File name: | setup_install.exe |
Full analysis: | https://app.any.run/tasks/9b38a89b-87f1-443e-aa9e-684f38b5238f |
Verdict: | Malicious activity |
Analysis date: | August 08, 2020, 15:29:22 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | F4BF3D8404412E4F98CD85379AEBDF26 |
SHA1: | 3A9C99E4B2484EE66B85C92DD235E0502A4209FA |
SHA256: | BE01E0748F07877E1DF14EAEF79554100F0135411EFAA4B9C068768580E25357 |
SSDEEP: | 98304:MrIQTaLfoDVBWYn9G5NUM4gF8wGlt3DQPyxEc0:MWQJP9M+M4UyhGSE |
.exe | | | Win32 Executable (generic) (52.9) |
---|---|---|
.exe | | | Generic Win/DOS Executable (23.5) |
.exe | | | DOS Executable Generic (23.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2020:08:06 14:48:49+02:00 |
PEType: | PE32 |
LinkerVersion: | 14.2 |
CodeSize: | 104960 |
InitializedDataSize: | 3278848 |
UninitializedDataSize: | - |
EntryPoint: | 0x7e5000 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 06-Aug-2020 12:48:49 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000108 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 06-Aug-2020 12:48:49 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
0x00001000 | 0x002EE000 | 0x002EE000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.99379 | |
.rsrc | 0x002EF000 | 0x0004C4E5 | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.87783 |
.idata | 0x0033C000 | 0x00001000 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.28893 |
0x0033D000 | 0x002AF000 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.264678 | |
kpusdhws | 0x005EC000 | 0x001F9000 | 0x001F8600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.57751 |
atkrqswz | 0x007E5000 | 0x00001000 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.22106 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.91161 | 381 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 2.53447 | 16936 | UNKNOWN | English - United States | RT_ICON |
3 | 3.28406 | 9640 | UNKNOWN | English - United States | RT_ICON |
4 | 3.25228 | 6760 | UNKNOWN | English - United States | RT_ICON |
5 | 3.09893 | 4264 | UNKNOWN | English - United States | RT_ICON |
6 | 3.98255 | 2440 | UNKNOWN | English - United States | RT_ICON |
7 | 4.15091 | 1128 | UNKNOWN | English - United States | RT_ICON |
comctl32.dll |
kernel32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2960 | "C:\Users\admin\AppData\Local\Temp\setup_install.exe" | C:\Users\admin\AppData\Local\Temp\setup_install.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2500 | "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\eavfmksoq.vbs" | C:\Windows\system32\cmd.exe | — | setup_install.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1476 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\eavfmksoq.vbs" | C:\Windows\System32\WScript.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
2796 | "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\kbrqghryhn.exe" | C:\Windows\system32\cmd.exe | — | setup_install.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1156 | "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe" | C:\Windows\system32\cmd.exe | — | setup_install.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2196 | "C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe" | C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe | — | cmd.exe |
User: admin Company: ORPALIS Integrity Level: MEDIUM Description: Setup Launcher Unicode Exit code: 3221226540 Version: 3.0.113 | ||||
3824 | "C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe" | C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe | — | cmd.exe |
User: admin Company: ORPALIS Integrity Level: MEDIUM Description: Setup Launcher Unicode Exit code: 3221226540 Version: 3.0.113 | ||||
3068 | "C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe" | C:\Users\admin\AppData\Local\Temp\oynlreesbw.exe | cmd.exe | |
User: admin Company: ORPALIS Integrity Level: HIGH Description: Setup Launcher Unicode Version: 3.0.113 | ||||
3668 | "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\wwdwhhgv.exe" | C:\Windows\system32\cmd.exe | — | setup_install.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
