URL:

http://sp-storage.spccint.com/sp-downloader.exe

Full analysis: https://app.any.run/tasks/ba1e2c16-0705-42d6-b8d7-d678d7e938a6
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 19, 2019, 07:16:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

ECD425C2E09E485A762B49973588C963

SHA1:

EEDF7419A42B016177781F9BFF3572BE74A89DB0

SHA256:

9C41CA69D939C5765CDD33F2846AE9ADD44B3601DDBB298EEECDC9F5E3C7A832

SSDEEP:

3:N1KNVwXPGGQg2IX0C:CQ/hmC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3284)
      • sp-downloader[1].exe (PID: 3432)
      • nsy235.exe (PID: 3612)
    • Application was dropped or rewritten from another process

      • sp-downloader[1].exe (PID: 2488)
      • sp-downloader[1].exe (PID: 3432)
      • nsy235.exe (PID: 3612)
      • nsy235.exe (PID: 3380)
      • nsg90B.tmp (PID: 3720)
      • CltMngSvc.exe (PID: 3092)
      • CltMngSvc.exe (PID: 4052)
      • cltmngui.exe (PID: 4004)
      • cltmng.exe (PID: 3316)
      • bvyvdvyxc.exe (PID: 4064)
    • Loads dropped or rewritten executable

      • sp-downloader[1].exe (PID: 3432)
      • nsy235.exe (PID: 3612)
      • nsy235.exe (PID: 3380)
      • nsg90B.tmp (PID: 3720)
      • CltMngSvc.exe (PID: 4052)
      • cltmngui.exe (PID: 4004)
      • CltMngSvc.exe (PID: 3092)
      • bvyvdvyxc.exe (PID: 4064)
      • cltmng.exe (PID: 3316)
    • Changes the autorun value in the registry

      • nsg90B.tmp (PID: 3720)
    • Loads the Task Scheduler COM API

      • nsg90B.tmp (PID: 3720)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2976)
      • iexplore.exe (PID: 3284)
      • sp-downloader[1].exe (PID: 3432)
      • nsy235.exe (PID: 3380)
      • nsy235.exe (PID: 3612)
      • nsg90B.tmp (PID: 3720)
      • CltMngSvc.exe (PID: 3092)
    • Application launched itself

      • nsy235.exe (PID: 3612)
    • Starts application with an unusual extension

      • nsy235.exe (PID: 3612)
      • nsg90B.tmp (PID: 3720)
    • Creates files in the program directory

      • nsg90B.tmp (PID: 3720)
      • CltMngSvc.exe (PID: 3092)
    • Creates files in the Windows directory

      • sdbinst.exe (PID: 2580)
      • nsg90B.tmp (PID: 3720)
      • CltMngSvc.exe (PID: 3092)
    • Creates a software uninstall entry

      • nsg90B.tmp (PID: 3720)
      • sdbinst.exe (PID: 2580)
    • Reads the BIOS version

      • cltmng.exe (PID: 3316)
      • nsg90B.tmp (PID: 3720)
    • Creates files in the driver directory

      • CltMngSvc.exe (PID: 3092)
    • Reads internet explorer settings

      • cltmngui.exe (PID: 4004)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2976)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3284)
      • iexplore.exe (PID: 2976)
    • Application launched itself

