analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

xx.exe

Full analysis: https://app.any.run/tasks/2690992c-f562-4f9d-bdab-7415de8d6654
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: May 15, 2019, 02:49:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

F363206183D838911458139B45D0AC6D

SHA1:

32FBE20C350C0F9E48E81EF2A1A6AE28C0AF7638

SHA256:

9DF5BE6E2216159B33735D449EF6CE5F6EB9C72535B8D6D9449069EE76080EFF

SSDEEP:

12288:pYV6MorX7qzuC3QHO9FQVHPF51jgc/aVweJis:eBXu9HGaVHMwSis

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • xx.exe (PID: 2436)
    • Changes the autorun value in the registry

      • reg.exe (PID: 2132)
    • Changes settings of System certificates

      • xx.exe (PID: 968)
    • Application was dropped or rewritten from another process

      • install-interception.exe (PID: 936)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • xx.exe (PID: 2436)
      • xx.exe (PID: 968)
    • Creates files in the user directory

      • xx.exe (PID: 2436)
      • rundll32.exe (PID: 2836)
      • xx.exe (PID: 968)
    • Reads Internet Cache Settings

      • rundll32.exe (PID: 2836)
      • rundll32.exe (PID: 676)
      • rundll32.exe (PID: 2244)
      • rundll32.exe (PID: 2884)
    • Application launched itself

      • xx.exe (PID: 2436)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3836)
    • Executable content was dropped or overwritten

      • xx.exe (PID: 968)
      • install-interception.exe (PID: 936)
    • Starts CMD.EXE for commands execution

      • xx.exe (PID: 968)
    • Creates files in the Windows directory

      • xx.exe (PID: 968)
      • cmd.exe (PID: 2776)
      • install-interception.exe (PID: 936)
    • Adds / modifies Windows certificates

      • xx.exe (PID: 968)
    • Creates files in the driver directory

      • install-interception.exe (PID: 936)
    • Creates or modifies windows services

      • install-interception.exe (PID: 936)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

CharacterSet: Unicode
LanguageCode: English (British)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0xe7fe0
UninitializedDataSize: 593920
InitializedDataSize: 61440
CodeSize: 356352
LinkerVersion: 12
PEType: PE32
TimeStamp: 2019:03:15 15:54:32+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 15-Mar-2019 14:54:32
Detected languages:
  • English - United Kingdom

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 15-Mar-2019 14:54:32
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x00091000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00092000
0x00057000
0x00056400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.93526
.rsrc
0x000E9000
0x0000F000
0x0000F000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.06184

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.40026
1007
Latin 1 / Western European
English - United Kingdom
RT_MANIFEST
2
3.65355
744
Latin 1 / Western European
English - United Kingdom
RT_ICON
3
3.43704
296
Latin 1 / Western European
English - United Kingdom
RT_ICON
4
4.16139
3752
Latin 1 / Western European
English - United Kingdom
RT_ICON
5
4.07494
2216
Latin 1 / Western European
English - United Kingdom
RT_ICON
6
2.18302
1384
Latin 1 / Western European
English - United Kingdom
RT_ICON
7
7.78895
1428
Latin 1 / Western European
English - United Kingdom
RT_STRING
8
7.78982
1674
Latin 1 / Western European
English - United Kingdom
RT_STRING
9
7.71321
1168
Latin 1 / Western European
English - United Kingdom
RT_STRING
10
7.78548
1532
Latin 1 / Western European
English - United Kingdom
RT_STRING

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
IPHLPAPI.DLL
KERNEL32.DLL
MPR.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start xx.exe rundll32.exe no specs xx.exe cmd.exe no specs reg.exe rundll32.exe no specs cmd.exe no specs rundll32.exe no specs rundll32.exe no specs cmd.exe no specs cmd.exe no specs install-interception.exe

