      • tabcarecenter.exe (PID: 2440)
      • DeepDiskCleaner.exe (PID: 3144)
      • DeepDiskCleaner.exe (PID: 3016)
    • Low-level read access rights to disk partition

      • tabcleanup.exe (PID: 3884)
      • Integrator.exe (PID: 2428)
      • taboptimize.exe (PID: 1584)
      • tabmaintain.exe (PID: 3600)
      • tabdashboard.exe (PID: 2828)
      • DeepDiskCleaner.exe (PID: 3016)
    • Reads the BIOS version

      • tabcarecenter.exe (PID: 2440)
      • tabdashboard.exe (PID: 2828)
      • Integrator.exe (PID: 2428)
      • taboptimize.exe (PID: 1584)
    • Searches for installed software

      • tabmaintain.exe (PID: 3600)
      • taboptimize.exe (PID: 1584)
      • DeepDiskCleaner.exe (PID: 3016)
      • taboneclickscanner.exe (PID: 3072)
      • Integrator.exe (PID: 2428)
    • Creates files in the program directory

      • taboptimize.exe (PID: 1584)
      • tabprotect.exe (PID: 2176)
      • Integrator.exe (PID: 2428)
    • Reads Internet Cache Settings

      • Integrator.exe (PID: 2428)
    • Executed via COM

      • DllHost.exe (PID: 4008)
  • INFO

    • Reads the hosts file

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
    • Manual execution by user

      • cmd.exe (PID: 1296)
      • AusLogicsBoostSpeed11Portable.exe (PID: 4088)
      • AusLogicsBoostSpeed11Portable.exe (PID: 3928)
    • Dropped object may contain Bitcoin addresses

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3392)
    • Reads settings of System Certificates

      • Integrator.exe (PID: 2428)
    • Reads Microsoft Office registry keys

      • taboneclickscanner.exe (PID: 3072)
      • taboptimize.exe (PID: 1584)
      • tabmaintain.exe (PID: 3600)
      • Integrator.exe (PID: 2428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipFileName: Auslogics.BoostSpeed.v11.2.0.3.exe
ZipUncompressedSize: 29051371
ZipCompressedSize: 29051371
ZipCRC: 0x6d55d152
ZipModifyDate: 2019:11:21 15:19:21
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
74
Monitored processes
26
Malicious processes
15
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe cmd.exe no specs mode.com no specs auslogics.boostspeed.v11.2.0.3.exe no specs auslogics.boostspeed.v11.2.0.3.exe no specs auslogics.boostspeed.v11.2.0.3.exe ns1630.tmp no specs netsh.exe no specs ns19bb.tmp no specs route.exe no specs searchprotocolhost.exe no specs auslogicsboostspeed11portable.exe no specs auslogicsboostspeed11portable.exe integrator.exe tabdashboard.exe taboneclickscanner.exe no specs tabcleanup.exe no specs taboptimize.exe no specs tabprotect.exe tabmaintain.exe no specs tabreports.exe no specs tabcarecenter.exe taballtools.exe no specs Auslogics TMAgent no specs deepdiskcleaner.exe no specs deepdiskcleaner.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3912"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1296cmd /c ""C:\Users\admin\Desktop\PORTABLE.cmd" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4020mode con:cols=100 lines=15C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1608"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.execmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
MEDIUM
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
3221226540
Version:
11.2.0.3
2296"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.execmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
MEDIUM
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
3221226540
Version:
11.2.0.3
3392"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe
cmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
HIGH
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
0
Version:
11.2.0.3
1160"C:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns1630.tmp" netsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.133C:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns1630.tmpAuslogics.BoostSpeed.v11.2.0.3.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
956netsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.133C:\Windows\system32\netsh.exens1630.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1936"C:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns19BB.tmp" route.exe delete 95.141.193.133C:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns19BB.tmpAuslogics.BoostSpeed.v11.2.0.3.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2328route.exe delete 95.141.193.133C:\Windows\system32\route.exens19BB.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Route Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
18 061
Read events
17 601
Write events
0
Delete events
0

