analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

sheep.exe

Full analysis: https://app.any.run/tasks/5b530230-1eff-4916-a36c-75ee1d74b741
Verdict: Malicious activity
Analysis date: May 30, 2020, 05:14:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9FF13690CC4976DF6B7CFD41728A969F

SHA1:

95C9651EA7D863FFEB22FF6CD0E99EE10268C832

SHA256:

9483157A5F62AA2132E20045B5D15A449E6240FF01BE1FF3FE3DA5F471C6E4C0

SSDEEP:

393216:cak/e3+wpPZouJg3rCa4Il82sObJazyJ8/Mv9+bnUrFnc6EkMdUUKhMqBMIOv7S:+uU6kDUKhMYxU7S

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • explorer.exe (PID: 1784)
      • dwm.exe (PID: 1648)
      • ctfmon.exe (PID: 1816)
      • taskeng.exe (PID: 1580)
      • windanr.exe (PID: 2196)
    • Writes to a start menu file

      • iexplore.exe (PID: 2844)
    • Runs injected code in another process

      • iexplore.exe (PID: 3040)
    • Application was dropped or rewritten from another process

      • sheepmgr.exe (PID: 2356)
    • Actions looks like stealing of personal data

      • explorer.exe (PID: 1784)
    • Changes the autorun value in the registry

      • reg.exe (PID: 3992)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • sheep.exe (PID: 3436)
    • Starts Internet Explorer

      • sheepmgr.exe (PID: 2356)
    • Creates files in the program directory

      • iexplore.exe (PID: 2844)
    • Creates files in the user directory

      • Skype.exe (PID: 3572)
      • Skype.exe (PID: 1468)
      • Skype.exe (PID: 3376)
    • Application launched itself

      • Skype.exe (PID: 3572)
      • Skype.exe (PID: 1468)
      • Skype.exe (PID: 3376)
    • Reads CPU info

      • Skype.exe (PID: 3572)
    • Uses REG.EXE to modify Windows registry

      • Skype.exe (PID: 3572)
    • Modifies the open verb of a shell class

      • Skype.exe (PID: 3572)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 2844)
    • Reads the hosts file

      • Skype.exe (PID: 3572)
    • Dropped object may contain Bitcoin addresses

      • Skype.exe (PID: 3572)
    • Reads settings of System Certificates

      • Skype.exe (PID: 3572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (21.4)
.exe | Win64 Executable (generic) (14.2)
.exe | Win32 Executable (generic) (2.3)
.exe | Generic Win/DOS Executable (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:11:15 22:25:30+01:00
PEType: PE32
LinkerVersion: 10
CodeSize: 12790272
InitializedDataSize: 4169728
UninitializedDataSize: -
EntryPoint: 0x1031000
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 5.2.3.53610
ProductVersionNumber: 5.2.3.53610
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 5.2.3.15978858
ProductVersion: 5.2.3.15978858
UnityVersion: 5.2.3f1_f3d16a1fa2dd

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 15-Nov-2015 21:25:30
Detected languages:
  • English - United States
Debug artifacts:
  • C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb
FileVersion: 5.2.3.15978858
ProductVersion: 5.2.3.15978858
Unity Version: 5.2.3f1_f3d16a1fa2dd

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000138

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 9
Time date stamp: 15-Nov-2015 21:25:30
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x01031000
0x00022000
0x00021C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.54632
.rdata
0x00C34000
0x001D4E00
0x001D4E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.20707
.data
0x00E09000
0x00115840
0x00056C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.05327
.trace
0x00F1F000
0x00001D98
0x00001E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.28551
.data1
0x00F21000
0x00000040
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.436447
_RDATA
0x00F22000
0x00000540
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.12448
.rsrc
0x00F23000
0x0008A678
0x0008A800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.57812
.reloc
0x00FAE000
0x00082954
0x00082A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
5.6185

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.37424
1409
UNKNOWN
English - United States
RT_MANIFEST
2
4.61125
2440
UNKNOWN
English - United States
RT_ICON
3
4.11959
4264
UNKNOWN
English - United States
RT_ICON
4
4.05353
9640
UNKNOWN
English - United States
RT_ICON
5
3.76721
16936
UNKNOWN
English - United States
RT_ICON
6
3.73979
38056
UNKNOWN
English - United States
RT_ICON
7
3.57675
67624
UNKNOWN
English - United States
RT_ICON
8
3.58825
152104
UNKNOWN
English - United States
RT_ICON
9
2.99471
292
UNKNOWN
English - United States
RT_DIALOG
103
3.04448
132
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
DNSAPI.dll
GDI32.dll
HID.DLL
IMM32.dll
IPHLPAPI.DLL
KERNEL32.dll
MSACM32.dll
OLEAUT32.dll
OPENGL32.dll

