File name: | Bonzify.exe |
Full analysis: | https://app.any.run/tasks/7213d1cd-0db9-4810-ab81-01c0b946a5d3 |
Verdict: | Malicious activity |
Analysis date: | August 25, 2019, 19:33:35 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 0D4F41A264B6BA17F9B0D2B698A991E6 |
SHA1: | E13E1FACBCB92267D8E124ED3298DD35594AC9F4 |
SHA256: | A2788DB60E63CA687412193B80ADB7D9D95D9C4135B8A26387DFC1A0475C2962 |
SSDEEP: | 196608:1dAMaWetTeAkLIdx751qFTkub//73lc6u7b5VJ2Yx5xIdk3:RaWedh+Idx75QYub//73lc6u7bLMYxD |
.exe | | | Win32 MS Cabinet Self-Extractor (WExtract stub) (80.4) |
---|---|---|
.exe | | | Win32 Executable MS Visual C++ (generic) (8.2) |
.exe | | | Win64 Executable (generic) (7.3) |
.dll | | | Win32 Dynamic Link Library (generic) (1.7) |
.exe | | | Win32 Executable (generic) (1.1) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 5.1 |
ImageVersion: | - |
OSVersion: | 5.1 |
EntryPoint: | 0x16b0 |
UninitializedDataSize: | - |
InitializedDataSize: | 6696960 |
CodeSize: | 4096 |
LinkerVersion: | 14 |
PEType: | PE32 |
TimeStamp: | 2019:06:22 18:35:45+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 22-Jun-2019 16:35:45 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000E0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 5 |
Time date stamp: | 22-Jun-2019 16:35:45 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00000F88 | 0x00001000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.53481 |
.rdata | 0x00002000 | 0x00000FE8 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.32117 |
.data | 0x00003000 | 0x00000020 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x00004000 | 0x00661BD8 | 0x00661C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84955 |
.reloc | 0x00666000 | 0x000001C4 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.08408 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.89623 | 392 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 5.01704 | 2216 | UNKNOWN | UNKNOWN | RT_ICON |
100 | 7.82633 | 5249795 | UNKNOWN | UNKNOWN | DATA |
101 | 7.78087 | 400536 | UNKNOWN | UNKNOWN | DATA |
102 | 7.93147 | 1021232 | UNKNOWN | UNKNOWN | DATA |
103 | 4.90328 | 161 | UNKNOWN | UNKNOWN | DATA |
104 | 4.49923 | 46 | UNKNOWN | UNKNOWN | DATA |
110 | 5.30918 | 15360 | UNKNOWN | UNKNOWN | DATA |
IDI_BONZI | 2.32824 | 34 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
ADVAPI32.dll |
KERNEL32.dll |
OLEAUT32.dll |
SHELL32.dll |
SHLWAPI.dll |
USER32.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2396 | "C:\Users\admin\Desktop\Bonzify.exe" | C:\Users\admin\Desktop\Bonzify.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Exit code: 3221226540 | ||||
3008 | "C:\Users\admin\Desktop\Bonzify.exe" | C:\Users\admin\Desktop\Bonzify.exe | explorer.exe | |
User: admin Integrity Level: HIGH | ||||
3588 | cmd /c "C:\Users\admin\AppData\Local\Temp\KillAgent.bat" | C:\Windows\system32\cmd.exe | — | Bonzify.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3300 | taskkill /f /im AgentSvr.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2820 | takeown /r /d y /f C:\Windows\MsAgent | C:\Windows\system32\takeown.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Takes ownership of a file Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3528 | icacls C:\Windows\MsAgent /c /t /grant "everyone":(f) | C:\Windows\system32\icacls.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2752 | INSTALLER.exe /q | C:\Users\admin\AppData\Local\Temp\INSTALLER.exe | — | Bonzify.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 4.71.1015.0 | ||||
3604 | regsvr32 /s "C:\Windows\msagent\AgentCtl.dll" | C:\Windows\system32\regsvr32.exe | — | INSTALLER.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2788 | regsvr32 /s "C:\Windows\msagent\AgentDPv.dll" | C:\Windows\system32\regsvr32.exe | — | INSTALLER.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3820 | regsvr32 /s "C:\Windows\msagent\mslwvtts.dll" | C:\Windows\system32\regsvr32.exe | — | INSTALLER.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (2752) INSTALLER.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus |
Operation: | write | Name: | setupapi.app.log |
Value: 4096 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control.1 |
Operation: | write | Name: | |
Value: Microsoft Agent Control 1.5 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control.1\CLSID |
Operation: | write | Name: | |
Value: {F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5} | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control.2 |
Operation: | write | Name: | |
Value: Microsoft Agent Control 2.0 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control.2\CLSID |
Operation: | write | Name: | |
Value: {D45FD31B-5C6E-11D1-9EC1-00C04FD7081F} | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control |
Operation: | write | Name: | |
Value: Microsoft Agent Control 2.0 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Agent.Control\CurVer |
Operation: | write | Name: | |
Value: Agent.Control.2 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F} |
Operation: | write | Name: | |
Value: Microsoft Agent Control 2.0 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\ProgID |
Operation: | write | Name: | |
Value: Agent.Control.2 | |||
(PID) Process: | (3604) regsvr32.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\VersionIndependentProgID |
Operation: | write | Name: | |
Value: Agent.Control |
PID | Process | Filename | Type | |
---|---|---|---|---|
3736 | INSTALLER.exe | C:\Windows\lhsp\tv\SET1E36.tmp | — | |
MD5:— | SHA256:— | |||
3736 | INSTALLER.exe | C:\Windows\lhsp\tv\SET1E56.tmp | — | |
MD5:— | SHA256:— | |||
3736 | INSTALLER.exe | C:\Windows\lhsp\help\SET1E67.tmp | — | |
MD5:— | SHA256:— | |||
3736 | INSTALLER.exe | C:\Windows\INF\setupapi.app.log | ini | |
MD5:3ECA66008B1268B8AC39CB398ED2714F | SHA256:F39CCCCB4339D5C9B2DFF8710950009E24C2453419EBCB9B0E199A3C4D67BF3F | |||
3736 | INSTALLER.exe | C:\Windows\fonts\SET1E78.tmp | — | |
MD5:— | SHA256:— | |||
3008 | Bonzify.exe | C:\Windows\executables.bin | binary | |
MD5:A214C3B3245F6E924D244D812F1057B6 | SHA256:1914B132A7D7903D4424FA357AF01C1A89DDE7A95E3A75B604294833D83DD350 | |||
3736 | INSTALLER.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\tv_enua.hlp | hlp | |
MD5:80D09149CA264C93E7D810AAC6411D1D | SHA256:382D745E10944B507A8D9C69AE2E4AFFD4ACF045729A19AC143FA8D9613CCB42 | |||
3736 | INSTALLER.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\tvenuax.dll | executable | |
MD5:1587BF2E99ABEEAE856F33BF98D3512E | SHA256:C9106198ECBD3A9CAB8C2FEFF07F16D6BB1ADFA19550148FC96076F0F28A37B0 | |||
3736 | INSTALLER.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\andmoipa.ttf | odttf | |
MD5:C3E8AEABD1B692A9A6C5246F8DCAA7C9 | SHA256:38AE07EEB7909BDA291D302848B8FE5F11849CF0D597F0E5B300BFED465AED4E | |||
3008 | Bonzify.exe | C:\Users\admin\AppData\Local\Temp\KillAgent.bat | text | |
MD5:EA7DF060B402326B4305241F21F39736 | SHA256:E4EDC2CB6317AB19EE1A6327993E9332AF35CFBEBAFF2AC7C3F71D43CFCBE793 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2072 | WerFault.exe | GET | — | 20.44.86.127:80 | http://watson.microsoft.com/StageOne/explorer_exe/6_1_7601_17514/4ce796f3/IMM32_dll/6_1_7601_17514/4ce7b845/c0000005/0000386e.htm?LCID=1033&OS=6.1.7601.2.00010100.1.0.48.17514&SM=DELL&SPN=DELL&BV=DELL&MID=3ADE2C42-4AB9-49B7-B142-BE9AEEA69063 | US | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2072 | WerFault.exe | 20.44.86.127:80 | watson.microsoft.com | — | US | suspicious |
Domain | IP | Reputation |
---|---|---|
watson.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
2072 | WerFault.exe | Potential Corporate Privacy Violation | ET POLICY Application Crash Report Sent to Microsoft |
2072 | WerFault.exe | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
Process | Message |
---|---|
AgentSvr.exe | ClaimOutput
|
AgentSvr.exe | UnclaimOutput
|
AgentSvr.exe | ClaimOutput
|
AgentSvr.exe | UnclaimOutput
|
AgentSvr.exe | ClaimOutput
|
AgentSvr.exe | UnclaimOutput
|
AgentSvr.exe | ClaimOutput
|
AgentSvr.exe | UnclaimOutput
|
AgentSvr.exe | ClaimOutput
|
AgentSvr.exe | UnclaimOutput
|