File name:

cc2

Full analysis: https://app.any.run/tasks/38a20e60-5169-4ae7-a460-1408852be210
Verdict: Malicious activity
Analysis date: September 30, 2020, 08:12:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

4E98BE05DAF203BA0AB1F0E4D0327A5B

SHA1:

592FBD5F244A4FD1E3793276CBC85DCCBE775047

SHA256:

B53359AD579108273DC7A4414AEB7078DD20A371D739A0C25DD01F5A8C1EF2A6

SSDEEP:

3072:wYMOxjfp+XWIPzzC4HQHHLHHPPPHRHHeeHHHHHo:IDGIPXHQHHLHHPPPHRHHeeHHHHHo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • svchost.exe (PID: 876)
      • cc2.EXE (PID: 3180)
    • Uses SVCHOST.EXE for hidden code execution

      • cc2.EXE (PID: 3180)
  • SUSPICIOUS

    • Application launched itself

      • cc2.exe (PID: 2148)
    • Creates files in the user directory

      • cc2.EXE (PID: 3180)
      • calc.exe (PID: 2544)
    • Reads Internet Cache Settings

      • calc.exe (PID: 2544)
    • Executable content was dropped or overwritten

      • cc2.EXE (PID: 3180)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:05:16 04:18:55+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 77824
InitializedDataSize: 32768
UninitializedDataSize: -
EntryPoint: 0x10e0
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.1.1.395
ProductVersionNumber: 4.1.1.395
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: WiseCleaner.com
FileDescription: Wise Care 365
FileVersion: 4.11
LegalCopyright: WiseCleaner.com
ProductName: Wise Care 365
ProductVersion: 4.12

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-May-2016 02:18:55
Detected languages:
  • Spanish - Argentina
Comments: This installation was built with Inno Setup.
CompanyName: WiseCleaner.com
FileDescription: Wise Care 365
FileVersion: 4.11
LegalCopyright: WiseCleaner.com
ProductName: Wise Care 365
ProductVersion: 4.12

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 16-May-2016 02:18:55
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00012C64
0x00013000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.61364
.data
0x00014000
0x000050A0
0x00000000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0001A000
0x00001B0C
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.49561

Resources

Title
Entropy
Size
Codepage
Language
Type
1
2.68567
1268
Unicode (UTF 16LE)
UNKNOWN
RT_VERSION
101
0.0653925
1256
Unicode (UTF 16LE)
Spanish - Argentina
UNKNOWN
102
0.0653925
1256
Unicode (UTF 16LE)
Spanish - Argentina
UNKNOWN
103
0.0653925
1256
Unicode (UTF 16LE)
Spanish - Argentina
UNKNOWN
30001
2.57965
304
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
1.76987
744
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
2.07177
296
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

C:\WINDOWS\SYSTEM32\MSVBVM60.DLL
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cc2.exe no specs cc2.exe svchost.exe calc.exe

Process information

PID
CMD
Path
Indicators
Parent process
876svchost.exeC:\Windows\system32\svchost.exe
cc2.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2148"C:\Users\admin\AppData\Local\Temp\cc2.exe" C:\Users\admin\AppData\Local\Temp\cc2.exeexplorer.exe
User:
admin
Company:
WiseCleaner.com
Integrity Level:
MEDIUM
Description:
Wise Care 365
Exit code:
0
Version:
4.11
Modules
Images
c:\users\admin\appdata\local\temp\cc2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2544calc.exeC:\Windows\system32\calc.exe
cc2.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Calculator
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\calc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3180"C:\Users\admin\AppData\Local\Temp\cc2.EXE"C:\Users\admin\AppData\Local\Temp\cc2.EXE
cc2.exe
User:
admin
Company:
WiseCleaner.com
Integrity Level:
MEDIUM
Description:
Wise Care 365
Exit code:
0
Version:
4.11
Modules
Images
c:\users\admin\appdata\local\temp\cc2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
Total events
65
Read events
43
Write events
22
Delete events
0

Modification events

(PID) Process:(3180) cc2.EXEKey:HKEY_CURRENT_USER\Software\4NrAmXqs
Operation:writeName:ServerStarted
Value:
9/30/2020 9:12:24 AM
(PID) Process:(3180) cc2.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:JavaMIX
Value:
C:\testt\testlr.exe
(PID) Process:(3180) cc2.EXEKey:HKEY_CURRENT_USER\Software\4NrAmXqs
Operation:writeName:InstalledServer
Value:
C:\testt\testlr.exe
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2544) calc.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3180cc2.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\4NrAmXqs.cfgbinary
MD5:4C3D1C4DDC207905C89FBDBA78CE1B04
SHA256:EB5EA249415F560511DE12B711BD086447F18EE2B45816E16B8587C4F0B9A54D
3180cc2.EXEC:\testt\testlr.exeexecutable
MD5:4E98BE05DAF203BA0AB1F0E4D0327A5B
SHA256:B53359AD579108273DC7A4414AEB7078DD20A371D739A0C25DD01F5A8C1EF2A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
10
DNS requests
1
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
2544
calc.exe
GET
192.169.69.25:5090
http://dnsduck4.duckdns.org:5090/1234567890.functions
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2544
calc.exe
192.169.69.25:5090
dnsduck4.duckdns.org
Wowrack.com
US
malicious

DNS requests

Domain
IP
Reputation
dnsduck4.duckdns.org
  • 192.169.69.25
malicious

Threats

PID
Process
Class
Message
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info