analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21

Full analysis: https://app.any.run/tasks/17b907a2-62f6-4059-a70f-df267affd868
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: June 19, 2019, 10:19:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
adload
pup
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

A55974B07F860B901081B217BBC192DB

SHA1:

87D06FC52606C0CAE4A5727C7C902D47FF99B81B

SHA256:

A76937074BB920658FC9DD3150627715EB5B69CD8AD5A31FDEA251BC77BE9B21

SSDEEP:

49152:GPcyaEdAjv8zx+F/IVdAtqYwVY/iroap5VJvK/I64+H2PtfqRGo601068ubKv6W/:GPcyJ+AzxPfA8YKDVJvKA6nHuy8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
    • ADLOAD was detected

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
    • Application was dropped or rewritten from another process

      • installer_campaign_14922.exe (PID: 3112)
      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • CoreTempApp.exe (PID: 664)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.exe (PID: 3692)
      • CoreTempApp.exe (PID: 3640)
      • smappscontroller.exe (PID: 2732)
      • mweshield.exe (PID: 4012)
      • mweshield.exe (PID: 2612)
      • mweshieldup.exe (PID: 3800)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 1300)
      • mweshieldup.exe (PID: 3600)
      • MailRuUpdater.exe (PID: 2212)
      • mrupdsrv.exe (PID: 1716)
      • 6894-ec17-d208-03db (PID: 920)
    • Changes the autorun value in the registry

      • CoreTempApp.exe (PID: 3640)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Loads dropped or rewritten executable

      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • mweshield.exe (PID: 4012)
      • mweshield.exe (PID: 2612)
      • regsvr32.exe (PID: 3392)
    • Changes settings of System certificates

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • mweshield.exe (PID: 2612)
      • MailRuUpdater.exe (PID: 1300)
    • MAILRU was detected

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
    • Uses Task Scheduler to run other applications

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 4068)
      • schtasks.exe (PID: 3696)
      • schtasks.exe (PID: 3956)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Changes Windows auto-update feature

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Disables Windows Defender

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Registers / Runs the DLL via REGSVR32.EXE

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Downloads executable files from the Internet

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
  • SUSPICIOUS

    • Creates files in the user directory

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
    • Changes tracing settings of the file or console

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
    • Creates files in the program directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
      • na_runner.exe (PID: 252)
      • mweshield.exe (PID: 2612)
      • 6894-ec17-d208-03db (PID: 920)
    • Executable content was dropped or overwritten

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.exe (PID: 3692)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • na_runner.exe (PID: 252)
      • regsvr32.exe (PID: 3392)
      • 6894-ec17-d208-03db (PID: 920)
      • MailRuUpdater.exe (PID: 1300)
    • Creates a software uninstall entry

      • installer_campaign_14922.exe (PID: 3112)
      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Reads Windows owner or organization settings

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Searches for installed software

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • smappscontroller.exe (PID: 2732)
    • Adds / modifies Windows certificates

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Reads the Windows organization settings

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Reads the cookies of Google Chrome

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Reads the cookies of Mozilla Firefox

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Uses TASKKILL.EXE to kill process

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Creates files in the driver directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
    • Creates files in the Windows directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 2212)
      • mrupdsrv.exe (PID: 1716)
      • mweshieldup.exe (PID: 3600)
    • Creates or modifies windows services

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
    • Executed as Windows Service

      • mweshield.exe (PID: 2612)
      • mweshieldup.exe (PID: 3600)
      • MailRuUpdater.exe (PID: 2212)
      • mrupdsrv.exe (PID: 1716)
    • Starts itself from another location

      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Starts application with an unusual extension

      • MailRuUpdater.exe (PID: 1300)
    • Changes the started page of IE

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 3392)
  • INFO

    • Application was dropped or rewritten from another process

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Loads dropped or rewritten executable

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Creates files in the program directory

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Creates a software uninstall entry

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Reads settings of System Certificates