Exports

Title
Ordinal
Address
??$Transfer@V?$StreamedBinaryRead@$00@@@AnimationEvent@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
1
0x00466A40
??$Transfer@V?$StreamedBinaryRead@$00@@@Behaviour@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
2
0x0012E6C0
??$Transfer@V?$StreamedBinaryRead@$00@@@Component@Unity@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
3
0x000109B0
??$Transfer@V?$StreamedBinaryRead@$00@@@GameObject@Unity@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
4
0x00011960
??$Transfer@V?$StreamedBinaryRead@$00@@@GlobalGameManager@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
5
0x0053DC20
??$Transfer@V?$StreamedBinaryRead@$00@@@LevelGameManager@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
6
0x0053DC20
??$Transfer@V?$StreamedBinaryRead@$00@@@NamedObject@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
7
0x00017380
??$Transfer@V?$StreamedBinaryRead@$00@@@Object@@IAEXAAV?$StreamedBinaryRead@$00@@@Z
8
0x0025BEB0
??$Transfer@V?$StreamedBinaryRead@$00@@@Renderer@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
9
0x0011AA90
??$Transfer@V?$StreamedBinaryRead@$00@@@Terrain@@QAEXAAV?$StreamedBinaryRead@$00@@@Z
10
0x004D0FB0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
20
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start inject inject inject inject sheep.exe sheepmgr.exe no specs iexplore.exe iexplore.exe no specs taskeng.exe dwm.exe explorer.exe ctfmon.exe windanr.exe skype.exe skype.exe reg.exe skype.exe no specs reg.exe no specs skype.exe skype.exe no specs skype.exe skype.exe no specs skype.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3436"C:\Users\admin\AppData\Local\Temp\sheep.exe" C:\Users\admin\AppData\Local\Temp\sheep.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Version:
5.2.3.15978858
2356C:\Users\admin\AppData\Local\Temp\sheepmgr.exeC:\Users\admin\AppData\Local\Temp\sheepmgr.exesheep.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2844"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe
sheepmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3040"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exesheepmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1580taskeng.exe {D5FDA578-4A8E-4D92-89E9-C1DF61B7B0A2}C:\Windows\System32\taskeng.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Engine
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1648"C:\Windows\system32\Dwm.exe"C:\Windows\System32\dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1784C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1816C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2196"windanr.exe"C:\Windows\system32\windanr.exe
q.exe
User:
admin
Integrity Level:
MEDIUM
3572"C:\Program Files\Microsoft\Skype for Desktop\Skype.exe" C:\Program Files\Microsoft\Skype for Desktop\Skype.exe
explorer.exe
User:
admin
Company:
Skype Technologies S.A.
Integrity Level:
MEDIUM
Description:
Skype
Version:
8.29.0.50
Total events
1 849
Read events
1 408
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
5
Text files
14
Unknown types
100

Dropped files

PID
Process
Filename
Type
2844iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\enbfqohg.exe
MD5:
SHA256:
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Liesmich.htmhtml
MD5:812692D494B5B14B2F73AC10D61F24D4
SHA256:58AA4791F92E67E28CDF04BE53493789B8A4531B3C0DFD0DF5B0659643469D69
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Leame.htmhtml
MD5:3843A8B8BD9283E74AD7741539F93164
SHA256:76CCCA9CAA74BD621CB3E6F7FF49E9A0875DB6C3CDD9813BE84AC46814953AC6
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Berime.htmhtml
MD5:0350D296EFF48B6C64D78C70755AD784
SHA256:CFE7BE4B099E6E47C56842627A94294D3B3A08A57EA4163BB6B9CB0184D9655A
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Leggimi.htmhtml
MD5:F0DC2262409256029AAA318EE78573AB
SHA256:F86AF21F97FFE902E47E0C4C434CF29C8D61A4DF07E90FF04B07E6C5BA23CFF2
3436sheep.exeC:\Users\admin\AppData\Local\Temp\sheepmgr.exeexecutable
MD5:EBC35BF5774A4B75CD45638CECB74DB3
SHA256:52C970B575040B26C6C357F1AA64288544578A229B9BE70ACD0F860F55CCA346
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Benioku.htmhtml
MD5:3D0EB1C752DF19C5B8D8F242E510AD57
SHA256:27015CFCE240827CC8FABDCE71E7F2AB28A7CB0ED4C6DF742FB7A0F5E262DDA0
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\IrakHau.htmhtml
MD5:7F3C94FBC9B87D4332E2FB8F61CA2C0B
SHA256:C3C5B8823EE896F682A90C2A28D548EB147FE25CB601B4C46D710F90152D64EA
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Reader\Legal\CAT\license.htmlgpx
MD5:9C8B58E65553BADBE4B33169C74B9E9A
SHA256:374A8CFD4712BAB381A1D9D9C2DA8BF6AD8A9D658C9297552FFBECA34790A53B
2844iexplore.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Lisezmoi.htmhtml
MD5:EAF30E831883264F4CE5143D34A3A04D
SHA256:4398CB64552ECBDB35CCC8152FF231DBE032FC3837FCAC1ABED3B2A41150BC9C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
17
DNS requests
13
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2844
iexplore.exe
172.217.23.174:80
google.com
Google Inc.
US
whitelisted
3572
Skype.exe
2.18.233.81:443
download.skype.com
Akamai International B.V.
whitelisted
2844
iexplore.exe
82.112.184.197:447
supnewdmn.com
Vysokie tehnologii Limited Liability Company
RU
malicious
3572
Skype.exe
216.58.212.138:443
www.googleapis.com
Google Inc.
US
whitelisted
3572
Skype.exe
52.233.180.130:443
avatar.skype.com
Microsoft Corporation
NL
unknown
3572
Skype.exe
13.107.42.23:443
a.config.skype.com
Microsoft Corporation
US
suspicious
3572
Skype.exe
52.174.193.75:443
get.skype.com
Microsoft Corporation
NL
whitelisted
3572
Skype.exe
152.199.19.160:443
bot-framework.azureedge.net
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2844
iexplore.exe
52.16.225.15:447
tvrstrynyvwstrtve.com
Amazon.com, Inc.
IE
whitelisted
3572
Skype.exe
52.114.133.60:443
browser.pipe.aria.microsoft.com
Microsoft Corporation
US
suspicious