      • iexplore.exe (PID: 2976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
14
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe sp-downloader[1].exe no specs sp-downloader[1].exe nsy235.exe nsy235.exe nsg90b.tmp ns504a.tmp no specs sdbinst.exe no specs cltmngsvc.exe cltmngsvc.exe cltmng.exe cltmngui.exe bvyvdvyxc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256"C:\Users\admin\AppData\Local\Temp\nsq22AC.tmp\ns504A.tmp" c:\windows\system32\sdbinst -q "C:\Users\admin\AppData\Local\Temp\VC_browsers32.sdb"C:\Users\admin\AppData\Local\Temp\nsq22AC.tmp\ns504A.tmpnsg90B.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsq22ac.tmp\ns504a.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2488"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\sp-downloader[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\sp-downloader[1].exeiexplore.exe
User:
admin
Company:
ClientConnect
Integrity Level:
MEDIUM
Description:
Search Protect
Exit code:
3221226540
Version:
1.2.1.0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\r9zewh8d\sp-downloader[1].exe
c:\systemroot\system32\ntdll.dll
2580c:\windows\system32\sdbinst -q "C:\Users\admin\AppData\Local\Temp\VC_browsers32.sdb"c:\windows\system32\sdbinst.exens504A.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Application Compatibility Database Installer
Exit code:
0
Version:
6.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sdbinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
2976"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3092"C:\Program Files\SearchProtect\Main\bin\CltMngSvc.exe"C:\Program Files\SearchProtect\Main\bin\CltMngSvc.exe
services.exe
User:
SYSTEM
Company:
Client Connect LTD
Integrity Level:
SYSTEM
Description:
Search Protect
Exit code:
0
Version:
3.1.5.104
Modules
Images
c:\progra~1\searchprotect\main\bin\cltmngsvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\user32.dll
3284"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2976 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3316C:\PROGRA~1\SEARCH~1\SearchProtect\bin\cltmng.exeC:\PROGRA~1\SEARCH~1\SearchProtect\bin\cltmng.exe
CltMngSvc.exe
User:
admin
Company:
Client Connect LTD
Integrity Level:
MEDIUM
Description:
Search Protect
Exit code:
0
Version:
3.1.5.104
Modules
Images
c:\progra~1\search~1\searchprotect\bin\cltmng.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
3380C:\Users\admin\AppData\Local\Temp\nsy235.exe -sessionid=M04E66BA6-939D-4B81-8664-B3D58DEDD06F -downloadlength=562 -EXT_ISID=false -orbiterC:\Users\admin\AppData\Local\Temp\nsy235.exe
nsy235.exe
User:
admin
Company:
ClientConnect
Integrity Level:
HIGH
Description:
Search Protect
Exit code:
50
Version:
2.5.1.2
Modules
Images
c:\users\admin\appdata\local\temp\nsy235.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3432"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\sp-downloader[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\sp-downloader[1].exe
iexplore.exe
User:
admin
Company:
ClientConnect
Integrity Level:
HIGH
Description:
Search Protect
Exit code:
10
Version:
1.2.1.0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\r9zewh8d\sp-downloader[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3612C:\Users\admin\AppData\Local\Temp\nsy235.exe -sessionid=M04E66BA6-939D-4B81-8664-B3D58DEDD06F -downloadlength=562 -EXT_ISID=falseC:\Users\admin\AppData\Local\Temp\nsy235.exe
sp-downloader[1].exe
User:
admin
Company:
ClientConnect
Integrity Level:
HIGH
Description:
Search Protect
Exit code:
10
Version:
2.5.1.2
Modules
Images
c:\users\admin\appdata\local\temp\nsy235.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
2 493
Read events
2 208
Write events
280
Delete events
5

Modification events

(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{FCCEDE67-4A16-11E9-AA93-5254004A04AF}
Value:
0
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070300020013000700110001001D03
Executable files
35
Suspicious files
33
Text files
75
Unknown types
12

Dropped files

PID
Process
Filename
Type
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF51D89144DF6C3EEF.TMP
MD5:
SHA256:
3432sp-downloader[1].exeC:\Users\admin\AppData\Local\Temp\nsy236.tmp
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFE4CEB9AB905E7144.TMP
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{FCCEDE67-4A16-11E9-AA93-5254004A04AF}.dat
MD5:
SHA256:
3612nsy235.exeC:\Users\admin\AppData\Local\Temp\nsg90B.txt
MD5:
SHA256:
3284iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\sp-downloader[1].exeexecutable
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019031920190320\index.datdat
MD5:
SHA256:
3380nsy235.exeC:\Users\admin\AppData\Local\Temp\nsiDED.txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
73
TCP/UDP connections
27
DNS requests
16
Threats
106