      • MailRuUpdater.exe (PID: 1300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:11:04 20:41:45+01:00
PEType: PE32
LinkerVersion: 12
CodeSize: 275968
InitializedDataSize: 6175232
UninitializedDataSize: -
EntryPoint: 0x210d5
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
FileVersionNumber: 0.0.2.1
ProductVersionNumber: 0.0.2.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: x64_dbg
FileVersion: 0.0.2.1
LegalCopyright: x64dbg.com
ProductName: x64_dbg
ProductVersion: V2.1ALPHA

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date: 04-Nov-2015 19:41:45
Detected languages:
  • English - United States
FileDescription: x64_dbg
FileVersion: 0.0.2.1
LegalCopyright: x64dbg.com
ProductName: x64_dbg
ProductVersion: V2.1ALPHA

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 04-Nov-2015 19:41:45
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000435B1
0x00043600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.56623
.data
0x00045000
0x0158E8CC
0x005BF000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.06664
.idata
0x015D4000
0x00000EEC
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.4354
.xdata
0x015D5000
0x00005F4C
0x00005200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.47715
.rsrc
0x015DB000
0x0001E6E3
0x0001E800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.68583

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.07794
1223
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.90736
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
3
1.90263
16936
Latin 1 / Western European
UNKNOWN
RT_ICON
4
4.44079
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
5
3.70444
67624
Latin 1 / Western European
UNKNOWN
RT_ICON
6
3.38484
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
7
5.00468
16936
UNKNOWN
English - United States
RT_ICON
8
5.157
4264
UNKNOWN
English - United States
RT_ICON
9
5.07881
1128
UNKNOWN
English - United States
RT_ICON

Imports

CRYPT32.dll
KERNEL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
27
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe no specs #ADLOAD a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe 522eb9f0-bd21-40f1-ad01-2297b3e8cbaa.exe installer_campaign_14922.exe 437932f7-94e7-4e4f-9583-6d65a7e19d2b.exe coretempapp.exe coretempapp.exe no specs #MAILRU 3966ec29-6b49-40c2-8c0d-2be9731b2efe.exe b31b3665-9bf9-444a-85a2-7bd834a10223.exe b31b3665-9bf9-444a-85a2-7bd834a10223.tmp taskkill.exe no specs smappscontroller.exe schtasks.exe no specs schtasks.exe no specs mweshield.exe no specs schtasks.exe no specs mweshieldup.exe no specs na_runner.exe mweshield.exe #MAILRU mailruupdater.exe mweshieldup.exe mailruupdater.exe regsvr32.exe 6894-ec17-d208-03db mrupdsrv.exe mailruupdater.exe mailruupdater.exe

Process information

PID
CMD
Path
Indicators
Parent process
2720"C:\Users\admin\AppData\Local\Temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe" C:\Users\admin\AppData\Local\Temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
x64_dbg
Exit code:
3221226540
Version:
0.0.2.1
Modules
Images
c:\users\admin\appdata\local\temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
c:\systemroot\system32\ntdll.dll
3256"C:\Users\admin\AppData\Local\Temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe" C:\Users\admin\AppData\Local\Temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
x64_dbg
Version:
0.0.2.1
Modules
Images
c:\users\admin\appdata\local\temp\a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
3972"C:\Users\admin\AppData\Local\Temp\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe" mode=s siteid=12257 campaignid=1 sourceid=117C:\Users\admin\AppData\Local\Temp\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Company:
"My Web Shield"
Integrity Level:
HIGH
Description:
My Web Shield Installation File
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\522eb9f0-bd21-40f1-ad01-2297b3e8cbaa\522eb9f0-bd21-40f1-ad01-2297b3e8cbaa.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
3112"C:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exe" C:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Company:
yicdniqy
Integrity Level:
HIGH
Description:
mdvepi
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\0cc68d6f-ba1f-4be2-97af-651366aee842\installer_campaign_14922.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
1720"C:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe" /sid=9 /pid=550612257C:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\437932f7-94e7-4e4f-9583-6d65a7e19d2b\437932f7-94e7-4e4f-9583-6d65a7e19d2b.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3640"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exe" "first_run" "C:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exe"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exe
installer_campaign_14922.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\coretempapp\coretempapp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
664"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exe" "write_patch_str_to_reg" "C:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exe" "HKCU" "Software\CoreTempApp" "qbobsi"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exeinstaller_campaign_14922.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\coretempapp\coretempapp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1804"C:\Users\admin\AppData\Local\Temp\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe" --silent --install_browser_class=0 --pay_browser_class=0 "--rfr=hp.1:834408,dse.1:811570,vbm.1:811580,pult.1:811580,hp.2:834423,dse.2:811610,vbm.2:811620,pult.2:811620,any:811550,any.2:811590" "--install_callback=http://zombleman.site/api_v2/callback/?guid={guid}&br={browser}&comp={component}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&browserclass1={browserClass1}&browserclass2={browserClass2}&rfr={rfr}&clid=214319048&dlid=334169284"C:\Users\admin\AppData\Local\Temp\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Integrity Level:
HIGH
Description:
sputnik
Exit code:
0
Version:
5.1.0.194
Modules
Images
c:\users\admin\appdata\local\temp\3966ec29-6b49-40c2-8c0d-2be9731b2efe\3966ec29-6b49-40c2-8c0d-2be9731b2efe.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3692"C:\Users\admin\AppData\Local\Temp\B31B3665-9BF9-444A-85A2-7BD834A10223\B31B3665-9BF9-444A-85A2-7BD834A10223.exe" /VERYSILENT /SUPPRESSMESSAGESC:\Users\admin\AppData\Local\Temp\B31B3665-9BF9-444A-85A2-7BD834A10223\B31B3665-9BF9-444A-85A2-7BD834A10223.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Company:
Smart Application Controller
Integrity Level:
HIGH
Description:
Smart Application Controller
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\b31b3665-9bf9-444a-85a2-7bd834a10223\b31b3665-9bf9-444a-85a2-7bd834a10223.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2576"C:\Users\admin\AppData\Local\Temp\is-FBMJ9.tmp\B31B3665-9BF9-444A-85A2-7BD834A10223.tmp" /SL5="$4014C,2554955,467456,C:\Users\admin\AppData\Local\Temp\B31B3665-9BF9-444A-85A2-7BD834A10223\B31B3665-9BF9-444A-85A2-7BD834A10223.exe" /VERYSILENT /SUPPRESSMESSAGESC:\Users\admin\AppData\Local\Temp\is-FBMJ9.tmp\B31B3665-9BF9-444A-85A2-7BD834A10223.tmp
B31B3665-9BF9-444A-85A2-7BD834A10223.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-fbmj9.tmp\b31b3665-9bf9-444a-85a2-7bd834a10223.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
4 503
Read events
3 459
Write events
0
Delete events
0