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.23.174
whitelisted
supnewdmn.com
  • 82.112.184.197
malicious
get.skype.com
  • 52.174.193.75
whitelisted
a.config.skype.com
  • 13.107.42.23
whitelisted
download.skype.com
  • 2.18.233.81
whitelisted
www.googleapis.com
  • 216.58.212.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.22.106
  • 172.217.21.202
  • 216.58.212.170
  • 172.217.23.138
  • 172.217.22.10
  • 216.58.206.10
  • 172.217.18.10
  • 172.217.18.170
  • 216.58.207.42
  • 216.58.207.74
  • 172.217.16.138
  • 216.58.210.10
  • 172.217.18.106
whitelisted
avatar.skype.com
  • 52.233.180.130
whitelisted
bot-framework.azureedge.net
  • 152.199.19.160
whitelisted
config.edge.skype.com
  • 13.107.42.23
whitelisted
tvrstrynyvwstrtve.com
  • 52.16.225.15
malicious

Threats

No threats detected
Process
Message
Skype.exe
[3276:3284:0530/061501.453:VERBOSE1:crash_service_main.cc(78)] Session start. cmdline is [--reporter-url=https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload --application-name=skype-preview "--crashes-directory=C:\Users\admin\AppData\Local\Temp\skype-preview Crashes" --v=1]
Skype.exe
[3276:3284:0530/061501.454:VERBOSE1:crash_service.cc(145)] window handle is 0001014C
Skype.exe
[3276:3284:0530/061501.454:VERBOSE1:crash_service.cc(300)] pipe name is \\.\pipe\skype-preview Crash Service dumps at C:\Users\admin\AppData\Local\Temp\skype-preview Crashes
Skype.exe
[3276:3284:0530/061501.455:VERBOSE1:crash_service.cc(304)] checkpoint is C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\crash_checkpoint.txt server is https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload maximum 128 reports/day reporter is electron-crash-service
Skype.exe
[3276:3284:0530/061501.455:ERROR:crash_service.cc(311)] could not start dumper
Skype.exe
[2440:2400:0530/061505.771:VERBOSE1:crash_service_main.cc(78)] Session start. cmdline is [--reporter-url=https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload --application-name=skype-preview "--crashes-directory=C:\Users\admin\AppData\Local\Temp\skype-preview Crashes" --v=1]
Skype.exe
[2440:2400:0530/061505.771:VERBOSE1:crash_service.cc(145)] window handle is 00010154
Skype.exe
[2440:2400:0530/061505.774:VERBOSE1:crash_service.cc(300)] pipe name is \\.\pipe\skype-preview Crash Service dumps at C:\Users\admin\AppData\Local\Temp\skype-preview Crashes
Skype.exe
[2440:2400:0530/061505.774:VERBOSE1:crash_service.cc(304)] checkpoint is C:\Users\admin\AppData\Local\Temp\skype-preview Crashes\crash_checkpoint.txt server is https://rink.hockeyapp.net/api/2/apps/a741743329d94bc08826af367733939d/crashes/upload maximum 128 reports/day reporter is electron-crash-service
Skype.exe
[2440:2400:0530/061505.774:ERROR:crash_service.cc(311)] could not start dumper