| File name: | Telegram Desktop.exe |
| Full analysis: | https://app.any.run/tasks/2151d2bc-c158-4cd0-8ab7-941803442479 |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | November 24, 2023, 07:05:46 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 1D156EA00258D8C5ED190AB425B6BF67 |
| SHA1: | 92014A052C4654A167E933702D8B12B13CA6A90D |
| SHA256: | 96890D1D86AAD9940FD54604EF09DD7E2DCF5CC084EEAF63A1062B4FBEAD91AE |
| SSDEEP: | 98304:iFgMEhr3Or19KXlcw1CdU2uP318hXjETV:uzGrO4n2uP3iwV |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:01:17 17:23:53+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.33 |
| CodeSize: | 208384 |
| InitializedDataSize: | 117760 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x20600 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | netsh wlan show profile | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 712 | Timeout /T 2 /Nobreak | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 776 | TaskKill /F /IM 2668 | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 776 | "C:\Users\admin\Desktop\CHEAT and Bypass Matrix.exe" | C:\Users\admin\Desktop\CHEAT and Bypass Matrix.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 780 | schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\admin\PrintHood\wininit.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1092 | C:\Windows\system32\msiexec.exe /V | C:\Windows\System32\msiexec.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1176 | netsh wlan show networks mode=bssid | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1212 | findstr All | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1212 | "C:\Windows\System32\cmd.exe" /C C:\Users\admin\AppData\Local\Temp\tmp5321.tmp.bat | C:\Windows\System32\cmd.exe | — | RussiaHack.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1224 | "C:\Program Files (x86)\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /Log | C:\Program Files (x86)\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE | — | runonce.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office IME 2010 Exit code: 0 Version: 14.0.4734.1000 Modules
| |||||||||||||||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | Browse For Folder Width |
Value: 318 | |||
| (PID) Process: | (3020) Telegram Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | Browse For Folder Height |
Value: 288 | |||
| (PID) Process: | (2668) RussiaHack.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3020 | Telegram Desktop.exe | C:\Users\admin\Desktop\VapeInstaller.exe | executable | |
MD5:9238BE200DBF0DBE0466EBFF4DB56301 | SHA256:0758146425C10208D3C8000B444E5F3D1EF203918E1B60A9F9F01214564FB9C5 | |||
| 3020 | Telegram Desktop.exe | C:\Users\admin\Desktop\MatrixHackByFilard.exe | executable | |
MD5:05C3624435FDA6BDDFD80B5D337EB2A4 | SHA256:96A14D1422DC0F5889CDB4D2E110B5DAC6C638167509DDF728B9C84F3AF40AAE | |||
| 3020 | Telegram Desktop.exe | C:\Users\admin\Desktop\RussiaHack.exe | executable | |
MD5:65FADDAB9784289F8BA392F328871227 | SHA256:F250BC5734FFAD4A59E2CB017F85E495FC8070056C01C5002470567B7179F62D | |||
| 3020 | Telegram Desktop.exe | C:\Users\admin\Desktop\Matrix Bypass.exe | executable | |
MD5:9238BE200DBF0DBE0466EBFF4DB56301 | SHA256:0758146425C10208D3C8000B444E5F3D1EF203918E1B60A9F9F01214564FB9C5 | |||
| 2668 | RussiaHack.exe | C:\Users\admin\AppData\Local\37a9952135d8c9fb12ba8336c392013e\admin@USER-PC_en-US\Grabber\DRIVE-C\Users\admin\Pictures\seniorbuilt.png | image | |
MD5:515BF30291C0105CEAC71DEDDEBA7F14 | SHA256:2F1924A1EF200FC12049DE11DCAF20C53FFB3CF6CCF7EF26ECCED24DEBEBC831 | |||
| 2668 | RussiaHack.exe | C:\Users\admin\AppData\Local\Temp\tmp679.tmp.dat | — | |
MD5:— | SHA256:— | |||
| 2668 | RussiaHack.exe | C:\Users\admin\AppData\Local\37a9952135d8c9fb12ba8336c392013e\admin@USER-PC_en-US\Grabber\DRIVE-C\Users\admin\Desktop\policiesroyal.rtf | text | |