Process information

PID
CMD
Path
Indicators
Parent process
2436"C:\Users\admin\AppData\Local\Temp\xx.exe" C:\Users\admin\AppData\Local\Temp\xx.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2836"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
968"C:\Users\admin\AppData\Local\Temp\xx.exe" --drvinstC:\Users\admin\AppData\Local\Temp\xx.exe
xx.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3836C:\Windows\system32\cmd.exe /C reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v KB2823324 /d "C:\Users\admin\inter.exe" /fC:\Windows\system32\cmd.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2132reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v KB2823324 /d "C:\Users\admin\inter.exe" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
676"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1728C:\Windows\system32\cmd.exe /C echo. > C:\Users\admin\datastorage.bin:Zone.IdentifierC:\Windows\system32\cmd.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2244"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2884"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3316C:\Windows\system32\cmd.exe /C echo. > "C:\Users\admin\AppData\Local\Temp\install-interception.exe":Zone.IdentifierC:\Windows\system32\cmd.exexx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
903
Read events
847
Write events
56
Delete events
0

Modification events

(PID) Process:(2436) xx.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2436) xx.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\xx_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
7
Suspicious files
0
Text files
13
Unknown types
4

Dropped files

PID
Process
Filename
Type
968xx.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txt
MD5:
SHA256:
2436xx.exeC:\Users\admin\AppData\Roaming\bfstt.dattext
MD5:BF5DD0447DF595E145A9CCE0D8C2B474
SHA256:66D4039677397CEBF3D4A6389E5FFAD09561183BD736B5495FD259BD33479D7C
968xx.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Local Statetext
MD5:B54F6F6D4BF48EED6695C81AC7F9B48E
SHA256:43B1F0D053CD654A3BFD8A652E41E113A1CB9B5A97A36346BB8AA9E337980012
2836rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:E6F47C2C023D02B3DD929685F71B65A6
SHA256:BEAB1A70590446690530259CC43C2176B1DFD52931438ADEE4FF7C1CA7657F74
968xx.exeC:\Users\admin\inter.exeexecutable
MD5:F363206183D838911458139B45D0AC6D
SHA256:9DF5BE6E2216159B33735D449EF6CE5F6EB9C72535B8D6D9449069EE76080EFF
968xx.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[2].txttext
MD5:5CDD6AFA5B5AAAFFAE7FE2AE90B310C2
SHA256:54EC7D8A00F9427D4D4A063E7A002AD6F905B3903F83E845AE4275B15A0AF5D9
2836rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\WXHHJTMT\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
2836rundll32.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
2836rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
968xx.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\drv_x86[1].binexecutable
MD5:F90B05D294F094A122C6B99B5A820CB8
SHA256:9E1DEF27B804DF9BA97FD07F9DE835C70660AE568C00950102F70034E293A684
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
968
xx.exe
GET
37.44.212.123:80
http://19725.discoverthings.pw/X86.rc4
RU
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
968
xx.exe
172.217.16.129:443
doc-0k-5o-docs.googleusercontent.com
Google Inc.
US
whitelisted
2436
xx.exe
37.44.212.123:443
test.discoverthings.pw
JSC Mediasoft ekspert
RU
suspicious
968
xx.exe
37.44.212.123:80
test.discoverthings.pw
JSC Mediasoft ekspert
RU
suspicious
968
xx.exe
172.217.23.174:443
drive.google.com
Google Inc.
US
whitelisted
2436
xx.exe
192.52.166.111:443
port2010kmjutre.camdvr.org
QuadraNet, Inc
US
malicious

DNS requests

Domain
IP
Reputation
test.discoverthings.pw
  • 37.44.212.123
suspicious
port2010kmjutre.camdvr.org
  • 192.52.166.111
malicious
19725.discoverthings.pw
  • 37.44.212.123
suspicious
drive.google.com
  • 172.217.23.174
shared
doc-0k-5o-docs.googleusercontent.com
  • 172.217.16.129
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2 ETPRO signatures available at the full report
No debug info