File name:

SecurityTaskManager_Setup.exe

Full analysis: https://app.any.run/tasks/eee2ab10-eaca-4ab9-b7c1-18f50450bf1d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 16, 2019, 15:39:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

444439BC44C476297D7F631A152CE638

SHA1:

820FCB951D1AC8C2FDA1A1AE790F52EB1F8EDF2E

SHA256:

BC2D5417A6BF47D53C20C280F6E4B1A3E00DC0B6BBD3E26B2E591FD2F2DC4CC3

SSDEEP:

49152:4s+HgXcROcfipeyNcRmyQLCUOE+N+2JLKmltavtaKhGiD79l+90U:4s+9ROcapelxQLGEjscg6939l+V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • setup.exe (PID: 2388)
      • TaskMan.exe (PID: 3096)
      • u[1].exe (PID: 2800)
      • ups[1].exe (PID: 2172)
      • upsupx[1].exe (PID: 884)
      • TaskMan.exe (PID: 3836)
    • Loads dropped or rewritten executable

      • ctfmon.exe (PID: 708)
      • explorer.exe (PID: 352)
      • TaskMan.exe (PID: 3096)
      • TaskMan.exe (PID: 3836)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 2340)
      • upsupx[1].exe (PID: 884)
    • Downloads executable files from IP

      • iexplore.exe (PID: 2340)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2344)
      • cmd.exe (PID: 2356)
      • cmd.exe (PID: 3328)
      • cmd.exe (PID: 3968)
    • Loads the Task Scheduler COM API

      • TaskMan.exe (PID: 3096)
      • TaskMan.exe (PID: 3836)
  • SUSPICIOUS

    • Creates a software uninstall entry

      • setup.exe (PID: 2388)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 2388)
      • SecurityTaskManager_Setup.exe (PID: 2744)
      • iexplore.exe (PID: 2340)
      • iexplore.exe (PID: 3976)
      • TaskMan.exe (PID: 3096)
      • upsupx[1].exe (PID: 884)
    • Creates files in the program directory

      • setup.exe (PID: 2388)
      • TaskMan.exe (PID: 3096)
      • upsupx[1].exe (PID: 884)
    • Executed via COM

      • explorer.exe (PID: 3172)
    • Creates files in the user directory

      • TaskMan.exe (PID: 3096)
      • TaskMan.exe (PID: 3836)
    • Starts Internet Explorer

      • explorer.exe (PID: 352)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2356)
      • cmd.exe (PID: 2344)
      • cmd.exe (PID: 3328)
      • cmd.exe (PID: 3968)
    • Starts CMD.EXE for commands execution

      • u[1].exe (PID: 2800)
      • ups[1].exe (PID: 2172)
    • Starts CMD.EXE for self-deleting

      • u[1].exe (PID: 2800)
      • ups[1].exe (PID: 2172)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 352)
      • TaskMan.exe (PID: 3096)
    • Connects to unusual port

      • u[1].exe (PID: 2800)
      • upsupx[1].exe (PID: 884)
    • Searches for installed software

      • TaskMan.exe (PID: 3096)
  • INFO

    • Reads settings of System Certificates

      • TaskMan.exe (PID: 3096)
    • Application launched itself

      • iexplore.exe (PID: 3976)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2340)
      • iexplore.exe (PID: 3976)
    • Changes internet zones settings

      • iexplore.exe (PID: 3976)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2340)
    • Creates files in the user directory

