File name: | a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca |
Full analysis: | https://app.any.run/tasks/be50300d-b374-4873-b0ec-234055f42d7a |
Verdict: | Malicious activity |
Analysis date: | December 05, 2022, 22:43:04 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 7407CF90F8CE97CCB971CD406DD4DB89 |
SHA1: | 309168954CD23C0D2C38C2D5157A89C5568ADC95 |
SHA256: | A1B6339824AF14363A2B54B013C3B9D4C40AF0F072FCC092116F4F2FB36518CA |
SSDEEP: | 3072:+JOvVMmh2Fs+mSzQZktciZfYvz7g2Xe7H6OgU3ABq+:+9j4KQZkQ83gU3A |
.exe | | | Win32 Executable (generic) (52.9) |
.exe | | | Generic Win/DOS Executable (23.5) |
.exe | | | DOS Executable Generic (23.5) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2011-Mar-16 12:00:03 |
CompanyName: | It Systems |
FileDescription: | Covering Software |
FileVersion: | 6.6.3300.0 (xpscanner010817-1148) |
InternalName: | memcopy |
LegalCopyright: | © It Systems Corp. All rights reserved. |
OriginalFilename: | w7rqwr.exe |
ProductName: | AV SoftWare © |
ProductVersion: | 6.6.3300.0 |
e_magic: | MZ |
e_cblp: | 80 |
e_cp: | 2 |
e_crlc: | 0 |
e_cparhdr: | 4 |
e_minalloc: | 15 |
e_maxalloc: | 65535 |
e_ss: | 0 |
e_sp: | 184 |
e_csum: | 0 |
e_ip: | 0 |
e_cs: | 0 |
e_ovno: | 26 |
e_oemid: | 0 |
e_oeminfo: | 0 |
e_lfanew: | 256 |
Signature: | PE |
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 6 |
TimeDateStamp: | 2011-Mar-16 12:00:03 |
PointerToSymbolTable: | 0 |
NumberOfSymbols: | 0 |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 4096 | 47804 | 48128 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.98299 |
DATA | 53248 | 90020 | 90112 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.99791 |
.bss | 143360 | 15612 | 0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rdata | 159744 | 132 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.403873 |
.idata | 163840 | 800 | 1024 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.18673 |
.rsrc | 167936 | 6548 | 6656 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 7.18827 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.45338 | 800 | UNKNOWN | UNKNOWN | RT_VERSION |
52 | 5.73734 | 1384 | UNKNOWN | UNKNOWN | RT_ICON |
BINARY1 | 7.95447 | 4096 | UNKNOWN | UNKNOWN | 1 |
kernel32.dll |
user32.dll |
Title | Ordinal | Address |
---|---|---|
Oblbjnounh | 1 | 5289 |
Tajfyddyuo | 2 | 4779 |
Qccftrju | 3 | 5814 |
CloseBetfkiybs | 4 | 6635 |
SetFyfilmeff | 5 | 7271 |
AddGvgdtwl | 6 | 7081 |
EndYaaxven | 7 | 7790 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2436 | "C:\Users\admin\AppData\Local\Temp\a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe" | C:\Users\admin\AppData\Local\Temp\a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
300 | taskeng.exe {14329CA9-5E27-4C13-B68C-D578B7014C76} | C:\Windows\system32\taskeng.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Engine Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
612 | "C:\Windows\system32\Dwm.exe" | C:\Windows\system32\Dwm.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Desktop Window Manager Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000003D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2436) a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FCC67766-6201-4AD1-A6B8-2F4553C93D47} |
Operation: | write | Name: | WpadDecisionReason |
Value: 1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2436 | a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | POST | — | 172.105.157.192:80 | http://boltoflexaria.in/check.php?ver=2&query=2C66508BDF14314321E0B83076443FEB | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2436 | a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | 172.105.157.192:80 | — | Linode, LLC | US | malicious |
PID | Process | Class | Message |
---|---|---|---|
2436 | a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 4. |
Process | Message |
---|---|
a1b6339824af14363a2b54b013c3b9d4c40af0f072fcc092116f4f2fb36518ca.exe | --- There are totally 0 threads running |