File name: | 9e0cfd00991a3d387a78770a7748418b4d0ab978717f84a399d766b19a971df0 |
Full analysis: | https://app.any.run/tasks/41af01ee-39f4-42f5-be97-d601c3287432 |
Verdict: | Malicious activity |
Analysis date: | November 29, 2020, 16:00:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (DLL) (console) Intel 80386, for MS Windows |
MD5: | B0F3A46ADF98EFB3A9AC7CEAD9B4FC5A |
SHA1: | 01B0ECE80907F2D9E500ADA1CD2D555B782DD3A2 |
SHA256: | 9E0CFD00991A3D387A78770A7748418B4D0AB978717F84A399D766B19A971DF0 |
SSDEEP: | 3072:6YcS7/elK+/8OclqVHCWPR02j7UFMuhSNVqTZFnT0urv:z7C8uHCWPRp71uEOrnourv |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
Subsystem: | Windows command line |
---|---|
SubsystemVersion: | 5 |
ImageVersion: | - |
OSVersion: | 5 |
EntryPoint: | 0x1fb0 |
UninitializedDataSize: | - |
InitializedDataSize: | 119808 |
CodeSize: | 26112 |
LinkerVersion: | 9 |
PEType: | PE32 |
TimeStamp: | 2020:11:24 18:26:23+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_CUI |
Compilation Date: | 24-Nov-2020 17:26:23 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 4 |
Time date stamp: | 24-Nov-2020 17:26:23 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00006452 | 0x00006600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51083 |
.rdata | 0x00008000 | 0x00000CAB | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.05222 |
.data | 0x00009000 | 0x0001BDA0 | 0x00018800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.56243 |
.reloc | 0x00025000 | 0x0000063C | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.96273 |
ADVAPI32.dll |
KERNEL32.dll |
USER32.dll |
ole32.dll |
Title | Ordinal | Address |
---|---|---|
MagSafe1 | 1 | 0x00002640 |
MagSafe2 | 2 | 0x00002640 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2352 | "C:\Windows\System32\rundll32.exe" "C:\Users\admin\Desktop\9e0cfd00991a3d387a78770a7748418b4d0ab978717f84a399d766b19a971df0.exe", MagSafe1 | C:\Windows\System32\rundll32.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2884 | "C:\Windows\System32\rundll32.exe" "C:\Users\admin\Desktop\9e0cfd00991a3d387a78770a7748418b4d0ab978717f84a399d766b19a971df0.exe", MagSafe1 | C:\Windows\SysWOW64\rundll32.exe | — | rundll32.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
320 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) | ||||
2424 | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:267521 /prefetch:2 | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) | ||||
1720 | "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl", | C:\Windows\System32\control.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Control Panel Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2224 | "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl", | C:\Windows\system32\rundll32.exe | — | control.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2560 | "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl", | C:\Windows\System32\control.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Control Panel Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2124 | "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl", | C:\Windows\system32\rundll32.exe | — | control.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2604 | C:\Windows\system32\DllHost.exe /Processid:{9DF523B0-A6C0-4EA9-B5F1-F4565C3AC8B8} | C:\Windows\system32\DllHost.exe | — | svchost.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
320 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
320 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\C59EOZ9C.txt | — | |
MD5:— | SHA256:— | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\W6HWK0DB.txt | — | |
MD5:— | SHA256:— | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\DHE0NNT2.txt | — | |
MD5:— | SHA256:— | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\JEW91W5A.txt | text | |
MD5:FBEFB3BBBEC782970C43A2C541FBDAA0 | SHA256:C656DC401099F96D7E8DBF4D132B0AF91ABEC1FE951F410A5CCA2997AB094488 | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\YJRTG2J4.txt | text | |
MD5:C2601DDD95E5BFEABE665F90528767E1 | SHA256:A5D29CF98D794306B8C5550FAF8E6C18B5BB451F6BA84BA28044FD41BD01516F | |||
320 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\CP7XB3Q8.txt | text | |
MD5:5DB8B40D1042AE9826F886F23F785D59 | SHA256:59BF3C81D6326BF1E428706052E70CC1E59F3D47E72290C02068706A7FDC8237 | |||
320 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\toi5kkc\imagestore.dat | binary | |
MD5:0FBC3E288CEE3BF04B3B1A00E8DEC1FC | SHA256:EE8B6D7EF6DF3D1AD769FAC6037A615E04FE40B935DD324394F7F9799E53B844 | |||
320 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\urlblockindex[1].bin | binary | |
MD5:FA518E3DFAE8CA3A0E495460FD60C791 | SHA256:775853600060162C4B4E5F883F9FD5A278E61C471B3EE1826396B6D129499AA7 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
320 | iexplore.exe | GET | 200 | 152.199.19.161:443 | https://r20swj13mr.microsoft.com/ieblocklist/v1/urlblocklist.bin | US | — | — | whitelisted |
320 | iexplore.exe | GET | 304 | 152.199.19.161:443 | https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlistWin7.xml | US | — | — | whitelisted |
884 | svchost.exe | POST | 502 | 45.67.229.97:443 | https://njoopsday.website/index.htm | unknown | html | 182 b | suspicious |
320 | iexplore.exe | GET | 302 | 92.123.16.55:443 | https://go.microsoft.com/fwlink/?linkid=859328&locale=uk-ua&market=ua | FR | — | — | whitelisted |
336 | svchost.exe | GET | 200 | 152.199.19.161:443 | https://r20swj13mr.microsoft.com/ieblocklist/v1/urlblockindex.bin | US | binary | 16 b | whitelisted |
336 | svchost.exe | GET | 200 | 204.79.197.200:443 | https://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
336 | svchost.exe | GET | 200 | 204.79.197.200:443 | https://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
336 | svchost.exe | GET | 200 | 152.199.19.161:443 | https://iecvlist.microsoft.com/IE11/1479242656000/iecompatviewlist.xml | US | xml | 343 Kb | whitelisted |
320 | iexplore.exe | GET | 200 | 204.79.197.200:443 | https://ieonline.microsoft.com/iedomainsuggestions/ie11/suggestions.uk-UA | US | binary | 17.7 Kb | whitelisted |
320 | iexplore.exe | GET | 200 | 13.92.246.37:443 | https://query.prod.cms.msn.com/cms/api/amp/search?$filter='$type'eq'list'and'_locale'eq'uk-ua'and'_name'eq'IE%20NTP%20Goldbar'&tenant=amp&$select=list | US | text | 2 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
320 | iexplore.exe | 204.79.197.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
320 | iexplore.exe | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
320 | iexplore.exe | 45.67.229.97:443 | njoopsday.website | — | — | suspicious |
320 | iexplore.exe | 204.79.197.203:443 | www.msn.com | Microsoft Corporation | US | whitelisted |
2424 | IEXPLORE.EXE | 45.67.229.97:443 | njoopsday.website | — | — | suspicious |
320 | iexplore.exe | 92.123.16.55:443 | go.microsoft.com | Telia Company AB | FR | malicious |
320 | iexplore.exe | 13.92.246.37:443 | query.prod.cms.msn.com | Microsoft Corporation | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
njoopsday.website |
| suspicious |
www.bing.com |
| whitelisted |
api.bing.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
ieonline.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
www.msn.com |
| whitelisted |
query.prod.cms.msn.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
2424 | IEXPLORE.EXE | Misc Attack | ET TOR Known Tor Exit Node Traffic group 142 |
2424 | IEXPLORE.EXE | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 142 |
320 | iexplore.exe | Misc Attack | ET TOR Known Tor Exit Node Traffic group 142 |
320 | iexplore.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 142 |