analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Auslogics.BoostSpeed.v11.2.0.3.zip

Full analysis: https://app.any.run/tasks/95bac0cc-b2ab-4a8c-b82a-2f80aa9b2998
Verdict: Malicious activity
Analysis date: December 02, 2019, 22:58:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

1978408F4E6443D8D7B5D8FD3C92B0C9

SHA1:

ADEF60584FC0417E49A989B08FD27B8C78304520

SHA256:

9429123F5DDE587D189CE92656793ADEC9A2808064896FA75F41286A848FAC87

SSDEEP:

393216:25oqBMgQBFAfnNiBeXyl886wi91H4YoQmDKQj7X/ROp8e6aVY/Nbo5XvkEw4UW:OowNivdRi9x4NQqLRM8e3cU5XsE7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
      • ns6EE.tmp (PID: 324)
      • ns912.tmp (PID: 1916)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 2440)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 896)
      • AusLogicsBoostSpeed11Portable.exe (PID: 1160)
      • AusLogicsBoostSpeed11Portable.exe (PID: 2820)
      • Integrator.exe (PID: 592)
      • tabcarecenter.exe (PID: 1016)
      • tabdashboard.exe (PID: 3944)
      • tabcleanup.exe (PID: 1800)
      • taballtools.exe (PID: 2176)
      • tabmaintain.exe (PID: 2372)
      • taboneclickscanner.exe (PID: 1788)
      • taboptimize.exe (PID: 3128)
      • tabprotect.exe (PID: 1412)
      • tabreports.exe (PID: 3412)
      • DeepDiskCleaner.exe (PID: 2980)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3528)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
      • Integrator.exe (PID: 592)
      • AusLogicsBoostSpeed11Portable.exe (PID: 2820)
      • tabdashboard.exe (PID: 3944)
      • tabcleanup.exe (PID: 1800)
      • taboptimize.exe (PID: 3128)
      • taboneclickscanner.exe (PID: 1788)
      • tabprotect.exe (PID: 1412)
      • taballtools.exe (PID: 2176)
      • tabmaintain.exe (PID: 2372)
      • tabreports.exe (PID: 3412)
      • tabcarecenter.exe (PID: 1016)
      • DllHost.exe (PID: 1816)
      • DeepDiskCleaner.exe (PID: 2980)
    • Loads the Task Scheduler COM API

      • Integrator.exe (PID: 592)
      • tabdashboard.exe (PID: 3944)
      • taboptimize.exe (PID: 3128)
    • Actions looks like stealing of personal data

      • tabprotect.exe (PID: 1412)
  • SUSPICIOUS

    • Uses NETSH.EXE for network configuration

      • ns6EE.tmp (PID: 324)
    • Starts application with an unusual extension

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
    • Creates COM task schedule object

      • AusLogicsBoostSpeed11Portable.exe (PID: 2820)
    • Executable content was dropped or overwritten

      • AusLogicsBoostSpeed11Portable.exe (PID: 2820)
      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
    • Reads the machine GUID from the registry

      • Integrator.exe (PID: 592)
      • tabcleanup.exe (PID: 1800)
      • tabdashboard.exe (PID: 3944)
      • taboneclickscanner.exe (PID: 1788)
      • tabreports.exe (PID: 3412)
      • taballtools.exe (PID: 2176)
      • taboptimize.exe (PID: 3128)
      • tabprotect.exe (PID: 1412)
      • tabmaintain.exe (PID: 2372)
      • tabcarecenter.exe (PID: 1016)
      • DeepDiskCleaner.exe (PID: 2980)
    • Reads Windows Product ID

      • Integrator.exe (PID: 592)
      • tabcleanup.exe (PID: 1800)
      • tabdashboard.exe (PID: 3944)
      • tabreports.exe (PID: 3412)
      • taboneclickscanner.exe (PID: 1788)
      • taballtools.exe (PID: 2176)
      • taboptimize.exe (PID: 3128)
      • tabprotect.exe (PID: 1412)
      • tabmaintain.exe (PID: 2372)
      • tabcarecenter.exe (PID: 1016)
      • DeepDiskCleaner.exe (PID: 2980)
    • Low-level read access rights to disk partition

