analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://qlcsakai.com/CartTransferSystem.application

Full analysis: https://app.any.run/tasks/0da5e267-4e38-4320-bfe0-ca4d73b838d9
Verdict: Malicious activity
Analysis date: April 25, 2019, 05:26:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B4EA8FF011E9DDB48A996A6300A14335

SHA1:

B6205F5BBE6CC0D9E1CF53E86CE2ED9BAB30E074

SHA256:

9D14E2C47FBD1BC4566FAC6008C7D6E55D88BFF9B86079F82E464F403892630A

SSDEEP:

3:N8FmK9uREYE/uMQn:2FmK9oE/M

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • dfsvc.exe (PID: 2520)
      • CartTransferSystem.exe (PID: 4004)
      • CartTransferSystem.exe (PID: 3252)
    • Application was dropped or rewritten from another process

      • CartTransferSystem.exe (PID: 3252)
      • CartTransferSystem.exe (PID: 4004)
  • SUSPICIOUS

    • Reads Environment values

      • dfsvc.exe (PID: 2520)
    • Reads internet explorer settings

      • dfsvc.exe (PID: 2520)
    • Reads Internet Cache Settings

      • dfsvc.exe (PID: 2520)
    • Creates files in the user directory

      • dfsvc.exe (PID: 2520)
    • Creates a software uninstall entry

      • dfsvc.exe (PID: 2520)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 2520)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 1232)
    • Application launched itself

      • iexplore.exe (PID: 1476)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1232)
    • Creates files in the user directory

      • iexplore.exe (PID: 1232)
    • Changes internet zones settings

      • iexplore.exe (PID: 1476)
    • Reads settings of System Certificates

      • CartTransferSystem.exe (PID: 3252)
      • CartTransferSystem.exe (PID: 4004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe dfsvc.exe no specs dfsvc.exe carttransfersystem.exe rundll32.exe no specs carttransfersystem.exe

Process information

PID
CMD
Path
Indicators
Parent process
1476"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1232"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1476 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1360"C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
ClickOnce
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
2520"C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ClickOnce
Version:
4.6.1055.0 built by: NETFXREL2
3252"C:\Users\admin\AppData\Local\Apps\2.0\XTOOJQ5W.DXY\YYNEPNEH.KA2\cart..tion_2bfd6097e931d7c1_0001.0000_68cea65827dbfb73\CartTransferSystem.exe"C:\Users\admin\AppData\Local\Apps\2.0\XTOOJQ5W.DXY\YYNEPNEH.KA2\cart..tion_2bfd6097e931d7c1_0001.0000_68cea65827dbfb73\CartTransferSystem.exe
dfsvc.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
カゴ入出管理システム
Exit code:
0
Version:
1.0.0.0
1132"rundll32.exe" dfshim.dll,ShOpenVerbShortcut C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft\CartTransferSystem.appref-ms|C:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4004"C:\Users\admin\AppData\Local\Apps\2.0\XTOOJQ5W.DXY\YYNEPNEH.KA2\cart..tion_2bfd6097e931d7c1_0001.0000_68cea65827dbfb73\CartTransferSystem.exe"C:\Users\admin\AppData\Local\Apps\2.0\XTOOJQ5W.DXY\YYNEPNEH.KA2\cart..tion_2bfd6097e931d7c1_0001.0000_68cea65827dbfb73\CartTransferSystem.exe
dfsvc.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
カゴ入出管理システム
Version:
1.0.0.0
Total events
1 150
Read events
625
Write events
0
Delete events
0

Modification events

No data
Executable files
32
Suspicious files
22
Text files
51
Unknown types
5

Dropped files

PID
Process
Filename
Type
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
1476iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab6637.tmp
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar6638.tmp
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab6659.tmp
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar665A.tmp
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab6735.tmp
MD5:
SHA256:
1232iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar6736.tmp
MD5:
SHA256:
1476iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF14797B1BF33F6D2C.TMP
MD5:
SHA256:
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{C41554FA-671A-11E9-A09E-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
8
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1232
iexplore.exe
GET
200
2.16.186.81:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
55.6 Kb
whitelisted
1476
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1232
iexplore.exe
GET
200
2.16.186.81:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/5F3B8CF2F810B37D78B4CEEC1919C37334B9C774.crt
unknown
der
891 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1476
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1232
iexplore.exe
153.127.77.53:443
qlcsakai.com
SAKURA Internet Inc.
JP
unknown
4004
CartTransferSystem.exe
153.127.77.53:443
qlcsakai.com
SAKURA Internet Inc.
JP
unknown
2520
dfsvc.exe
153.127.77.53:443
qlcsakai.com
SAKURA Internet Inc.
JP
unknown
3252
CartTransferSystem.exe
153.127.77.53:443
qlcsakai.com
SAKURA Internet Inc.
JP
unknown
1232
iexplore.exe
2.16.186.81:80
www.download.windowsupdate.com
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
qlcsakai.com
  • 153.127.77.53
unknown
www.download.windowsupdate.com
  • 2.16.186.81
  • 2.16.186.56
whitelisted

Threats

No threats detected
Process
Message
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: d:\iso_whid\x86fre\base\isolation\hier_hierarchy.cpp, line 230