      • iexplore.exe (PID: 3976)
    • Reads the hosts file

      • TaskMan.exe (PID: 3096)
      • TaskMan.exe (PID: 3836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (32.1)
.exe | Win64 Executable (generic) (28.5)
.exe | Winzip Win32 self-extracting archive (generic) (23.7)
.dll | Win32 Dynamic Link Library (generic) (6.7)
.exe | Win32 Executable (generic) (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:02:24 16:50:34+01:00
PEType: PE32
LinkerVersion: 8
CodeSize: 77824
InitializedDataSize: 65536
UninitializedDataSize: -
EntryPoint: 0xaf1e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Feb-2009 15:50:34
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 24-Feb-2009 15:50:34
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00012775
0x00013000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.50181
.rdata
0x00014000
0x00003822
0x00004000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.98659
.data
0x00018000
0x0000E6E4
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.97381
.rsrc
0x00027000
0x0000976C
0x0000A000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.54785
_winzip_
0x00031000
0x002BA000
0x002BA000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
7.99948

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.82954
989
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.03621
744
Latin 1 / Western European
English - United States
RT_ICON
3
3.14459
296
Latin 1 / Western European
English - United States
RT_ICON
4
5.56342
3752
Latin 1 / Western European
English - United States
RT_ICON
5
5.99214
2216
Latin 1 / Western European
English - United States
RT_ICON
6
3.69605
1384
Latin 1 / Western European
English - United States
RT_ICON
7
5.83382
9640
Latin 1 / Western European
English - United States
RT_ICON
8
6.01045
4264
Latin 1 / Western European
English - United States
RT_ICON
9
4.68735
1128
Latin 1 / Western European
English - United States
RT_ICON
63
3.18826
764
Latin 1 / Western European
English - United States
RT_STRING

Imports

COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
71
Monitored processes
26
Malicious processes
10
Suspicious processes
5

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start securitytaskmanager_setup.exe setup.exe explorer.exe no specs explorer.exe no specs taskman.exe explorer.exe no specs ctfmon.exe no specs iexplore.exe iexplore.exe u[1].exe cmd.exe no specs cmd.exe no specs sc.exe no specs sc.exe no specs ping.exe no specs ping.exe no specs ups[1].exe cmd.exe no specs cmd.exe no specs sc.exe no specs sc.exe no specs ping.exe no specs ping.exe no specs upsupx[1].exe taskman.exe no specs securitytaskmanager_setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
352C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
496sc start xWinWpdSrvC:\Windows\system32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
708C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
884"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\upsupx[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\upsupx[1].exe
iexplore.exe
User:
admin
Company:
TODO: <公司名>
Integrity Level:
MEDIUM
Description:
TODO: <文件说明>
Exit code:
0
Version:
1.0.0.8
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\lh043oam\upsupx[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\psapi.dll
940ping 127.0.0.1 -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
1732ping 127.0.0.1 -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2112sc start xWinWpdSrvC:\Windows\system32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2172"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\ups[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\ups[1].exe
iexplore.exe
User:
admin
Company:
Orgs
Integrity Level:
MEDIUM
Description:
My
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\jgrr2oyx\ups[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2340"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3976 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2344"C:\Windows\system32\cmd.exe" /c sc start xWinWpdSrv&ping 127.0.0.1 -n 10 && del C:\Users\admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\LH043OAM\U_1_~1.EXE >> NULC:\Windows\system32\cmd.exeu[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
5 287
Read events
4 830
Write events
447
Delete events
10

Modification events

(PID) Process:(352) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(352) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:P:\Hfref\nqzva\Qrfxgbc\FrphevglGnfxZnantre_Frghc.rkr
Value:
000000000000000000000000B6010000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000
(PID) Process:(352) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:DisplayName
Value:
Security Task Manager 2.3d
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:UninstallString
Value:
C:\Program Files\Security Task Manager\Uninstal.exe
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:InstallLocation
Value:
C:\Program Files\Security Task Manager\
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:UninstallPath
Value:
C:\Program Files\Security Task Manager\
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:Publisher
Value:
Neuber Software
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:VersionMajor
Value:
2
(PID) Process:(2388) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Security Task Manager
Operation:writeName:VersionMinor
Value:
3
Executable files
24
Suspicious files
350
Text files
164
Unknown types
18