      • Integrator.exe (PID: 592)
      • tabcleanup.exe (PID: 1800)
      • taboptimize.exe (PID: 3128)
      • tabmaintain.exe (PID: 2372)
      • tabdashboard.exe (PID: 3944)
      • DeepDiskCleaner.exe (PID: 2980)
    • Reads the BIOS version

      • taboneclickscanner.exe (PID: 1788)
      • tabcarecenter.exe (PID: 1016)
      • tabdashboard.exe (PID: 3944)
      • Integrator.exe (PID: 592)
    • Executed via COM

      • DllHost.exe (PID: 1816)
    • Creates files in the program directory

      • tabcarecenter.exe (PID: 1016)
      • Integrator.exe (PID: 592)
      • taboptimize.exe (PID: 3128)
      • tabprotect.exe (PID: 1412)
    • Reads Internet Cache Settings

      • Integrator.exe (PID: 592)
    • Searches for installed software

      • taboptimize.exe (PID: 3128)
      • tabmaintain.exe (PID: 2372)
      • DeepDiskCleaner.exe (PID: 2980)
      • taboneclickscanner.exe (PID: 1788)
      • Integrator.exe (PID: 592)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 532)
      • AusLogicsBoostSpeed11Portable.exe (PID: 1160)
      • AusLogicsBoostSpeed11Portable.exe (PID: 2820)
    • Reads the hosts file

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
    • Dropped object may contain Bitcoin addresses

      • Auslogics.BoostSpeed.v11.2.0.3.exe (PID: 3676)
    • Reads Microsoft Office registry keys

      • taboneclickscanner.exe (PID: 1788)
      • taboptimize.exe (PID: 3128)
      • tabmaintain.exe (PID: 2372)
      • Integrator.exe (PID: 592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipFileName: Auslogics.BoostSpeed.v11.2.0.3.exe
ZipUncompressedSize: 29051371
ZipCompressedSize: 29051371
ZipCRC: 0x6d55d152
ZipModifyDate: 2019:11:21 15:19:21
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
25
Malicious processes
17
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs cmd.exe no specs mode.com no specs auslogics.boostspeed.v11.2.0.3.exe no specs auslogics.boostspeed.v11.2.0.3.exe no specs auslogics.boostspeed.v11.2.0.3.exe ns6ee.tmp no specs netsh.exe no specs ns912.tmp no specs route.exe no specs searchprotocolhost.exe no specs auslogicsboostspeed11portable.exe no specs auslogicsboostspeed11portable.exe integrator.exe tabdashboard.exe taboneclickscanner.exe no specs tabcleanup.exe no specs taboptimize.exe no specs tabprotect.exe tabmaintain.exe no specs tabreports.exe no specs tabcarecenter.exe taballtools.exe no specs Auslogics TMAgent no specs deepdiskcleaner.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3960"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
532cmd /c ""C:\Users\admin\Desktop\PORTABLE.cmd" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3368mode con:cols=100 lines=15C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
896"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.execmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
MEDIUM
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
3221226540
Version:
11.2.0.3
2440"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.execmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
MEDIUM
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
3221226540
Version:
11.2.0.3
3676"C:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe" /S /PC:\Users\admin\Desktop\Auslogics.BoostSpeed.v11.2.0.3.exe
cmd.exe
User:
admin
Company:
Auslogics Software Pty Ltd.
Integrity Level:
HIGH
Description:
Auslogics BoostSpeed v11.2.0.3
Exit code:
0
Version:
11.2.0.3
324"C:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns6EE.tmp" netsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.133C:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns6EE.tmpAuslogics.BoostSpeed.v11.2.0.3.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
2956netsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.133C:\Windows\system32\netsh.exens6EE.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1916"C:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns912.tmp" route.exe delete 95.141.193.133C:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns912.tmpAuslogics.BoostSpeed.v11.2.0.3.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2968route.exe delete 95.141.193.133C:\Windows\system32\route.exens912.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Route Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
18 104
Read events
17 641
Write events
0
Delete events
0