MD5:5A48A1C552409747B5E1F3912501B886 | SHA256:96F21349A70EBDC3DBBE3B759C28F0E3FDC0281FBE97ADBFD955B4FBC360AB09 | |||
| 2668 | RussiaHack.exe | C:\Users\admin\AppData\Local\37a9952135d8c9fb12ba8336c392013e\admin@USER-PC_en-US\Grabber\DRIVE-C\Users\admin\Desktop\mapaustralia.png | image | |
MD5:C57347272AE612794D3F73F3E9D0EA22 | SHA256:A1CAF0C148086F3D1ABB79580F88E1AA14D882CAD5CB9B9993E2209EB77A59AC | |||
| 2668 | RussiaHack.exe | C:\Users\admin\AppData\Local\37a9952135d8c9fb12ba8336c392013e\admin@USER-PC_en-US\Grabber\DRIVE-C\Users\admin\Desktop\doform.rtf | text | |
MD5:2E200EA1657F05B7AD37B5049B3D4181 | SHA256:46A3014BFA9F7977E019B954317187ACE6C2B80B44E2058664232BD92C0F19B7 | |||
| 2668 | RussiaHack.exe | C:\Users\admin\Desktop\DotNetZip.dll | executable | |
MD5:6D1C62EC1C2EF722F49B2D8DD4A4DF16 | SHA256:00DA1597D92235D3F84DA979E2FA5DBF049BAFB52C33BD6FC8EE7B29570C124C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2668 | RussiaHack.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | text | 5 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 104.18.114.97:80 | http://icanhazip.com/ | unknown | text | 13 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | text | 5 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 104.18.114.97:80 | http://icanhazip.com/ | unknown | text | 13 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 104.18.114.97:80 | http://icanhazip.com/ | unknown | text | 13 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | text | 5 b | unknown |
2668 | RussiaHack.exe | GET | 200 | 23.216.77.47:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5204047a655e388f | unknown | compressed | 61.6 Kb | unknown |
2088 | MatrixHackByFilard.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | text | 5 b | unknown |
2088 | MatrixHackByFilard.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | text | 5 b | unknown |
2088 | MatrixHackByFilard.exe | GET | 200 | 104.18.115.97:80 | http://icanhazip.com/ | unknown | text | 13 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1580 | Matrix Bypass.exe | 194.87.248.102:3000 | — | JSC Mediasoft ekspert | RU | unknown |
2668 | RussiaHack.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
2668 | RussiaHack.exe | 185.199.108.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
2668 | RussiaHack.exe | 149.154.167.220:443 | api.telegram.org | Telegram Messenger Inc | GB | unknown |
2668 | RussiaHack.exe | 104.18.114.97:80 | icanhazip.com | CLOUDFLARENET | — | unknown |
2668 | RussiaHack.exe | 172.67.196.114:443 | api.mylnikov.org | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
ip-api.com |
| shared |
raw.githubusercontent.com |
| shared |
api.telegram.org |
| shared |
icanhazip.com |
| shared |
api.anonfiles.com |
| unknown |
api.mylnikov.org |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
teredo.ipv6.microsoft.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1580 | Matrix Bypass.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/HunterStealer/AlfonsoStealer/PhoenixStealer CnC Exfil |
2668 | RussiaHack.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
2668 | RussiaHack.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
2668 | RussiaHack.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
324 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
2668 | RussiaHack.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
2668 | RussiaHack.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |
2668 | RussiaHack.exe | Attempted Information Leak | ET POLICY IP Check Domain (icanhazip. com in HTTP Host) |
2668 | RussiaHack.exe | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] Received IP address from server as result of HTTP request |
2668 | RussiaHack.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |