analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://dl.paragon-software.com/esd/795_PEU/17.10.12/hdm17advanced_x86_trial.exe

Full analysis: https://app.any.run/tasks/0965f9bf-62c1-408e-9487-b4408a2294ff
Verdict: Malicious activity
Analysis date: March 21, 2020, 21:16:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

6C74EF29835A0177232A72FBDF21D9F1

SHA1:

DE849C1944F6FF66D709812041079FF0191948A2

SHA256:

AE9877557402EE3548E000BDDCFFD2CD958EE35B36161613C5D45364978437EF

SSDEEP:

3:N8RSXeHFwGJu+KNrYcSMO4An:2+PGzjvN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hdm17advanced_x86_trial.exe (PID: 2804)
      • hdm17advanced_x86_trial.exe (PID: 1296)
      • hdm17advanced_x86_trial.exe (PID: 3224)
      • hdm17advanced_x86.exe (PID: 2404)
      • winfuse_uimsetup.exe (PID: 2860)
      • hdm17.exe (PID: 2056)
    • Loads dropped or rewritten executable

      • hdm17advanced_x86_trial.exe (PID: 1296)
      • winfuse_uimsetup.exe (PID: 2860)
      • DrvInst.exe (PID: 304)
      • WUDFHost.exe (PID: 3348)
      • hdm17.exe (PID: 2056)
    • Changes the autorun value in the registry

      • hdm17advanced_x86.exe (PID: 2404)
    • Changes settings of System certificates

      • winfuse_uimsetup.exe (PID: 2860)
      • MsiExec.exe (PID: 1028)
      • msiexec.exe (PID: 3272)
    • Loads the Task Scheduler COM API

      • hdm17.exe (PID: 2056)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2676)
      • hdm17advanced_x86_trial.exe (PID: 3224)
      • hdm17advanced_x86.exe (PID: 2404)
      • hdm17advanced_x86_trial.exe (PID: 1296)
      • DrvInst.exe (PID: 404)
      • winfuse_uimsetup.exe (PID: 2860)
      • msiexec.exe (PID: 3272)
      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 304)
      • DrvInst.exe (PID: 2468)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 3832)
    • Creates files in the Windows directory

      • hdm17advanced_x86_trial.exe (PID: 3224)
      • hdm17advanced_x86_trial.exe (PID: 1296)
      • winfuse_uimsetup.exe (PID: 2860)
      • DrvInst.exe (PID: 404)
      • DrvInst.exe (PID: 304)
      • WUDFHost.exe (PID: 3348)
      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 2468)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 3832)
      • hdm17.exe (PID: 2056)
    • Creates files in the program directory

      • hdm17advanced_x86.exe (PID: 2404)
      • hdm17.exe (PID: 2056)
    • Starts itself from another location

      • hdm17advanced_x86_trial.exe (PID: 1296)
    • Creates a software uninstall entry

      • hdm17advanced_x86.exe (PID: 2404)
    • Adds / modifies Windows certificates

      • MsiExec.exe (PID: 1028)
      • winfuse_uimsetup.exe (PID: 2860)
      • msiexec.exe (PID: 3272)
    • Uses RUNDLL32.EXE to load library

      • DrvInst.exe (PID: 404)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 404)
      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 2468)
      • DrvInst.exe (PID: 304)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 3832)
      • hdm17advanced_x86_trial.exe (PID: 3224)
      • hdm17advanced_x86_trial.exe (PID: 1296)
      • hdm17.exe (PID: 2056)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 404)
      • DrvInst.exe (PID: 304)
      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 2468)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 3832)
    • Executed via COM

      • DrvInst.exe (PID: 404)
      • DrvInst.exe (PID: 304)
      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 2468)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 3832)
      • vdsldr.exe (PID: 2192)
    • Executed as Windows Service

      • vssvc.exe (PID: 4084)
      • vds.exe (PID: 440)
    • Low-level read access rights to disk partition

      • hdm17.exe (PID: 2056)
      • vds.exe (PID: 440)
  • INFO

    • Reads Internet Cache Settings

      • chrome.exe (PID: 2676)
    • Reads the hosts file

      • chrome.exe (PID: 3152)
      • chrome.exe (PID: 2676)
    • Dropped object may contain Bitcoin addresses

      • hdm17advanced_x86_trial.exe (PID: 1296)
      • msiexec.exe (PID: 3272)
    • Application launched itself

      • chrome.exe (PID: 2676)
      • msiexec.exe (PID: 3272)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3272)
    • Reads settings of System Certificates

      • winfuse_uimsetup.exe (PID: 2860)
      • chrome.exe (PID: 3152)
    • Searches for installed software

      • DrvInst.exe (PID: 1136)
      • DrvInst.exe (PID: 3660)
      • DrvInst.exe (PID: 404)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 4084)
    • Manual execution by user

      • hdm17.exe (PID: 2056)
    • Creates files in the program directory

      • msiexec.exe (PID: 3272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
78
Monitored processes
33
Malicious processes
13
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs hdm17advanced_x86_trial.exe no specs hdm17advanced_x86_trial.exe hdm17advanced_x86_trial.exe hdm17advanced_x86.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs winfuse_uimsetup.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe wudfhost.exe no specs drvinst.exe drvinst.exe drvinst.exe drvinst.exe hdm17.exe vdsldr.exe no specs vds.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2676"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dl.paragon-software.com/esd/795_PEU/17.10.12/hdm17advanced_x86_trial.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
3221225547
Version:
75.0.3770.100
2484"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fa8a9d0,0x6fa8a9e0,0x6fa8a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2916"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1520 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2712"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6035605857383854973 --mojo-platform-channel-handle=1024 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3152"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=15005823387210640318 --mojo-platform-channel-handle=1576 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3364"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7249623017683993248 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2424"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=10678948225951494988 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3192"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7261354274528232314 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2500 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3504"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=17130917110839009199 --mojo-platform-channel-handle=3484 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=996,12215625952044961603,16437872658597225210,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=5193483438677254132 --mojo-platform-channel-handle=1212 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
5 362
Read events
2 472
Write events
0
Delete events
0

Modification events

No data
Executable files
202
Suspicious files
102
Text files
855
Unknown types
173

Dropped files

PID
Process
Filename
Type
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5E76843B-A74.pma
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\843e1954-4623-4cea-8c14-6b62f7a6f0de.tmp
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000028.dbtmp
MD5:
SHA256:
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:AC43135B8C9FED46A92448C4E711F45C
SHA256:D840BA7CEBACF86DDBAD75BFB61A53449AA7AE3DE6B8ADC97FE45624626A6F09
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabsbinary
MD5:702AEC53DCDCFEA33C4BE3D2F888473E
SHA256:D16286D6EE0EB33E7907EE4FCB8FDB6B5A54E5A56BFAF99A9C2451D239BC9765
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RFa66ccc.TMPtext
MD5:FC9FFE77348619CC285333DFF5E1D5D1
SHA256:7CB9B3575330B3D776A21EB7A7407E34F013A0975B7418DA11B5C85DEC91D1F3
2676chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:FC9FFE77348619CC285333DFF5E1D5D1
SHA256:7CB9B3575330B3D776A21EB7A7407E34F013A0975B7418DA11B5C85DEC91D1F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
11
DNS requests
7
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3152
chrome.exe
143.204.201.38:443
dl.paragon-software.com
US
malicious
3152
chrome.exe
172.217.21.227:443
ssl.gstatic.com
Google Inc.
US
whitelisted
3152
chrome.exe
172.217.21.206:443
Google Inc.
US
whitelisted
3152
chrome.exe
216.239.32.117:443
www.google.com
Google Inc.
US
whitelisted
3152
chrome.exe
172.217.23.141:443
accounts.google.com
Google Inc.
US
whitelisted
3152
chrome.exe
172.217.22.67:443
www.gstatic.com
Google Inc.
US
whitelisted
3152
chrome.exe
172.217.23.110:443
sb-ssl.google.com
Google Inc.
US
whitelisted
3152
chrome.exe
216.58.207.67:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3272
msiexec.exe
8.241.88.126:80
Level 3 Communications, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 216.58.207.67
whitelisted
dl.paragon-software.com
  • 143.204.201.38
  • 143.204.201.117
  • 143.204.201.10
  • 143.204.201.87
whitelisted
accounts.google.com
  • 172.217.23.141
shared
www.google.com
  • 216.239.32.117
  • 216.239.38.117
  • 216.239.34.117
  • 216.239.36.117
whitelisted
ssl.gstatic.com
  • 172.217.21.227
whitelisted
www.gstatic.com
  • 172.217.22.67
whitelisted
sb-ssl.google.com
  • 172.217.23.110
whitelisted

Threats

No threats detected
Process
Message
hdm17advanced_x86_trial.exe
QFSFileEngine::open: No file name specified
hdm17advanced_x86_trial.exe
QFSFileEngine::open: No file name specified
hdm17advanced_x86_trial.exe
QFSFileEngine::open: No file name specified
DrvInst.exe
WudfUpdate: installing version (1,9,0,7600).
DrvInst.exe
WudfUpdate: Checking for presence of previous UMDF installation.
DrvInst.exe
WudfUpdate: Found binary %WINDIR%\system32\drivers\wudfrd.sys version (1.9.0.7601)
DrvInst.exe
WudfUpdate: Found binary %WINDIR%\system32\drivers\wudfpf.sys version (1.9.0.7601)
DrvInst.exe
WudfUpdate: Found binary %WINDIR%\system32\wudfhost.exe version (1.9.0.7601)
DrvInst.exe
WudfUpdate: Found binary %WINDIR%\system32\wudfsvc.dll version (1.9.0.7601)
DrvInst.exe
WudfUpdate: Found binary %WINDIR%\system32\wudfx.dll version (1.9.0.7601)