Modification events

No data
Executable files
58
Suspicious files
24
Text files
85
Unknown types
13

Dropped files

PID
Process
Filename
Type
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\Downloader\tempicon.ico
MD5:
SHA256:
3112installer_campaign_14922.exeC:\Users\admin\AppData\Local\Temp\nsd6BCE.tmp
MD5:
SHA256:
3972522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\300[1]text
MD5:0F278EF59DDAC65A19B7F6E401BEB83A
SHA256:1000379E41F0094D80A1029947A4F6ECECC300372022F52FEF0AA7E60B35E6A9
3112installer_campaign_14922.exeC:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exeexecutable
MD5:2242C2F72AF83C27D435A174863A5366
SHA256:EAC80832C9FADFF094AA481833CE78FE72C82B514F3EAB6930D46ADC3CA103A9
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\Downloads\beamng\beamng.drive.torrenttorrent
MD5:50CECEA59EEA192BB340E98C39C81062
SHA256:CCCE145CC79EB1DD4A4FE8CAB5F55FB806EDA0F52285CD6BADA2768398362EE5
3112installer_campaign_14922.exeC:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp\Сoretemp.exeexecutable
MD5:E96BF8FD043A4496448DB36394C676C4
SHA256:28F14DB1C481A7AE6B3486A5ED5CE0C5815D4E2DCBC411B90AFD2A6C5554C118
3112installer_campaign_14922.exeC:\Users\admin\AppData\Roaming\CoreTempApp\uninstaller.exeexecutable
MD5:4A9AFDC95EC65FE2AF46B8F2EF3C6259
SHA256:95B85607629071F56B33B53613042B18BD87E6F0195240F0F7B1BB50914767CF
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exeexecutable
MD5:489357EF15D52C5F62F31A798471F1CA
SHA256:4DFAF07AABD8EC5831B2E9CCCF2E6F40999A16D0E7C66FF84D13D9F87FD604A7
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exeexecutable
MD5:E5C6BE63AF66B1E3AC8673705CE1A146
SHA256:3ABE1E0122B46BA26DE3D158A89A9F0FF4476FAACB32609D57F676B831B3AAC1
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@file-5[1].txttext
MD5:581A3F67CB9BA71373B7F15377E75DDD
SHA256:F3E39E91FE075C5904C360C7B2426CE0D5340BEC9EB9531415F283033E5E3F5A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
98
TCP/UDP connections
123
DNS requests
33
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/get/campaigns?blankId=412845
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
200
88.208.60.229:80
http://zombleman.site/upload/4b3fedd488b3a4b8fe830cd8f107158b.exe
NL
executable
2.84 Mb
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
HEAD
200
104.18.52.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
HEAD
200
104.18.52.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/get/initialization
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
104.18.53.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/send/executereport
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
104.18.53.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
200
88.208.60.229:80
http://zombleman.site/upload/b5349829e3e47582241ffbbabfe7e027.exe
NL
executable
290 Kb
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
200
88.208.60.229:80
http://zombleman.site/icons/6.ico
NL
image
31.2 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
104.18.53.15:80
file-5.ru
Cloudflare Inc
US
shared
3972
522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe
88.208.5.120:80
mywebshield-ww1.com
DataWeb Global Group B.V.
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
88.208.60.229:80
zombleman.site
DataWeb Global Group B.V.
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
94.100.180.110:80
sputnikmailru.cdnmail.ru
Limited liability company Mail.Ru
RU
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
104.18.52.15:80
file-5.ru
Cloudflare Inc
US
shared
3972
522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe
88.208.5.119:80
getmywebshield.org
DataWeb Global Group B.V.
NL
unknown
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.122:443
conserv.go.mail.ru
Limited liability company Mail.Ru
RU
unknown
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.247:443
xmlbinupdate.mail.ru
Limited liability company Mail.Ru
RU
malicious
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.245:443
mrds.mail.ru
Limited liability company Mail.Ru
RU
malicious
1720
437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe
192.133.141.11:80
satysservs.com
Serverel Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
zombleman.site
  • 88.208.60.229
malicious
sputnikmailru.cdnmail.ru
  • 94.100.180.110
unknown
file-5.ru
  • 104.18.52.15
  • 104.18.53.15
suspicious
mywebshield-ww1.com
  • 88.208.5.120
malicious
getmywebshield.org
  • 88.208.5.119
unknown
satysservs.com
  • 192.133.141.11
malicious
xmlbinupdate.mail.ru
  • 217.69.139.247
shared
conserv.go.mail.ru
  • 217.69.139.122
unknown
mrds.mail.ru
  • 217.69.139.245
suspicious
client.updsoft.net
  • 109.206.179.254
unknown

Threats

PID
Process
Class
Message
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
18 ETPRO signatures available at the full report
Process
Message
MailRuUpdater.exe
RunAsService: Entry
MailRuUpdater.exe
Updater.Mail.Ru: SERVICE_CONTROL_STOP