File name:

HorrorBob2.exe

Full analysis: https://app.any.run/tasks/7ca13ed1-9b2e-4bec-b37a-818ab29696a4
Verdict: Malicious activity
Analysis date: December 01, 2024, 16:00:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

9331B20120075B2685D3888C196F2E34

SHA1:

1AF7D3DC4576EF8AAA06FA3199CF422B7657950B

SHA256:

98A804D373C7E0E4F80155DF20358436E066ECF31C522C31DF2BA46923AC68C2

SSDEEP:

196608:zHvwfYWqhZPHE5D7cdPNPi17S+IRTX7UYVlj0EcLnKXanF6eeBUsjD2ABShiFiJj:vZ8R7c5527SpRTXQYVlYEGnKKF6eeWg6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Disables Windows Defender

      • reg.exe (PID: 2052)
    • Changes the autorun value in the registry

      • reg.exe (PID: 3164)
    • UAC/LUA settings modification

      • reg.exe (PID: 3172)
    • Starts NET.EXE to view/add/change user profiles

      • net.exe (PID: 3176)
      • cmd.exe (PID: 2896)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HorrorBob2.exe (PID: 2256)
      • cmd.exe (PID: 2896)
      • Service64.exe (PID: 2128)
      • cmd.exe (PID: 2352)
    • Reads security settings of Internet Explorer

      • HorrorBob2.exe (PID: 2256)
    • Reads the Internet Settings

      • HorrorBob2.exe (PID: 2256)
    • Changes the desktop background image

      • reg.exe (PID: 2816)
      • reg.exe (PID: 1776)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 2896)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2896)
    • Executing commands from a ".bat" file

      • HorrorBob2.exe (PID: 2256)
      • Service64.exe (PID: 2128)
      • BobLauncher.exe (PID: 2384)
      • RulesLauncher.exe (PID: 2392)
    • Starts CMD.EXE for commands execution

      • HorrorBob2.exe (PID: 2256)
      • Service64.exe (PID: 2128)
      • BobLauncher.exe (PID: 2384)
      • RulesLauncher.exe (PID: 2392)
    • The process executes VB scripts

      • cmd.exe (PID: 2896)
    • The system shut down or reboot

      • cmd.exe (PID: 2896)
    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 1572)
      • ctfmon.exe (PID: 1404)
    • The executable file from the user directory is run by the CMD process

      • BobLauncher.exe (PID: 2384)
      • RulesLauncher.exe (PID: 2392)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 2352)
  • INFO

    • Create files in a temporary directory

      • HorrorBob2.exe (PID: 2256)
    • Reads the computer name

      • HorrorBob2.exe (PID: 2256)
    • Checks supported languages

      • HorrorBob2.exe (PID: 2256)
    • The process uses the downloaded file

      • HorrorBob2.exe (PID: 2256)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 2272)
    • UPX packer has been detected

      • HorrorBob2.exe (PID: 2256)
    • Reads the time zone

      • net1.exe (PID: 1996)
    • Manual execution by a user

      • IMEKLMG.EXE (PID: 2096)
      • IMEKLMG.EXE (PID: 2112)
      • Service64.exe (PID: 2128)
      • wmpnscfg.exe (PID: 2728)
      • wmpnscfg.exe (PID: 2788)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:08 13:12:07+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 12460032
InitializedDataSize: 4096
UninitializedDataSize: 3452928
EntryPoint: 0xf2c6c0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: NO!!!
FileVersion: 2,0,0,0
ProductVersion: 2,0,0,0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
30
Malicious processes
2
Suspicious processes
4

