File name:

(jumpstart).exe

Full analysis: https://app.any.run/tasks/1ac95308-769f-47b2-af42-8c1bfed89f1d
Verdict: Malicious activity
Analysis date: February 16, 2024, 18:43:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
MD5:

467F3354F86757A0EEE774D0C978DF9B

SHA1:

D06FED3616ED78ADD3909AF5F5C0FFDF4B5AB041

SHA256:

B6C76C3AC73B73D59A033ABEEFD338EA537644AB349A9F4BBF56DD0DE50FD312

SSDEEP:

98304:C+paRFN/3ci0NbvduzwxdzyX9QIFlgV2z02+U5YBIW5Jh8s1RXoQ73aOJ0U6CnyI:scf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • (jumpstart).exe (PID: 3672)
      • Jumpstar.exe (PID: 3652)
      • Jumpstar.exe (PID: 2848)
      • (jumpstart).exe (PID: 796)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • (jumpstart).exe (PID: 3672)
      • (jumpstart).exe (PID: 796)
    • Starts itself from another location

      • (jumpstart).exe (PID: 3672)
      • (jumpstart).exe (PID: 796)
    • Executable content was dropped or overwritten

      • (jumpstart).exe (PID: 3672)
      • Jumpstar.exe (PID: 3652)
      • Jumpstar.exe (PID: 2848)
      • (jumpstart).exe (PID: 796)
    • Reads the Internet Settings

      • HelpPane.exe (PID: 3960)
      • (jumpstart).exe (PID: 796)
      • (jumpstart).exe (PID: 3672)
    • Reads Internet Explorer settings

      • HelpPane.exe (PID: 3960)
    • Reads Microsoft Outlook installation path

      • HelpPane.exe (PID: 3960)
    • Drops a system driver (possible attempt to evade defenses)

      • Jumpstar.exe (PID: 3652)
  • INFO

    • Reads the computer name

      • (jumpstart).exe (PID: 3672)
      • jswscapp.exe (PID: 864)
      • Jumpstar.exe (PID: 2960)
      • (jumpstart).exe (PID: 796)
      • Jumpstar.exe (PID: 3684)
      • Jumpstar.exe (PID: 2848)
      • Jumpstar.exe (PID: 3652)
    • Checks supported languages

      • Jumpstar.exe (PID: 3652)
      • (jumpstart).exe (PID: 3672)
      • jswtrayutil.exe (PID: 1040)
      • Jumpstar.exe (PID: 2848)
      • jswpbapi.exe (PID: 4008)
      • jswscapp.exe (PID: 864)
      • jswpsapi.exe (PID: 1692)
      • Jumpstar.exe (PID: 2960)
      • (jumpstart).exe (PID: 796)
      • Jumpstar.exe (PID: 3684)
    • Manual execution by a user

      • jswtrayutil.exe (PID: 1040)
      • jswscapp.exe (PID: 864)
      • Jumpstar.exe (PID: 2848)
      • jswpbapi.exe (PID: 4008)
      • jswpsapi.exe (PID: 1692)
      • winhlp32.exe (PID: 2856)
      • Jumpstar.exe (PID: 2960)
      • (jumpstart).exe (PID: 796)
    • Reads the machine GUID from the registry

      • jswscapp.exe (PID: 864)
      • winhlp32.exe (PID: 2856)
      • HelpPane.exe (PID: 3960)
    • Checks proxy server information

      • HelpPane.exe (PID: 3960)
    • Reads security settings of Internet Explorer

      • HelpPane.exe (PID: 3960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:02:10 13:09:37+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 67584
InitializedDataSize: 72704
UninitializedDataSize: -
EntryPoint: 0xa785
OSVersion: 5
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
13
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start (jumpstart).exe jumpstar.exe jumpstar.exe jswtrayutil.exe no specs jswscapp.exe no specs jswpbapi.exe no specs jswpsapi.exe no specs winhlp32.exe no specs helppane.exe no specs jumpstar.exe no specs (jumpstart).exe jumpstar.exe no specs PhotoViewer.dll no specs