Dropped files

PID
Process
Filename
Type
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\liesmich.txttext
MD5:
SHA256:
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\readme.txttext
MD5:
SHA256:
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\leggimi.txttext
MD5:
SHA256:
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\TaskMan.exeexecutable
MD5:
SHA256:
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\file_id.diztext
MD5:85F533F1E1D0C11BE713C91F29BBAD54
SHA256:6FED71E2951B70F3E340A982B3D1A2914768D8C9691E6CFF465DED170944BA77
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\bestell.txttext
MD5:481325E02BD95664323A5299DA4F8BFE
SHA256:D9B135D7C0B39E38FEF169306599F3F8B1A82D701424892969EA8C5D6E790777
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\uninstal.exeexecutable
MD5:FA9F0F001EEAB09B8FADAB100AD60D7E
SHA256:709C6C2FB71F06AD8DAAE77E7AF11B3CEC059F25793D098D2254572A788EE120
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\manual_de.pdfpdf
MD5:17BBDF9FC220E9EFFACAA5A76CF4B688
SHA256:AF89A8B1030FAF760C16B66524F8A04188E49669FAA6F8123E2A4BF0ABAA75BC
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\SpyProDll.dllexecutable
MD5:642021C03975D907D65803AAE9EC3DEE
SHA256:0289FF37A7D4B6BD44AC96C714FE58329D4B1FDEA53F744AC3A5AE731236F87C
2744SecurityTaskManager_Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\manual_en.pdfpdf
MD5:F8DC026AC75362E1E5E41469CDDAE40C
SHA256:D97AAD84FC29C2B71FF9D07C645BB1B3DB779412F5673F5BD37B55520710CBCE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
9
DNS requests
1
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
884
upsupx[1].exe
GET
185.112.156.92:80
http://185.112.156.92/downs.exe
HU
suspicious
884
upsupx[1].exe
GET
66.117.6.174:80
http://66.117.6.174/ups.rar
US
suspicious
884
upsupx[1].exe
GET
199.168.100.74:8074
http://199.168.100.74:8074/2.exe
US
malicious
2340
iexplore.exe
GET
200
173.247.239.186:80
http://173.247.239.186/u.exe
US
executable
37.5 Kb
malicious
884
upsupx[1].exe
GET
200
45.58.135.106:80
http://45.58.135.106/xpdown.dat
US
binary
128 b
malicious
2800
u[1].exe
GET
200
185.112.156.92:8092
http://185.112.156.92:8092/ups.html
HU
text
12 b
suspicious
884
upsupx[1].exe
GET
200
45.58.135.106:80
http://45.58.135.106/ok/64.html
US
text
13 b
malicious
884
upsupx[1].exe
GET
200
199.168.100.74:8074
http://199.168.100.74:8074/item.rar
US
executable
3.20 Mb
malicious
2172
ups[1].exe
GET
200
223.25.247.240:80
http://223.25.247.240/ok/ups.html
MY
text
12 b
unknown
2340
iexplore.exe
GET
200
173.247.239.186:80
http://173.247.239.186/upsupx.exe
US
executable
216 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2172
ups[1].exe
223.25.247.240:80
Gigabit Hosting Sdn Bhd
MY
unknown
884
upsupx[1].exe
66.117.6.174:80
Corporate Colocation Inc.
US
suspicious
884
upsupx[1].exe
199.168.100.74:8074
DataShack, LC
US
malicious
884
upsupx[1].exe
45.58.135.106:80
Sharktech
US
malicious
884
upsupx[1].exe
185.112.156.92:80
DoclerWeb Kft.
HU
suspicious
3976
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2800
u[1].exe
185.112.156.92:8092
DoclerWeb Kft.
HU
suspicious
2340
iexplore.exe
173.247.239.186:80
Corporate Colocation Inc.
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
2340
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2340
iexplore.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
2340
iexplore.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
2340
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2340
iexplore.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
2340
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2340
iexplore.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2340
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2340
iexplore.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
884
upsupx[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] Backdoor.Win32.Mocker
No debug info