| download: | VPN.exe |
| Full analysis: | https://app.any.run/tasks/d55e2294-5377-4a45-b393-f5a8b20f7d44 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | September 23, 2023, 23:17:17 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 12C1842C3CCAFE7408C23EBF292EE3D9 |
| SHA1: | 4B1AF84CC11A8B1E290A18A4222A49526EEADD10 |
| SHA256: | A040A0AF8697E30506218103074C7D6EA77A84BA3AC1EE5EFAE20F15530A19BB |
| SSDEEP: | 6144:sMHklTfkt3eaAuvuOosMVhCHCEs2qwYZKmATfrdHcn5:loTMperwCC5EQrfZHK |
| .exe | | | Win32 Executable MS Visual C++ (generic) (46.3) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (41) |
| .exe | | | Win32 Executable (generic) (6.6) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| .exe | | | DOS Executable Generic (2.9) |
| ProductVersion: | 2.8.47.63 |
|---|---|
| ProductName: | Hdfgodifjg |
| OriginalFileName: | Hugidfgy.exe |
| InternalName: | Velectrelidat.exe |
| FileVersions: | 64.5.34.31 |
| CharacterSet: | Unknown (85B3) |
| LanguageCode: | Unknown (0294) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Windows NT 32-bit |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 98.0.0.0 |
| FileVersionNumber: | 91.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x54bd |
| UninitializedDataSize: | - |
| InitializedDataSize: | 35049472 |
| CodeSize: | 240640 |
| LinkerVersion: | 10 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| TimeStamp: | 2022:09:28 17:40:46+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2780 | "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\admin\AppData\Local\Temp\VPN.exe" & del "C:\ProgramData\*.dll"" & exit | C:\Windows\System32\cmd.exe | — | VPN.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3320 | timeout /t 5 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3484 | "C:\Users\admin\AppData\Local\Temp\VPN.exe" | C:\Users\admin\AppData\Local\Temp\VPN.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
Stealc(PID) Process(3484) VPN.exe C2http://171.22.28.221/5c06c05b7b34e8e6.php Keys RC45329514621441247975720749009 Strings (298)" & del "C:\ProgramData\*.dll"" & exit %08lX%04lX%lu %APPDATA% %DESKTOP% %DOCUMENTS% %LOCALAPPDATA% %PROGRAMFILES% %PROGRAMFILES_86% %RECENT% %USERPROFILE% %d/%d/%d %d:%d:%d %hu/%hu/%hu *.ini *.lnk *.tox .exe .txt /5c06c05b7b34e8e6.php /9e226a84ec50246d/ /c start /c timeout /t 5 & del /f /q " 00000001 00000002 00000003 00000004 A7FDF864FBC10B77* ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 All Users: BCryptCloseAlgorithmProvider BCryptDestroyKey BCryptGenerateSymmetricKey BCryptOpenAlgorithmProvider BCryptSetProperty BitBlt C:\ProgramData\ C:\ProgramData\nss3.dll C:\Windows\system32\cmd.exe CURRENT CharToOemW CloseHandle CoCreateInstance Content-Disposition: form-data; name=" Content-Type: multipart/form-data; boundary=---- Cookies CopyFileA CreateCompatibleBitmap CreateCompatibleDC CreateDCA CreateEventA CreateFileA CreateStreamOnHGlobal CryptStringToBinaryA CryptUnprotectData Current User: D877F783D5D3EF8C* DISPLAY DeleteFileA DeleteObject DialogConfig.vdf DialogConfigOverlay*.vdf DisplayName DisplayVersion ExitProcess F8806DD0C461824F* FALSE FindClose FindFirstFileA FindNextFileA GdipCreateBitmapFromHBITMAP GdipDisposeImage GdipFree GdipGetImageEncoders GdipGetImageEncodersSize GdipSaveImageToStream GdiplusShutdown GdiplusStartup GetComputerNameA GetCurrentProcess GetCurrentProcessId GetDC GetDesktopWindow GetFileAttributesA GetFileSize GetFileSizeEx GetHGlobalFromStream GetKeyboardLayoutList GetLastError GetLocalTime GetLocaleInfoA GetModuleFileNameA GetModuleFileNameExA GetProcAddress GetProcessHeap GetSystemInfo GetSystemPowerStatus GetSystemTime GetTimeZoneInformation GetUserDefaultLangID GetUserDefaultLocaleName GetUserNameA GetVolumeInformationA GetWindowRect GetWindowsDirectoryA GlobalAlloc GlobalFree GlobalLock GlobalMemoryStatusEx GlobalSize HAL9TH HTTP/1.1 HeapAlloc HeapFree History HttpOpenRequestA HttpSendRequestA IndexedDB Installed Apps: InternetCloseHandle InternetConnectA InternetCrackUrlA InternetOpenA InternetOpenUrlA InternetReadFile IsWow64Process JohnDoe Local Extension Settings Local State LocalAlloc LocalFree Login Data MultiByteToWideChar NSS_Shutdown Network Network Info: OpenEventA OpenProcess Opera Opera GX Stable Opera Stable OperaGX PATH PK11SDR_Decrypt PK11_Authenticate PK11_FreeSlot PK11_GetInternalKeySlot POST Password PathMatchSpecA Pidgin Process List: Process32First Process32Next ProcessorNameString ProductName ReadFile RegEnumKeyExA RegEnumValueA RegOpenKeyExA RegQueryValueExA ReleaseDC RmEndSession RmRegisterResources RmStartSession SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies SELECT fieldname, value FROM moz_formhistory SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT name, value FROM autofill SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards SELECT origin_url, username_value, password_value FROM logins SELECT url FROM moz_places LIMIT 1000 SELECT url FROM urls LIMIT 1000 SHGetFolderPathA SOFTWARE\Microsoft\Windows NT\CurrentVersion SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall SelectObject SetFilePointer ShellExecuteExA Sleep Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Valve\Steam SteamPath StrCmpCA StrCmpCW StrStrA Sync Extension