Modification events

No data
Executable files
108
Suspicious files
9
Text files
6
Unknown types
4

Dropped files

PID
Process
Filename
Type
3960WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3960.5298\Auslogics.BoostSpeed.v11.2.0.3.exe
MD5:
SHA256:
3960WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3960.5298\INSTALL.cmd
MD5:
SHA256:
3960WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3960.5298\PORTABLE.cmd
MD5:
SHA256:
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns912.tmp
MD5:
SHA256:
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\AppData\Local\Temp\nsf6DD.tmp\ns6EE.tmpexecutable
MD5:30D31B3424FF6B7613EAAF79E9449E0F
SHA256:8F0F0E254113725B386FF4C6C2967D556ED4D568245FC8AF6F2DBEA697BA56BF
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\AusLogicsBoostSpeed11Portable.exeexecutable
MD5:B39878697E607DC822D5F574454CC19C
SHA256:33A5E5F3839F99589A885729D60EAF7AEF6DE61EF82FB2D321DDE0BEAD974C61
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\BrowserPluginsHelper.Agent.x64.dllexecutable
MD5:A36055AC011887E832C99328D555E593
SHA256:8E96B284B7689BF9C6E906ABF1569EA497157F1B07EB047DF5AA001F024CC050
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\BoostSpeed.exeexecutable
MD5:CECC47F972C593E2DC418D23CA17447B
SHA256:976254CCC5CDC924A62C60CEE074091E40562E9FFE772923E3C25CF759F2BE0D
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\BrowserPluginsHelper.Agent.x32.dllexecutable
MD5:E30FE158337ADB62B5EF4F6DA0711D6C
SHA256:B658F2C6A1E3834B4717E0B0A07C0F3CCFEEE98964C1F1C3ED61AFE6A26AFBD3
3676Auslogics.BoostSpeed.v11.2.0.3.exeC:\Users\admin\Desktop\AuslogicsBoostSpeedPortable\App\BoostSpeed\ATToolsExtHelper.dllexecutable
MD5:AE38AEBFCA4884C68BD7571AE7DB7BB8
SHA256:497334F6EB6FE7F3487FE655B08BEF7A5CC0334D425764894A05EA4672279ED9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
17
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
592
Integrator.exe
HEAD
200
45.33.8.241:80
http://ads.auslogics.com/uploads/50af3d5413855c55b7843c2659c42f65.png
US
whitelisted
GET
200
52.222.149.179:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEA4vBMJJxPg6SKCVbxEbKkA%3D
US
der
471 b
whitelisted
GET
200
143.204.208.192:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
GET
200
143.204.208.108:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
GET
200
13.35.254.76:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
GET
200
13.35.254.176:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.4 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
13.35.254.176:80
x.ss2.us
US
unknown
592
Integrator.exe
3.223.118.140:443
abs.aslgics.com
US
unknown
52.222.149.179:80
ocsp.sca1b.amazontrust.com
Amazon.com, Inc.
US
whitelisted
13.35.254.76:80
o.ss2.us
US
malicious
592
Integrator.exe
45.33.8.241:80
ads.auslogics.com
Linode, LLC
US
malicious
592
Integrator.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious
3944
tabdashboard.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious
1016
tabcarecenter.exe
45.33.8.241:443
ads.auslogics.com
Linode, LLC
US
malicious
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
143.204.208.108:80
ocsp.rootg2.amazontrust.com
US
whitelisted

DNS requests

Domain
IP
Reputation
abs.aslgics.com
  • 3.223.118.140
  • 52.201.171.253
unknown
x.ss2.us
  • 13.35.254.176
  • 13.35.254.82
  • 13.35.254.54
  • 13.35.254.34
whitelisted
www.download.windowsupdate.com
  • 93.184.221.240
whitelisted
o.ss2.us
  • 13.35.254.76
  • 13.35.254.216
  • 13.35.254.192
  • 13.35.254.205
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.208.108
  • 143.204.208.192
  • 143.204.208.23
  • 143.204.208.90
whitelisted
ocsp.rootca1.amazontrust.com
  • 143.204.208.192
  • 143.204.208.23
  • 143.204.208.90
  • 143.204.208.108
shared
ocsp.sca1b.amazontrust.com
  • 52.222.149.179
  • 52.222.149.26
  • 52.222.149.36
  • 52.222.149.191
whitelisted
ads.auslogics.com
  • 45.33.8.241
whitelisted
qa.auslogics.com
  • 45.33.8.241
malicious
www.auslogics.com
  • 45.33.8.241
whitelisted

Threats

Found threats are available for the paid subscriptions
5 ETPRO signatures available at the full report
No debug info