analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

margin1.exe

Full analysis: https://app.any.run/tasks/9b3b634c-fe94-4e0f-9ab6-c2331526f952
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 18, 2019, 16:38:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A6598864C76E0B6EDAD95F8DECFF3C33

SHA1:

088BA69080708C248337ABDF904DC037E82FFE85

SHA256:

99B98B2076B31543EF11478CE400D508C89D37420EF79584367F65FBF00C394E

SSDEEP:

49152:Bntw0SBIa+qIeI7bEtcbEApkhalOqx/K7jlkZ4uWb+vDw7/Eb0O:1tw0S0eI77EApk+Oqxyle4bEb0O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • margin1.exe (PID: 3704)
    • Stealing of credential data

      • margin1.exe (PID: 3704)
  • SUSPICIOUS

    • Reads the cookies of Mozilla Firefox

      • margin1.exe (PID: 3704)
    • Reads the cookies of Google Chrome

      • margin1.exe (PID: 3704)
    • Loads DLL from Mozilla Firefox

      • margin1.exe (PID: 3704)
    • Creates files in the program directory

      • margin1.exe (PID: 3704)
    • Checks for external IP

      • margin1.exe (PID: 3704)
    • Starts CMD.EXE for commands execution

      • margin1.exe (PID: 3704)
    • Starts CMD.EXE for self-deleting

      • margin1.exe (PID: 3704)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3640)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:09:16 16:17:46+02:00
PEType: PE32
LinkerVersion: 14
CodeSize: 546816
InitializedDataSize: 388096
UninitializedDataSize: -
EntryPoint: 0x566000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Sep-2019 14:17:46
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 16-Sep-2019 14:17:46
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
0x00001000
0x000A9000
0x0005E600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.98827
.rsrc
0x000AA000
0x000393B5
0x00039400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.99596
.idata
0x000E4000
0x00001000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.30872
0x000E5000
0x002AA000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.256865
adaykslp
0x0038F000
0x001D7000
0x001D7000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.95841
irhphljv
0x00566000
0x00001000
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.31362

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91161
381
UNKNOWN
English - United States
RT_MANIFEST
2
2.26816
48
UNKNOWN
UNKNOWN
RT_GROUP_ICON
3
7.95461
49442
UNKNOWN
UNKNOWN
RT_ICON
4
7.96862
30629
UNKNOWN
UNKNOWN
RT_ICON
5
7.92897
38965
UNKNOWN
UNKNOWN
RT_ICON
6
7.93546
42255
UNKNOWN
UNKNOWN
RT_ICON

Imports

comctl32.dll
kernel32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start margin1.exe cmd.exe no specs cmd.exe no specs reg.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3704"C:\Users\admin\AppData\Local\Temp\margin1.exe" C:\Users\admin\AppData\Local\Temp\margin1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3640"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Cryptbot Software\Cryptbot" /v margin /d C:\ProgramData\Cryptbot\margin.exe /FC:\Windows\system32\cmd.exemargin1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3776"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\ZVZIisylxV & timeout 2 & del /f /q "C:\Users\admin\AppData\Local\Temp\margin1.exe"C:\Windows\system32\cmd.exemargin1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3052reg add "HKCU\Software\Cryptbot Software\Cryptbot" /v margin /d C:\ProgramData\Cryptbot\margin.exe /FC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3308timeout 2 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
143
Read events
114
Write events
29
Delete events
0

Modification events

(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3704) margin1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\margin1_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
0
Suspicious files
1
Text files
76
Unknown types
2

Dropped files

PID
Process
Filename
Type
3704margin1.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LoginDataCopy
MD5:
SHA256:
3704margin1.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\WebDataCopy
MD5:
SHA256:
3704margin1.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\CookiesCopy
MD5:
SHA256:
3704margin1.exeC:\ProgramData\ZVZIisylxV\moz_cookies.db-shm
MD5:
SHA256:
3704margin1.exeC:\ProgramData\ZVZIisylxV\Files\Browsers\Cookies\Mozilla_Firefox_Cookies_m5d6ZFn.txttext
MD5:C15AB2362A2937CC6F5DF93A492AE85A
SHA256:503E218AD3E9092517FC49A49CC69CAFDA2644E6E0F40DE651A82BED0A200450
3704margin1.exeC:\ProgramData\ZVZIisylxV\Files\Browsers\_FileForms.txttext
MD5:31E4EA45CAE3503791D9D132CF645960
SHA256:8E06B361FFC4E9B3AFD360B3A0BFFE0929A3689B2532A316DA9CEA29BF2A9E39
3704margin1.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\line[1].txttext
MD5:50C386FE5E084E643E6D99F5C3E08814
SHA256:BDABEE7D831170FC58528345A737084EB6082C2A1970ACAD086D0D67E3175DE4
3704margin1.exeC:\ProgramData\ZVZIisylxV\Files\Browsers\_FileCookies.txttext
MD5:81051BCC2CF1BEDF378224B0A93E2877
SHA256:7EB70257593DA06F682A3DDDA54A9D260D4FC514F645237F5CA74B08F8DA61A6
3704margin1.exeC:\ProgramData\ZVZIisylxV\Dk84BoWGakZg.zipcompressed
MD5:9F48ADBA43CAE63791D5DBF7517619B9
SHA256:7CE9BC641FE7FB9FF017720C4EFCA929799C5091E3E8D7477B702CC32468070D
3704margin1.exeC:\ProgramData\ZVZIisylxV\47283761.txttext
MD5:50C386FE5E084E643E6D99F5C3E08814
SHA256:BDABEE7D831170FC58528345A737084EB6082C2A1970ACAD086D0D67E3175DE4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3704
margin1.exe
GET
200
185.194.141.58:80
http://ip-api.com/line
DE
text
145 b
shared
3704
margin1.exe
POST
200
8.208.12.71:80
http://lyn01.info/index.php
US
text
3 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3704
margin1.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
3704
margin1.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
3704
margin1.exe
8.208.12.71:80
lyn01.info
Level 3 Communications, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
ip-api.com
  • 185.194.141.58
shared
lyn01.info
  • 8.208.12.71
malicious
iplogger.org
  • 88.99.66.31
shared

Threats

PID
Process
Class
Message
3704
margin1.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3704
margin1.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
3704
margin1.exe
Misc activity
SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7)
3704
margin1.exe
A Network Trojan was detected
MALWARE [PTsecurity] Stealer.BrowserPassview
3704
margin1.exe
A Network Trojan was detected
ET TROJAN Suspicious Zipped Filename in Outbound POST Request (Mozilla_Firefox_Cookies) M2
3704
margin1.exe
A Network Trojan was detected
MALWARE [PTsecurity] Stealer.BrowserPassview
4 ETPRO signatures available at the full report
Process
Message
margin1.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------