Settings System Summary: SystemTimeToFileTime TRUE Telegram TerminateProcess User Agents: VMwareVMware VirtualAlloc VirtualAllocExNuma VirtualFree VirtualProtect Web Data WideCharToMultiByte \.purple\ \Discord\tokens.txt \Local Storage\leveldb \Local Storage\leveldb\CURRENT \Outlook\accounts.txt \Steam\ \Telegram Desktop\ \Temp\ \config\ \discord\ _0.indexeddb.leveldb accounts.xml autofill bcrypt.dll browser: browsers build card: chrome chrome-extension_ config.vdf cookies cookies.sqlite crypt32.dll dQw4w9WgXcQ default done encryptedPassword encryptedUsername encrypted_key file file_name files firefox formSubmitURL freebl3.dll f~)Us$rUa"\v gdi32.dll gdiplus.dll guid history http://171.22.28.221 https hwid key_datas libraryfolders.vdf login: logins.json loginusers.vdf lstrcatA lstrcpyA lstrcpynA lstrlenA map* message month: mozglue.dll name: nss3.dll ntdll.dll ole32.dll open opera password: places.sqlite plugins profile: profiles.ini psapi.dll rstrtmgr.dll runas screenshot.jpg shell32.dll soft softokn3.dll sqlite3.dll sqlite3_close sqlite3_column_blob sqlite3_column_bytes sqlite3_column_text sqlite3_finalize sqlite3_open sqlite3_prepare_v2 sqlite3_step sscanf ssfn* system_info.txt token token: url: user32.dll usernameField wallets wininet.dll wsprintfA wsprintfW year: | |||||||||||||||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 460000004F010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3484) VPN.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3484 | VPN.exe | C:\ProgramData\GDHIIDAFIDGCFHJJDGDA | binary | |
MD5:52E51471E9281235323F633CD0DEA56C | SHA256:147F3137B387FE4FBE3215B7864568404580A799D031009FE9C718F4C2EF87D0 | |||
| 3484 | VPN.exe | C:\ProgramData\EGIDAAFI | binary | |
MD5:F47EB60CDF981C17722D0CE740129927 | SHA256:0210071DF12CA42D70DCB679926668AE072264705AC139A24F94BBC5A129DD8F | |||
| 3484 | VPN.exe | C:\ProgramData\AAKJKJDGCGDBGDHIJKJECFCFBG | — | |
MD5:— | SHA256:— | |||
| 3484 | VPN.exe | C:\ProgramData\freebl3.dll | executable | |
MD5:550686C0EE48C386DFCB40199BD076AC | SHA256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA | |||
| 3484 | VPN.exe | C:\ProgramData\IJEGDBGDBFIJKECBAKFBFIDGCF | binary | |
MD5:23D08A78BC908C0B29E9800D3D5614E7 | SHA256:F6BD7DF5DFAE9FD88811A807DBA14085E00C1B5A6D7CC3D06CC68F6015363D59 | |||
| 3484 | VPN.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\mozglue[1].dll | executable | |
MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9 | SHA256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A | |||
| 3484 | VPN.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\freebl3[1].dll | executable | |
MD5:550686C0EE48C386DFCB40199BD076AC | SHA256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA | |||
| 3484 | VPN.exe | C:\ProgramData\DAFHIDGIJKJKECBGDBGHDBKFHI | binary | |
MD5:6A80DD356027C9C7B333113E9B2AA028 | SHA256:7C236E441D371B0B85C2A5EAACC3E269214A06AA385835231DA163110C3F7FA4 | |||
| 3484 | VPN.exe | C:\ProgramData\mozglue.dll | executable | |
MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9 | SHA256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A | |||
| 3484 | VPN.exe | C:\ProgramData\msvcp140.dll | executable | |
MD5:5FF1FCA37C466D6723EC67BE93B51442 | SHA256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 1.56 Kb | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 144 b | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 1.75 Kb | malicious |
3484 | VPN.exe | GET | 200 | 171.22.28.221:80 | http://171.22.28.221/9e226a84ec50246d/vcruntime140.dll | unknown | executable | 78.9 Kb | malicious |
3484 | VPN.exe | GET | 200 | 171.22.28.221:80 | http://171.22.28.221/9e226a84ec50246d/nss3.dll | unknown | executable | 1.95 Mb | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 992 b | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 992 b | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | executable | 78.9 Kb | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | executable | 78.9 Kb | malicious |
3484 | VPN.exe | POST | 200 | 171.22.28.221:80 | http://171.22.28.221/5c06c05b7b34e8e6.php | unknown | text | 4.94 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3484 | VPN.exe | 171.22.28.221:80 | — | ASN-QUADRANET-GLOBAL | US | malicious |
3284 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3484 | VPN.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Stealc |
3484 | VPN.exe | Malware Command and Control Activity Detected | ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in |
3484 | VPN.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Stealc Requesting browsers Config from C2 |
3484 | VPN.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Stealc Active C2 Responding with browsers Config |
3484 | VPN.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Stealc Requesting plugins Config from C2 |
3484 | VPN.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Stealc Active C2 Responding with plugins Config |
3484 | VPN.exe | A suspicious filename was detected | ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity |
3484 | VPN.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
3484 | VPN.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
3484 | VPN.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |