| File name: | New Text Document.bin.exe |
| Full analysis: | https://app.any.run/tasks/02cb8bc7-a4e4-4c16-a020-cc0096dddf25 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | May 25, 2024, 07:56:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 0B0D247AA1F24C2F5867B3BF29F69450 |
| SHA1: | 48DE9F34226FD7F637E2379365BE035AF5C0DF1A |
| SHA256: | A6E7292E734C3A15CFA654BBA8DEA72A2F55F1C24CF6BBDC2FD7E63887E9315A |
| SSDEEP: | 12288:dcgCzNHJj96xfKJStJkRm3bYXob0AnmFMcaGQxkZVVVVVVVVVAtVVVUvqGV:UQKgLIQmFuGQxklvqO |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:03 07:51:19+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.33 |
| CodeSize: | 214528 |
| InitializedDataSize: | 119296 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x21d50 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 560 | attrib +s +h e:\net | C:\Windows\System32\attrib.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 660 | mshta vbscript:createobject("shell.application").shellexecute("C:\Users\admin\Desktop\a\AV_DOW~1.EXE","goto :target","","runas",1)(window.close) | C:\Windows\System32\mshta.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 676 | "C:\Users\admin\Desktop\a\rooma.exe" | C:\Users\admin\Desktop\a\rooma.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 764 | "C:\Users\admin\Desktop\a\toolspub1.exe" | C:\Users\admin\Desktop\a\toolspub1.exe | New Text Document.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 928 | "C:\Program Files\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={AF2C9DFF-41AA-A7A6-61E9-1F4ACFE5BC9E}&lang=en-GB&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHBD&installdataindex=empty" /installsource taggedmi /sessionid "{4A2D6E0E-FF83-4E45-B737-F7FF687996A6}" | C:\Program Files\Google\Update\GoogleUpdate.exe | — | GoogleUpdate.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: HIGH Description: Google Installer Exit code: 0 Version: 1.3.33.23 Modules
| |||||||||||||||
| 1120 | "C:\Users\admin\Desktop\a\AV_DOW~1.EXE" goto :target | C:\Users\admin\Desktop\a\av_downloader.exe | mshta.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 1236 | "C:\Users\admin\Desktop\a\wxijgyp.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | wxijgyp.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 4294967295 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 1244 | "C:\Users\admin\Desktop\a\rtx.exe" | C:\Users\admin\Desktop\a\rtx.exe | — | New Text Document.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1288 | "C:\Users\admin\Desktop\a\tsaplQyj.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | tsaplQyj.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 4294967295 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry |
| Operation: | delete value | Name: | AddToFavoritesInitialSelection |
Value: | |||
| (PID) Process: | (3976) New Text Document.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry |
| Operation: | delete value | Name: | AddToFeedsInitialSelection |
Value: | |||
| (PID) Process: | (2116) New Text Document.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\New Text Document_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2116 | New Text Document.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:593BCD5979902FDA2254D7094B704101 | SHA256:ED4D3FEB91DC4D007AC4051D91FC74A39647A2522AFC083972984F95ECA9C72F | |||
| 3976 | New Text Document.bin.exe | C:\Users\admin\Desktop\New Text Document.exe | executable | |
MD5:A239A27C2169AF388D4F5BE6B52F272C | SHA256:98E895F711226A32BFAB152E224279D859799243845C46E550C2D32153C619FC | |||
| 2116 | New Text Document.exe | C:\Users\admin\Desktop\a\toolspub1.exe | executable | |
MD5:B6E3A49931797E98183072CF02F58D26 | SHA256:6F480D8BF96773150F0939254A71EB20E447D30580AAB7ABF171ECB0E0094698 | |||
| 2116 | New Text Document.exe | C:\Users\admin\AppData\Local\Temp\Cab7F92.tmp | compressed | |
MD5:29F65BA8E88C063813CC50A4EA544E93 | SHA256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184 | |||
| 2116 | New Text Document.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:29F65BA8E88C063813CC50A4EA544E93 | SHA256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184 | |||
| 3976 | New Text Document.bin.exe | C:\Users\admin\Desktop\Пароли Chrome.csv | csv | |
MD5:64F50AFB35DD16EE46F187015CEE84CE | SHA256:C2D389870DE77426A31A8C478E0FDDCBBEA7A3733B453806317914E6F946EA91 | |||
| 2328 | zwuivg.exe | C:\Users\admin\AppData\Local\Temp\autA720.tmp | binary | |
MD5:90B6BE877F3F392E6E62620D18C389BD | SHA256:B60397A4B8D793CA30BCACAD22F191D591E375BF6573AC1DCC92F925A78BBAD9 | |||
| 2328 | zwuivg.exe | C:\Users\admin\AppData\Local\Temp\disimmure | text | |
MD5:26CA1F94F6B0E9B83125D888E5F41D76 | SHA256:B04663EBD02D1700611A7442837C574D38DF82F6886C03437485862E2D191A7A | |||
| 1840 | wxijgyp.exe | C:\Users\admin\AppData\Local\Temp\hypopygidium | text | |
MD5:1AB4D1781E889F9FE4C203FB5947629E | SHA256:E2F241EC6867CB15CE90E4F85FF32E9AFAAF7E0FE6929C35F596D590D98533F2 | |||
| 2116 | New Text Document.exe | C:\Users\admin\Desktop\a\wxijgyp.exe | executable | |
MD5:CA82319FEF771A184D1F98750E5BBB21 | SHA256:8C8F6C263D24354338E5D2D50D671A6E529D902BE66962DAB85932A326477E75 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2116 | New Text Document.exe | GET | 200 | 185.172.128.82:80 | http://185.172.128.82/server/15/AppGate2103v15.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 158.160.165.129:80 | http://okkolus.com/downloads/toolspub1.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 2.19.126.137:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3a0e300e007257c0 | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 5.42.66.47:80 | http://5.42.66.47/files/time2time.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 79.174.91.158:80 | http://79.174.91.158/RuntimeBroker.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 5.42.66.47:80 | http://5.42.66.47/files/file300un.exe | unknown | — | — | unknown |
1236 | RegSvcs.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 185.172.128.82:80 | http://185.172.128.82/server/12/AppGate2103v01.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 103.219.154.129:80 | http://103.219.154.129/rtx.exe | unknown | — | — | unknown |
2116 | New Text Document.exe | GET | 200 | 129.159.151.146:80 | http://129.159.151.146/example.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2116 | New Text Document.exe | 151.101.194.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2116 | New Text Document.exe | 185.172.128.82:80 | — | OOO Nadym Svyaz Service | RU | unknown |
2116 | New Text Document.exe | 104.196.109.209:443 | transfer.adttemp.com.br | GOOGLE-CLOUD-PLATFORM | US | unknown |
2116 | New Text Document.exe | 158.160.165.129:80 | okkolus.com | Yandex.Cloud LLC | RU | unknown |
2116 | New Text Document.exe | 209.94.90.3:443 | bafybeicoo7kwhmnl6q7prd65aimf5byzrihrklgviebm2pkyzyepdaigf4.ipfs.dweb.link | PROTOCOL | US | unknown |
2116 | New Text Document.exe | 2.19.126.137:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
transfer.adttemp.com.br |
| unknown |
okkolus.com |
| malicious |
bafybeicoo7kwhmnl6q7prd65aimf5byzrihrklgviebm2pkyzyepdaigf4.ipfs.dweb.link |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
ip-api.com |
| shared |
ftp.midhcodistribuciones.com |
| unknown |
bafybeigqatri6ure2nduxhe4yuifojinwkyt3ji5uvubdplxajhavdymau.ipfs.dweb.link |
| unknown |
mail.worlorderbillions.top |
| malicious |
ipfs.io |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2116 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2116 | New Text Document.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2116 | New Text Document.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2116 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
1088 | svchost.exe | Misc activity | ET HUNTING IPFS Gateway Domain in DNS Lookup (ipfs .dweb .link) |
2116 | New Text Document.exe | Misc activity | ET HUNTING Observed IPFS Gateway Domain (ipfs .dweb .link) in TLS SNI |
2116 | New Text Document.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
Process | Message |
|---|---|
mmc.exe | Constructor: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | OnInitialize: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | ProcessCommandLineArguments: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|