Process information

PID
CMD
Path
Indicators
Parent process
796"C:\Users\admin\Desktop\(jumpstart).exe" C:\Users\admin\Desktop\(jumpstart).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\(jumpstart).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
864"C:\Users\admin\Desktop\jswscapp.exe" C:\Users\admin\Desktop\jswscapp.exeexplorer.exe
User:
admin
Company:
Atheros Communications, Inc.
Integrity Level:
MEDIUM
Description:
Jumpstart for Wireless
Exit code:
0
Version:
2.1.0.18
Modules
Images
c:\users\admin\desktop\jswscapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\avifil32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1040"C:\Users\admin\Desktop\jswtrayutil.exe" C:\Users\admin\Desktop\jswtrayutil.exeexplorer.exe
User:
admin
Company:
Atheros Communications, Inc.
Integrity Level:
MEDIUM
Description:
Tray Utility for JumpStart for Wireless
Exit code:
0
Version:
2.1.0.18
Modules
Images
c:\users\admin\desktop\jswtrayutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1576C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1692"C:\Users\admin\Desktop\jswpsapi.exe" C:\Users\admin\Desktop\jswpsapi.exeexplorer.exe
User:
admin
Company:
Atheros Communications, Inc.
Integrity Level:
MEDIUM
Description:
Jumpstart for Wireless API
Exit code:
2
Version:
2.1.0.18
Modules
Images
c:\users\admin\desktop\jswpsapi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\jswscimd.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2848"C:\Users\admin\Desktop\Jumpstar.exe" C:\Users\admin\Desktop\Jumpstar.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\jumpstar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2856"C:\Windows\winhlp32.exe" C:\Users\admin\Desktop\JSWSCAPP.HLPC:\Windows\winhlp32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Winhlp32 Stub
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\winhlp32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2960"C:\Users\admin\Desktop\Jumpstar.exe" C:\Users\admin\Desktop\Jumpstar.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\jumpstar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3652"C:\Users\admin\Desktop\Jumpstar.exe" C:\Users\admin\Desktop\Jumpstar.exe
(jumpstart).exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\jumpstar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3672"C:\Users\admin\Desktop\(jumpstart).exe" C:\Users\admin\Desktop\(jumpstart).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\(jumpstart).exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
2 788
Read events
2 747
Write events
39
Delete events
2

Modification events

(PID) Process:(3672) (jumpstart).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3672) (jumpstart).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3672) (jumpstart).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3672) (jumpstart).exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(864) jswscapp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Multimedia\DrawDib
Operation:writeName:vga.drv 1280x720x32(BGR 0)
Value:
31,31,31,31
(PID) Process:(3960) HelpPane.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Assistance\Client\1.0\Settings
Operation:writeName:OnlineAssist
Value:
0
(PID) Process:(3960) HelpPane.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Assistance\Client\1.0\Settings
Operation:writeName:ImplicitFeedback
Value:
0
(PID) Process:(3960) HelpPane.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Assistance\Client\1.0\Settings
Operation:writeName:FirstTimeHelppaneStartup
Value:
0
(PID) Process:(3960) HelpPane.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Assistance\Client\1.0\Settings
Operation:writeName:IsConnected
Value:
0
(PID) Process:(3960) HelpPane.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
17
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2848Jumpstar.exeC:\Users\admin\Desktop\jswscimd.dllexecutable
MD5:3F4D6FDD38F96A0353D8961B4576627A
SHA256:61E8E262A78DA2C8933F16323F772C1C97E3E10691409672F568F1D6EC902E7B
3652Jumpstar.exeC:\Users\admin\Desktop\jswpsapi.exeexecutable
MD5:CD9F4E53DA79ED4CD7562604FE9523A6
SHA256:94C6C89CD73F6D052EB498EB00BFC826D8E521C2138D8840BB7667234A658401
3652Jumpstar.exeC:\Users\admin\Desktop\jswscimd.dllexecutable
MD5:3F4D6FDD38F96A0353D8961B4576627A
SHA256:61E8E262A78DA2C8933F16323F772C1C97E3E10691409672F568F1D6EC902E7B
3652Jumpstar.exeC:\Users\admin\Desktop\Driver\jswpslwf.infbinary
MD5:7886830F25B31D10917195EB1F6F6613
SHA256:459E2DA1FADF34FED1E8E48BB5140CA4AA382D83012F893EDE57A2062D63D57A
3672(jumpstart).exeC:\Users\admin\Desktop\Jumpstar.exeexecutable
MD5:98ABD9B7C9E8F4C3773DF7C85BE47BED
SHA256:F1893EE7F051B307D6E7634030F0D032C46AA82ACAEAB8A334F553B91C008D45
3652Jumpstar.exeC:\Users\admin\Desktop\Driver\jswpslwf.sysexecutable
MD5:55C9B4252B751226B838EED2BC50BB64
SHA256:B6D00C6541339C37855012F53245D41DD82974EE9BEA5C8ABDBF278D89010982
3652Jumpstar.exeC:\Users\admin\Desktop\jswscapp.exeexecutable
MD5:6AAD3F9C4636D4E43902EA7593B5A117
SHA256:6C1999E8D32B0DBB5A61E0AB0BF8A1DB36F49339319A9C7BFE7CF58679F38894
2848Jumpstar.exeC:\Users\admin\Desktop\jswpbapi.exeexecutable
MD5:670D6F56BA218AE78CD526AFCC530E2A
SHA256:85A676492687F8BCE42F82FF50852658698F1987A0BAFB71034D0755C1C80526
3652Jumpstar.exeC:\Users\admin\Desktop\Driver\jswpslwf.catcat
MD5:28DA58C9DB6878C9EB890C2F31678F4B
SHA256:2AAC011E3D4388D6389B92ECC8644BFE18EC6911A26E1F3D1A69F8A631478982
2848Jumpstar.exeC:\Users\admin\Desktop\jswpsapi.exeexecutable
MD5:CD9F4E53DA79ED4CD7562604FE9523A6
SHA256:94C6C89CD73F6D052EB498EB00BFC826D8E521C2138D8840BB7667234A658401
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info