| File name: | CrazyBumpSetup122.exe |
| Full analysis: | https://app.any.run/tasks/27025a24-7961-4f15-94d0-4a60c4868f82 |
| Verdict: | Malicious activity |
| Analysis date: | November 05, 2018, 06:41:49 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | ED057BFBBE3E6537AFF4D9EE97CF3ED3 |
| SHA1: | F8403491A4CFB1350790D92AF56C73E318598A61 |
| SHA256: | B178F2A6A1C8A3110818D7EB79561AF87168448C3A339C51FFE9BF6746E0B5D8 |
| SSDEEP: | 98304:FvWZQgdWvWEs9sXygmx76gDUimkG0GUKbd8W8FHtBi/hs4qURDN4Yb5RD:FvqhWWEs9CygmxVDekMFl8F3GsM6Ytl |
| .exe | | | NSIS - Nullsoft Scriptable Install System (91.9) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (3.3) |
| .exe | | | Win64 Executable (generic) (3) |
| .dll | | | Win32 Dynamic Link Library (generic) (0.7) |
| .exe | | | Win32 Executable (generic) (0.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2008:08:16 22:26:10+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 22528 |
| InitializedDataSize: | 119808 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x30b4 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 16-Aug-2008 20:26:10 |
| Detected languages: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 16-Aug-2008 20:26:10 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000057EC | 0x00005800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.47541 |
.rdata | 0x00007000 | 0x00001190 | 0x00001200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.17644 |
.data | 0x00009000 | 0x0001AF58 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.59051 |
.ndata | 0x00024000 | 0x00008000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x0002C000 | 0x00000C50 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.91755 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.08664 | 733 | UNKNOWN | English - United States | RT_MANIFEST |
102 | 2.74309 | 184 | UNKNOWN | English - United States | RT_DIALOG |
103 | 2.16096 | 20 | UNKNOWN | English - United States | RT_GROUP_ICON |
105 | 2.66174 | 256 | UNKNOWN | English - United States | RT_DIALOG |
106 | 2.88094 | 284 | UNKNOWN | English - United States | RT_DIALOG |
111 | 2.48825 | 96 | UNKNOWN | English - United States | RT_DIALOG |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
KERNEL32.dll |
SHELL32.dll |
USER32.dll |
VERSION.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2024 | "C:\Program Files\Crazybump\CrazyBump.exe" | C:\Program Files\Crazybump\CrazyBump.exe | CrazyBumpSetup122.exe | ||||||||||||
User: admin Company: CrazyBump Software Integrity Level: HIGH Description: CrazyBump 3D Material Editor Exit code: 0 Version: 1, 2, 0, 1 Modules
| |||||||||||||||
| 2896 | "C:\Users\admin\AppData\Local\Temp\CrazyBumpSetup122.exe" | C:\Users\admin\AppData\Local\Temp\CrazyBumpSetup122.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 4092 | "C:\Users\admin\AppData\Local\Temp\CrazyBumpSetup122.exe" | C:\Users\admin\AppData\Local\Temp\CrazyBumpSetup122.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| (PID) Process: | (2896) CrazyBumpSetup122.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Crazybump |
| Operation: | write | Name: | DisplayName |
Value: Crazybump (remove only) | |||
| (PID) Process: | (2896) CrazyBumpSetup122.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Crazybump |
| Operation: | write | Name: | UninstallString |
Value: "C:\Program Files\Crazybump\uninst.exe" | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CLASSES_ROOT\.slk57o |
| Operation: | write | Name: | Extension (sq211) |
Value: D8CE3540D8CE3540 | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CLASSES_ROOT\.sfs83k |
| Operation: | write | Name: | Extension (sd284) |
Value: 2911551095CC2AEE | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CLASSES_ROOT\.rae23m |
| Operation: | write | Name: | Extension (di856) |