Modification events

No data
Executable files
109
Suspicious files
8
Text files
5
Unknown types
4

Dropped files

PID
Process
Filename
Type
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns19BB.tmp
MD5:
SHA256:
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\AusLogicsBoostSpeed11Portable.exeexecutable
MD5:B39878697E607DC822D5F574454CC19C
SHA256:33A5E5F3839F99589A885729D60EAF7AEF6DE61EF82FB2D321DDE0BEAD974C61
3912WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3912.36796\PORTABLE.cmdtext
MD5:A04EDCD670D6CCF7854F1C61E2260F6F
SHA256:8871268FEDBC41807AED14FD3A19166F21805A080267DF5638A3F66C8A24B63D
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\AppData\Local\Temp\nsw1610.tmp\ns1630.tmpexecutable
MD5:30D31B3424FF6B7613EAAF79E9449E0F
SHA256:8F0F0E254113725B386FF4C6C2967D556ED4D568245FC8AF6F2DBEA697BA56BF
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\BoostSpeed.exeexecutable
MD5:CECC47F972C593E2DC418D23CA17447B
SHA256:976254CCC5CDC924A62C60CEE074091E40562E9FFE772923E3C25CF759F2BE0D
3912WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3912.36796\INSTALL.cmdtext
MD5:324BED0D9DDD4AEA7264B0E779CF7D08
SHA256:6940A5363BF058E29F20EE0B31B9A132DA0099D34A36345597B41A102D84B7CA
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\ActionCenter.exeexecutable
MD5:D069AD8EE5CF81CACF18145FD504FF36
SHA256:4030AF5273EB7A4F20E64540ECEFD77890EFF4359A11D9A8488C50C36C7493D4
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\BrowserPluginsHelper.Agent.x32.dllexecutable
MD5:E30FE158337ADB62B5EF4F6DA0711D6C
SHA256:B658F2C6A1E3834B4717E0B0A07C0F3CCFEEE98964C1F1C3ED61AFE6A26AFBD3
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\ATToolsExtHelper.dllexecutable
MD5:AE38AEBFCA4884C68BD7571AE7DB7BB8
SHA256:497334F6EB6FE7F3487FE655B08BEF7A5CC0334D425764894A05EA4672279ED9
3392Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\ActionCenterHelper.dllexecutable
MD5:0E3A1107B33A73D6EF9139793C55443E
SHA256:50922FD33CB5D1A6F8F9FEF05615C8C9721F3C46B83DA2A8013C8200D8D264C6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
13.35.254.76:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
GET
200
143.204.208.23:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
GET
200
13.35.254.226:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
GET
200
13.35.254.54:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
GET
200
205.185.216.42:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.4 Kb
whitelisted
GET
200
143.204.208.173:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEA4vBMJJxPg6SKCVbxEbKkA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
205.185.216.42:80
www.download.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
2428
Integrator.exe
3.223.118.140:443
abs.aslgics.com
US
unknown
13.35.254.76:80
o.ss2.us
US
malicious
13.35.254.54:80
x.ss2.us
US
malicious
143.204.208.23:80
ocsp.rootg2.amazontrust.com
US
whitelisted
2428
Integrator.exe
52.201.171.253:443
abs.aslgics.com
Amazon.com, Inc.
US
unknown
2440
tabcarecenter.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious
2828
tabdashboard.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious
13.35.254.226:80
ocsp.rootca1.amazontrust.com
US
whitelisted
2428
Integrator.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious

DNS requests

Domain
IP
Reputation
abs.aslgics.com
  • 3.223.118.140
  • 52.201.171.253
unknown
x.ss2.us
  • 13.35.254.54
  • 13.35.254.82
  • 13.35.254.176
  • 13.35.254.34
whitelisted
www.download.windowsupdate.com
  • 205.185.216.42
  • 205.185.216.10
whitelisted
o.ss2.us
  • 13.35.254.76
  • 13.35.254.192
  • 13.35.254.216
  • 13.35.254.205
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.208.23
  • 143.204.208.108
  • 143.204.208.90
  • 143.204.208.192
whitelisted
ocsp.rootca1.amazontrust.com
  • 13.35.254.226
  • 13.35.254.41
  • 13.35.254.57
  • 13.35.254.52
shared
ocsp.sca1b.amazontrust.com
  • 143.204.208.173
  • 143.204.208.150
  • 143.204.208.145
  • 143.204.208.79
whitelisted
ads.auslogics.com
  • 45.33.8.241
whitelisted
www.auslogics.com
  • 45.33.8.241
whitelisted
qa.auslogics.com
  • 45.33.8.241
malicious

Threats

Found threats are available for the paid subscriptions
5 ETPRO signatures available at the full report
No debug info