PID | Process | Filename | Type | |
---|---|---|---|---|
1476 | WScript.exe | C:\Users\admin\AppData\Local\Temp\CabD2A2.tmp | — | |
MD5:— | SHA256:— | |||
1476 | WScript.exe | C:\Users\admin\AppData\Local\Temp\TarD2A3.tmp | — | |
MD5:— | SHA256:— | |||
2960 | setup_install.exe | C:\Users\admin\AppData\Local\Temp\Cab4F36.tmp | — | |
MD5:— | SHA256:— | |||
2960 | setup_install.exe | C:\Users\admin\AppData\Local\Temp\Tar4F37.tmp | — | |
MD5:— | SHA256:— | |||
2960 | setup_install.exe | C:\Users\admin\AppData\Local\Temp\eavfmksoq.vbs | text | |
MD5:088BFDAE7CA053017C70A14A66FE7932 | SHA256:F3230334D3DD7A3128A8D49A4F8A78A02C3D188A48F81BF07DEE2094EDA425B4 | |||
1476 | WScript.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08 | der | |
MD5:9E1EB3DDA03ED5B39D68CB26399E3C2E | SHA256:161399C3C4D0942A0AFE35D59B26D984D24C6E502253CDBDAECCDD9A0B53380E | |||
1476 | WScript.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C954CE05407CAD0B91F1461CBC854DCE | der | |
MD5:C774544D4141DB33740F292EB1CE1DEE | SHA256:88A48AF71537B2785C9503470D96854C9601910BD7D1BF0243D12DB1BF36DABD | |||
3068 | oynlreesbw.exe | C:\ProgramData\lvutduhqyjy\GB_2020_08_08___16_30___xqrksm_185.217.117.39.zip | — | |
MD5:— | SHA256:— | |||
1476 | WScript.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08 | binary | |
MD5:4C6C032A89D3E6A3C79147D3672A4841 | SHA256:9FA20EEF7C17559C61B1E3E6BC48C53AD9836D7CFF2F1F50560816D6128A69CC | |||
2960 | setup_install.exe | C:\Users\admin\AppData\Local\Temp\4C47.tmp | text | |
MD5:3ABCCC6941C4EC7B2B290749EF85AE53 | SHA256:63893735AACDB178BCF61E8F99F060E5D28625CA70CBD1775128DEC15F274558 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1476 | WScript.exe | GET | 200 | 2.16.107.43:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgObfHHgHlsa0R7fVL2Sj72S7g%3D%3D | unknown | der | 527 b | whitelisted |
2960 | setup_install.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | text | 292 b | shared |
1476 | WScript.exe | GET | 200 | 2.16.107.80:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
2960 | setup_install.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D | US | der | 471 b | whitelisted |
— | — | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line | unknown | text | 151 b | shared |
2960 | setup_install.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D | US | der | 1.47 Kb | whitelisted |
2960 | setup_install.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1476 | WScript.exe | 88.99.66.31:443 | iplogger.org | Hetzner Online GmbH | DE | malicious |
2960 | setup_install.exe | 18.205.93.2:443 | bitbucket.org | — | US | malicious |
2960 | setup_install.exe | 208.95.112.1:80 | ip-api.com | IBURST | — | malicious |
1476 | WScript.exe | 2.16.107.80:80 | isrg.trustid.ocsp.identrust.com | Akamai International B.V. | — | suspicious |
1476 | WScript.exe | 2.16.107.43:80 | ocsp.int-x3.letsencrypt.org | Akamai International B.V. | — | suspicious |
— | — | 208.95.112.1:80 | ip-api.com | IBURST | — | malicious |
2960 | setup_install.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2960 | setup_install.exe | 52.216.238.219:443 | bbuseruploads.s3.amazonaws.com | Amazon.com, Inc. | US | shared |
Domain | IP | Reputation |
---|---|---|
iplogger.org |
| shared |
isrg.trustid.ocsp.identrust.com |
| whitelisted |
ocsp.int-x3.letsencrypt.org |
| whitelisted |
ip-api.com |
| shared |
bitbucket.org |
| shared |
ocsp.digicert.com |
| whitelisted |
bbuseruploads.s3.amazonaws.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
1476 | WScript.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
1476 | WScript.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
2960 | setup_install.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
2960 | setup_install.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
— | — | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
Process | Message |
---|---|
setup_install.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
oynlreesbw.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|