Behavior graph

Click at the process to see the details
start horrorbob2.exe cmd.exe cscript.exe no specs reg.exe no specs reg.exe no specs rundll32.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe net.exe no specs net1.exe no specs shutdown.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs service64.exe cmd.exe boblauncher.exe no specs ruleslauncher.exe no specs cmd.exe no specs cmd.exe no specs vlc.exe no specs timeout.exe no specs sbob.exe no specs rules32.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs horrorbob2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1404"C:\Users\admin\AppData\Local\Temp\HorrorBob2.exe" C:\Users\admin\AppData\Local\Temp\HorrorBob2.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\horrorbob2.exe
c:\windows\system32\ntdll.dll
1404C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CTF Loader
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1572C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1776reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\Service64\blood.bmp /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1996C:\Windows\system32\net1 user admin /fullname:"SPONGEBOB IS WATCHING YOU!"C:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
2052Reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2096"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2112"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2128"C:\Service64\Service64.exe" C:\Service64\Service64.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\service64\service64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2256"C:\Users\admin\AppData\Local\Temp\HorrorBob2.exe" C:\Users\admin\AppData\Local\Temp\HorrorBob2.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\horrorbob2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
6 164
Read events
6 109
Write events
54
Delete events
1

Modification events

(PID) Process:(2256) HorrorBob2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2256) HorrorBob2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2256) HorrorBob2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2256) HorrorBob2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2604) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:DisableTaskMgr
Value:
1
(PID) Process:(1776) reg.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:Wallpaper
Value:
c:\Service64\blood.bmp
(PID) Process:(2816) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
Operation:writeName:NoChangingWallPaper
Value:
1
(PID) Process:(2052) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
Operation:writeName:DisableAntiSpyware
Value:
1
(PID) Process:(3172) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLUA
Value:
0
(PID) Process:(3164) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Acer NitroSense Update
Value:
C:\Service64\Service64.exe
Executable files
14
Suspicious files
1
Text files
14
Unknown types
0

Dropped files

PID
Process
Filename
Type
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\clingclang.wav
MD5:
SHA256:
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\endpc.exeexecutable
MD5:4ACAAA74997F3F2FA44E7FB9CA0CDE57
SHA256:BFF77D77ECD459BD9002978B47F7B5F2FDB45ECDE752EDB88D101E2E921D0243
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\rules32.exeexecutable
MD5:B364D94B2C8197C16EBF1DA95486E587
SHA256:1BB6E2850C2BFD953DF42F72A4A99C5762E7D005754404FD3E0D8D722CC3947A
2352cmd.exeC:\Service64\rules32.exeexecutable
MD5:B364D94B2C8197C16EBF1DA95486E587
SHA256:1BB6E2850C2BFD953DF42F72A4A99C5762E7D005754404FD3E0D8D722CC3947A
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\inv.exeexecutable
MD5:EBB811D0396C06A70FE74D9B23679446
SHA256:28E979002CB4DB546BF9D9D58F5A55FD8319BE638A0974C634CAE6E7E9DBCD89
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\BobLauncher.exeexecutable
MD5:B44D2B6F7B4351EEB00137B1AEBB83C4
SHA256:3623BE22B2F67981547E223BDDEC99B8CEEB3FB065212FF3DA076A3EF0A8C813
2352cmd.exeC:\Service64\sbob.exeexecutable
MD5:FA4B6BE9B66283FF8EC4B2FE856E4A8B
SHA256:9D85D06FCCD76500F5E5E58C1CDBC4781EEAFD4F7ECA0B2EA964531D3B4226F0
2128Service64.exeC:\Users\admin\AppData\Local\Temp\605F.tmp\Service64.battext
MD5:141BD03FB7E15FFBF38DB5879F3879C1
SHA256:61601569A5BA964E81C80E020350C4EB0CF4D3AB30A259BB356A5DEC68871DC5
2256HorrorBob2.exeC:\Users\admin\AppData\Local\Temp\9B96.tmp\blood.bmpimage
MD5:040D29B801E3488F7AEE3F9708128EEA
SHA256:FE28980C6E213619A95E5991DE2062A0187FC3054418E670E1C67D3C5B6B01DE
2896cmd.exeC:\Service64\blood.bmpimage
MD5:040D29B801E3488F7AEE3F9708128EEA
SHA256:FE28980C6E213619A95E5991DE2062A0187FC3054418E670E1C67D3C5B6B01DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1572
sipnotify.exe
HEAD
200
104.101.237.73:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133775424947340000
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
query.prod.cms.rt.microsoft.com
  • 104.101.237.73
whitelisted

Threats

No threats detected
No debug info