analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://107.173.90.141/SWKLPFVBDS.exe

Full analysis: https://app.any.run/tasks/db102216-ac10-44cb-9fbb-5e175cee9e69
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 17, 2019, 20:05:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

9540C0E54837D631E2359C2F141B5F18

SHA1:

2598E609F96A4C4DD825657C136B1301BE86CAB0

SHA256:

A4430DB44985267C68ABA93E70FC49D3E77BE4C6530783BD84A8933E489B2248

SSDEEP:

3:N1Kt43Fr6:CO3Fr6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SWKLPFVBDS[1].exe (PID: 3252)
      • setup.exe (PID: 2656)
      • hRTYКЕНПкенмкекуе.exe (PID: 2836)
      • hTVYКЕНПкенмкекуе.exe (PID: 3840)
    • Downloads executable files with a strange extension

      • SWKLPFVBDS[1].exe (PID: 3252)
    • Downloads executable files from IP

      • SWKLPFVBDS[1].exe (PID: 3252)
    • Downloads executable files from the Internet

      • SWKLPFVBDS[1].exe (PID: 3252)
    • Loads the Task Scheduler COM API

      • hRTYКЕНПкенмкекуе.exe (PID: 2836)
  • SUSPICIOUS

    • Creates files in the program directory

      • hRTYКЕНПкенмкекуе.exe (PID: 2836)
      • setup.exe (PID: 2656)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 2656)
      • iexplore.exe (PID: 2776)
      • iexplore.exe (PID: 3496)
      • hRTYКЕНПкенмкекуе.exe (PID: 2836)
    • Executed as Windows Service

      • setup.exe (PID: 2656)
    • Creates files in the user directory

      • hRTYКЕНПкенмкекуе.exe (PID: 2836)
      • powershell.exe (PID: 2768)
    • Starts CMD.EXE for commands execution

      • SWKLPFVBDS[1].exe (PID: 3252)
    • Executes PowerShell scripts

      • cmd.exe (PID: 776)
    • Executed via Task Scheduler

      • hTVYКЕНПкенмкекуе.exe (PID: 3840)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2776)
    • Changes internet zones settings

      • iexplore.exe (PID: 2776)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
8
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start iexplore.exe iexplore.exe swklpfvbds[1].exe setup.exe hrtyкенпкенмкекуе.exe cmd.exe no specs powershell.exe no specs htvyкенпкенмкекуе.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2776"C:\Program Files\Internet Explorer\iexplore.exe" "http://107.173.90.141/SWKLPFVBDS.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3496"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2776 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3252"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\SWKLPFVBDS[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\SWKLPFVBDS[1].exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2656setup.exeC:\Windows\system32\setup.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Exit code:
0
Version:
6.3.9600.16384
2836"C:\ProgramData\hRTYКЕНПкенмкекуе.exe" C:\ProgramData\hRTYКЕНПкенмкекуе.exe
setup.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Version:
6.3.9600.16384
776/C PowerShell "Start-Sleep 10; Remove-Item C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\SWKLPFVBDS[1].exe"C:\Windows\system32\cmd.exeSWKLPFVBDS[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2768PowerShell "Start-Sleep 10; Remove-Item C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\SWKLPFVBDS[1].exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3840C:\Users\admin\AppData\Roaming\speedLan\hTVYКЕНПкенмкекуе.exe C:\Users\admin\AppData\Roaming\speedLan\hTVYКЕНПкенмкекуе.exetaskeng.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Exit code:
0
Version:
6.3.9600.16384
Total events
874
Read events
762
Write events
109
Delete events
3

Modification events

(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{53F6D6C9-C12A-11E9-B86F-5254004A04AF}
Value:
0
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2776) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070800060011001400050010001402
Executable files
4
Suspicious files
7
Text files
9
Unknown types
4

Dropped files

PID
Process
Filename
Type
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF35A6172A8E4DAB70.TMP
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFB321944ABBE90CCF.TMP
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{53F6D6C9-C12A-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
2768powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JPMB787SJMEK9NJ6TIAV.temp
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{53F6D6CA-C12A-11E9-B86F-5254004A04AF}.datbinary
MD5:4DD46D416ECF161203C1CCB9C985269C
SHA256:DA0260926119ECD88C9F0552670E9A82CF2B4BD718C7A6DA0676F915E6E6BB44
3496iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:7918025022BE1BB56CE228CEE67A96F6
SHA256:7957884057DB1D310EE53B1407DD14623DDC143B36209C229617AA7FE9A5C2CD
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\SWKLPFVBDS[1].exeexecutable
MD5:C631FAB0314095B88496FC111C68ADE3
SHA256:D008307D113D72D5263145C03C46FE35C705AF1213C942BBC8B13C51940E3759
2836hRTYКЕНПкенмкекуе.exeC:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_90059c37-1320-41a4-b58d-2b75a9850d2fbinary
MD5:3C0EFDB9B62233D0FB51247A146C8A26
SHA256:FE366BD8C4D02AF56807F7813F234AE3525809039037A4ACC235D48CD19D8E65
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3252
SWKLPFVBDS[1].exe
GET
200
107.173.90.141:80
http://107.173.90.141/sin.png
US
executable
420 Kb
malicious
GET
200
107.173.90.141:80
http://107.173.90.141/win2.png
US
executable
424 Kb
malicious
2776
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2776
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3496
iexplore.exe
107.173.90.141:80
ColoCrossing
US
malicious
2836
hRTYКЕНПкенмкекуе.exe
85.204.116.116:443
RO
unknown
3252
SWKLPFVBDS[1].exe
107.173.90.141:80
ColoCrossing
US
malicious
107.173.90.141:80
ColoCrossing
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
3496
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3496
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3496
iexplore.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
3252
SWKLPFVBDS[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3252
SWKLPFVBDS[1].exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3252
SWKLPFVBDS[1].exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
3252
SWKLPFVBDS[1].exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
No debug info