Value: D84EC128D84EC128 | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CLASSES_ROOT\.hlv71x |
| Operation: | write | Name: | Extension (bn780) |
Value: AAC52A112A852AEE | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CURRENT_USER\Software\CrazyBump |
| Operation: | write | Name: | 122 |
Value: 1 | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CURRENT_USER\Software\licensecb |
| Operation: | write | Name: | 111r |
Value: 923454 | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CURRENT_USER\Software\CrazyBump |
| Operation: | write | Name: | AutomateSaveNormals |
Value: 1 | |||
| (PID) Process: | (2024) CrazyBump.exe | Key: | HKEY_CURRENT_USER\Software\CrazyBump |
| Operation: | write | Name: | AutomateSaveDisplacement |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2896 | CrazyBumpSetup122.exe | C:\Users\admin\AppData\Local\Temp\nsiB4E5.tmp\AdvSplash.dll | executable | |
MD5:7D3644BEFB511BE2FDAA03FF544DEAB4 | SHA256:B02607FC2A8BCD5184F570B3E14334055D172F7B6757B979931B442824EB5BB0 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Users\admin\AppData\Local\Temp\nsiB4E5.tmp\splash.bmp | image | |
MD5:F1DA441BB3B2D922F5DFD17536BD66D7 | SHA256:EC0E4F62A050C9588E1E7F31D9FD59B04B312B2DF9F3419548182BC11C1D3BFC | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\CrazyTrackbar.dll | executable | |
MD5:C2EF4F360C28A5C568F47F9FC9A1E279 | SHA256:4CD0FCD7412C4EE753BD90788F76D852ACABEC228182DD47D18A8F597DEE62B5 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\DevIL.NET.dll | executable | |
MD5:2C642572957CB4F7D57E23817E969598 | SHA256:710F2631CD560E626BF3757C43F1ED04019B812F0B11DBF644052A003FE77503 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\ILU.dll | executable | |
MD5:4C6D66C4CE9B695B4BD18254AD89971B | SHA256:C1DA9850CEFBEF8937B97DCB87742B3B381ED30473832BEFECCFD20F4E134DFE | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\DevIL.dll | executable | |
MD5:17790F357991F9359D4CDD734B5CD787 | SHA256:B16A4F47363E06D9D804DB936D4991FA04D7802DAD0BC97EE411194AE1109797 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\FViewPad.dll | executable | |
MD5:AE79A304715B1181A77556BB42F35230 | SHA256:D898EEFFE9C545D5A2AB06C908F58FBB27E8A1CB3183AC0FFC5E2461B905BC51 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\ShadowLabel.dll | executable | |
MD5:012159CA64F4A71224EE365889222010 | SHA256:2BAE96F41BA8AB97FA1C48E05361B05706A12D813278471FAC5148B99BDF04E2 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\PictureViewer.exe | executable | |
MD5:D129481CC46E22A251FB458649BF2CCE | SHA256:E586CD461A478D8DFE10BD43FDA72429957AB4FB12516798D64B95D4DE334D88 | |||
| 2896 | CrazyBumpSetup122.exe | C:\Program Files\Crazybump\ball.x | text | |
MD5:F7FDC129C949BB37E01A31121C429A9A | SHA256:64FAE2F03529E8F2D14E2FB8C96ACA1EF29832079BB7881B6968BDF06CE731E6 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2024 | CrazyBump.exe | GET | 404 | 64.90.42.96:80 | http://crazybump.com/beta/controlPage2 | US | html | 334 b | suspicious |
2024 | CrazyBump.exe | GET | 404 | 64.90.42.96:80 | http://crazybump.com/beta/upgrade/122.html | US | html | 338 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2024 | CrazyBump.exe | 64.90.42.96:80 | crazybump.com | New Dream Network, LLC | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
crazybump.com |
| suspicious |
formmail.dreamhost.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2024 | CrazyBump.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (MyAgent) |
2024 | CrazyBump.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (MyAgent) |
Process | Message |
|---|---|
CrazyBump.exe |
%s------------------------------------------------
--- WinLicense Professional ---
--- (c)2010 Oreans Technologies ---
------------------------------------------------
|