File name:

今天下发这笔帐核对不上 你对一下.exe

Full analysis: https://app.any.run/tasks/39ca406b-5ce1-4966-a33d-0c9ee6032cd1
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 28, 2023, 17:17:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

50351169D2EE00143091254FC7E8B3AB

SHA1:

107FDE3D614214CA7F19F6B30A3503C9195081DE

SHA256:

9BC0ED117D8A77D27C18B65230CAFA1500705786D167BA234744717DA1599D34

SSDEEP:

48:auUB/CWhbJ0r3o8Yj5AQc0TBz8SYX7zL2fKsV3JlPgNoyl1TgcIuMAn:+VxJhO2BYSYrAKC3jgNoyn0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
    • Process requests binary or script from the Internet

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
    • Reads the date of Windows installation

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
  • INFO

    • Creates files in the program directory

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
    • The process checks LSA protection

      • conhost.exe (PID: 6292)
      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
      • Taskmgr.exe (PID: 6812)
      • LiveUpdate.exe (PID: 1960)
    • Reads the computer name

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
      • LiveUpdate.exe (PID: 1960)
    • Checks supported languages

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
      • LiveUpdate.exe (PID: 1960)
    • Checks proxy server information

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
    • Creates files or folders in the user directory

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
    • Manual execution by a user

      • Taskmgr.exe (PID: 6532)
      • Taskmgr.exe (PID: 6812)
    • Process checks computer location settings

      • 今天下发这笔帐核对不上 你对一下.exe (PID: 6012)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

Subsystem: Windows command line
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x15a0
UninitializedDataSize: -
InitializedDataSize: 12288
CodeSize: 4096
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2023:04:12 16:04:49+00:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date: 12-Apr-2023 16:04:49

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 12-Apr-2023 16:04:49
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000007E2
0x00001000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
3.47336
.rdata
0x00002000
0x000004F6
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.83572
.data
0x00003000
0x00000398
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.763146
.rsrc
0x00004000
0x00000010
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0

Imports

KERNEL32.dll
MFC42.DLL
MSVCP60.dll
MSVCRT.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 今天下发这笔帐核对不上 你对一下.exe conhost.exe no specs taskmgr.exe no specs taskmgr.exe liveupdate.exe no specs liveupdate.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1960"C:\ProgramData\ThunderUpdate\LiveUpdate.exe" C:\ProgramData\ThunderUpdate\LiveUpdate.exe
今天下发这笔帐核对不上 你对一下.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
HIGH
Description:
TrueUpdate Client
Exit code:
107
Version:
3.8.0.0
Modules
Images
c:\programdata\thunderupdate\liveupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3852"C:\ProgramData\ThunderUpdate\LiveUpdate.exe" C:\ProgramData\ThunderUpdate\LiveUpdate.exe今天下发这笔帐核对不上 你对一下.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
TrueUpdate Client
Exit code:
3221226540
Version:
3.8.0.0
Modules
Images
c:\programdata\thunderupdate\liveupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4068C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
6012"C:\Users\admin\AppData\Local\Temp\今天下发这笔帐核对不上 你对一下.exe" C:\Users\admin\AppData\Local\Temp\今天下发这笔帐核对不上 你对一下.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\今天下发这笔帐核对不上 你对一下.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6292\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe今天下发这笔帐核对不上 你对一下.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6532"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.1202 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
6812"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.1202 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 654
Read events
5 632
Write events
20
Delete events
2

Modification events

(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6012) 今天下发这笔帐核对不上 你对一下.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6812) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
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
Executable files
6
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6012今天下发这笔帐核对不上 你对一下.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\LiveUpdate[1].exeexecutable
MD5:96E4B47A136910D6F588B40D872E7F9D
SHA256:F788ED739241F79688653D27AEEFD18C9D8142A31FE0B5342535E392C040DD9B
6012今天下发这笔帐核对不上 你对一下.exeC:\ProgramData\ThunderUpdate\LiveUpdate.exeexecutable
MD5:96E4B47A136910D6F588B40D872E7F9D
SHA256:F788ED739241F79688653D27AEEFD18C9D8142A31FE0B5342535E392C040DD9B
6812Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\3534848bb9f4cb71\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
6012今天下发这笔帐核对不上 你对一下.exeC:\ProgramData\Thunder\LiveUpdate.exeexecutable
MD5:96E4B47A136910D6F588B40D872E7F9D
SHA256:F788ED739241F79688653D27AEEFD18C9D8142A31FE0B5342535E392C040DD9B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
43
DNS requests
17
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6012
今天下发这笔帐核对不上 你对一下.exe
GET
104.21.19.110:80
http://imgcache.vip033324.xyz/picturess/2023/30.45.txt
US
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
104.21.19.110:80
http://imgcache.vip033324.xyz/picturess/2023/Mediax.xml
US
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
172.67.185.250:80
http://imgcache.vip033324.xyz/picturess/2023/update.log
US
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
172.67.185.250:80
http://imgcache.vip033324.xyz/picturess/2023/LiveUpdate360.dat
US
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
172.67.185.250:80
http://imgcache.vip033324.xyz/picturess/2023/LiveUpdate360.dat
US
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
200
104.21.19.110:80
http://imgcache.vip033324.xyz/picturess/2023/LiveUpdate.exe
US
executable
470 Kb
suspicious
5952
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
der
814 b
whitelisted
5952
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
binary
1.11 Kb
whitelisted
6012
今天下发这笔帐核对不上 你对一下.exe
GET
304
104.21.19.110:80
http://imgcache.vip033324.xyz/picturess/2023/LiveUpdate.exe
US
executable
470 Kb
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
GET
172.67.185.250:80
http://imgcache.vip033324.xyz/picturess/2023/RSD.xml
US
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6012
今天下发这笔帐核对不上 你对一下.exe
104.21.19.110:80
imgcache.vip033324.xyz
CLOUDFLARENET
malicious
5756
svchost.exe
192.229.221.95:80
crl3.digicert.com
EDGECAST
US
whitelisted
5128
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5952
MoUsoCoreWorker.exe
2.16.241.12:80
Akamai International B.V.
DE
suspicious
5952
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5952
MoUsoCoreWorker.exe
2.16.241.19:80
Akamai International B.V.
DE
suspicious
6012
今天下发这笔帐核对不上 你对一下.exe
172.67.185.250:80
imgcache.vip033324.xyz
CLOUDFLARENET
US
suspicious
172.67.185.250:80
imgcache.vip033324.xyz
CLOUDFLARENET
US
suspicious
6116
SIHClient.exe
40.68.123.157:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6116
SIHClient.exe
2.18.233.62:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
imgcache.vip033324.xyz
  • 104.21.19.110
  • 172.67.185.250
suspicious
officeclient.microsoft.com
  • 52.109.32.24
whitelisted
crl3.digicert.com
  • 192.229.221.95
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 2.18.233.62
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
crl4.digicert.com
  • 192.229.221.95
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
nexusrules.officeapps.live.com
  • 52.109.77.1
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted

Threats

PID
Process
Class
Message
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
A Network Trojan was detected
ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6012
今天下发这笔帐核对不上 你对一下.exe
A Network Trojan was detected
ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
6012
今天下发这笔帐核对不上 你对一下.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info