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3432
sp-downloader[1].exe
GET
200
23.37.56.99:80
http://c-sp-storage.spccint.com/stub/SP/Stub.exe
NL
executable
173 Kb
suspicious
3612
nsy235.exe
GET
200
199.101.114.124:80
http://sp-download.spccint.com/download/CarrierId/DEFAULT/CarrierVersion/DEFAULT/CarrierType/DEFAULT/Brand/SP
US
text
66 b
suspicious
3612
nsy235.exe
POST
202
50.17.185.253:80
http://sp-installer.databssint.com/
US
malicious
3380
nsy235.exe
POST
202
54.243.207.39:80
http://orbtr-installer.databssint.com/
US
malicious
3720
nsg90B.tmp
GET
200
199.101.114.209:80
http://sp-ip2location.spccint.com/ip/?client=sp
US
text
161 b
malicious
3720
nsg90B.tmp
GET
200
23.37.56.99:80
http://sp-settings.spccint.com/spinstallersettings/3.1.5.104/test/ABTEST_SETTINGS_ID/carrierId/CARRIER_ID
NL
text
892 b
suspicious
3720
nsg90B.tmp
POST
202
50.17.185.253:80
http://sp-installer.databssint.com/
US
malicious
3720
nsg90B.tmp
POST
202
50.17.185.253:80
http://sp-installer.databssint.com/
US
malicious
3720
nsg90B.tmp
POST
202
50.17.185.253:80
http://sp-installer.databssint.com/
US
malicious
3720
nsg90B.tmp
GET
200
23.37.56.99:80
http://sp-settings.spccint.com/spinstallersettings/3.1.5.104/test/ABTEST_SETTINGS_ID/carrierId/CT3331172
NL
text
892 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2976
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3284
iexplore.exe
23.37.56.99:80
sp-storage.spccint.com
Akamai Technologies, Inc.
NL
whitelisted
3432
sp-downloader[1].exe
50.17.185.253:80
sp-installer.databssint.com
Amazon.com, Inc.
US
malicious
3432
sp-downloader[1].exe
23.37.56.99:443
sp-storage.spccint.com
Akamai Technologies, Inc.
NL
whitelisted
3432
sp-downloader[1].exe
23.37.56.99:80
sp-storage.spccint.com
Akamai Technologies, Inc.
NL
whitelisted
3612
nsy235.exe
23.37.56.99:80
sp-storage.spccint.com
Akamai Technologies, Inc.
NL
whitelisted
3380
nsy235.exe
54.243.207.39:80
sp-installer.databssint.com
Amazon.com, Inc.
US
suspicious
3720
nsg90B.tmp
23.37.56.99:80
sp-storage.spccint.com
Akamai Technologies, Inc.
NL
whitelisted
3380
nsy235.exe
199.101.115.231:80
spms-download.spccint.com
Conduit Connect B.V
US
suspicious
3720
nsg90B.tmp
50.17.185.253:80
sp-installer.databssint.com
Amazon.com, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
sp-storage.spccint.com
  • 23.37.56.99
suspicious
sp-installer.databssint.com
  • 50.17.185.253
  • 54.243.207.39
malicious
c-sp-download.spccint.com
  • 23.37.56.99
suspicious
c-sp-storage.spccint.com
  • 23.37.56.99
suspicious
sp-download.spccint.com
  • 199.101.114.124
suspicious
orbtr-installer.databssint.com
  • 54.243.207.39
  • 50.17.185.253
malicious
spms-download.spccint.com
  • 199.101.115.231
suspicious
sp-settings.spccint.com
  • 23.37.56.99
suspicious
servicemap.spccint.com
  • 23.37.56.99
suspicious

Threats

PID
Process
Class
Message
3284
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3432
sp-downloader[1].exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
3432
sp-downloader[1].exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
3432
sp-downloader[1].exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
3432
sp-downloader[1].exe
Misc activity
SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer
3432
sp-downloader[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3612
nsy235.exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
3612
nsy235.exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
3612
nsy235.exe
Misc activity
SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer
3612
nsy235.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
22 ETPRO signatures available at the full report
Process
Message
nsg90B.tmp
Enter Logger Destroy
nsg90B.tmp
Clean Waiting List
nsg90B.tmp
Clean Free Pool
nsg90B.tmp
Logger Destroy finished
nsg90B.tmp
Clean Waiting List
nsg90B.tmp
Clean Waiting List
nsg90B.tmp
Clean Free Pool
nsg90B.tmp
Logger Destroy finished
nsg90B.tmp
Enter Logger Destroy
nsg90B.tmp
Clean Waiting List