| File name: | BLuecord.exe |
| Full analysis: | https://app.any.run/tasks/70d10b5f-0146-4627-8d73-80e1d491780a |
| Verdict: | Malicious activity |
| Analysis date: | May 21, 2023, 14:32:05 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 4B28101A9496EE4933486B1612E6B37D |
| SHA1: | 1AD83BE2E185EA7E8D8B2139885ABFD19AA8486E |
| SHA256: | BE6E41CB79CDAD91DC4BF6CBE2E133ECD452C47A94ABD79F05DAE80AEB29E897 |
| SSDEEP: | 98304:uYN8839InHHroDQqFh/rUJODRyVd8cwFZkMb8yG3C6S/Am0iyp7URBd8+3n:BHNI8kOxrUgRyVd8bkMAy56S/1OGnR3n |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| Subsystem: | Windows GUI |
|---|---|
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x205e0 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 262144 |
| CodeSize: | 208384 |
| LinkerVersion: | 14.33 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2023:02:16 12:31:25+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 16-Feb-2023 12:31:25 |
| Detected languages: |
|
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000120 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 16-Feb-2023 12:31:25 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00032C1C | 0x00032E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.69711 |
.rdata | 0x00034000 | 0x0000B130 | 0x0000B200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.25783 |
.data | 0x00040000 | 0x00024750 | 0x00001200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.08398 |
.didat | 0x00065000 | 0x00000190 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.37276 |
.rsrc | 0x00066000 | 0x0000DFF8 | 0x0000E000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.63872 |
.reloc | 0x00074000 | 0x000023AC | 0x00002400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.64408 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.25329 | 1875 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 5.10026 | 2216 | UNKNOWN | English - United States | RT_ICON |
3 | 5.25868 | 3752 | UNKNOWN | English - United States | RT_ICON |
4 | 5.02609 | 1128 | UNKNOWN | English - United States | RT_ICON |
5 | 5.18109 | 4264 | UNKNOWN | English - United States | RT_ICON |
6 | 5.04307 | 9640 | UNKNOWN | English - United States | RT_ICON |
7 | 3.1586 | 482 | UNKNOWN | English - United States | RT_STRING |
8 | 3.11685 | 460 | UNKNOWN | English - United States | RT_STRING |
9 | 3.11236 | 440 | UNKNOWN | English - United States | RT_STRING |
10 | 2.99727 | 326 | UNKNOWN | English - United States | RT_STRING |
KERNEL32.dll |
OLEAUT32.dll |
USER32.dll (delay-loaded) |
gdiplus.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 940 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | svchost.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2168 | "C:\Users\admin\AppData\Local\Temp\Built.exe" | C:\Users\admin\AppData\Local\Temp\Built.exe | — | Built.exe | |||||||||||
User: admin Company: Windows (R) Win 7 DDK provider Integrity Level: MEDIUM Description: Microsoft (R) DirectX Control Panel Exit code: 0 Version: 6.3.9600.16384 Modules
| |||||||||||||||
| 2884 | "C:\Users\admin\AppData\Local\Temp\qualcom2.exe" | C:\Users\admin\AppData\Local\Temp\qualcom2.exe | BLuecord.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Remote Controler Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2940 | "C:\Users\admin\AppData\Local\Temp\Built.exe" | C:\Users\admin\AppData\Local\Temp\Built.exe | BLuecord.exe | ||||||||||||
User: admin Company: Windows (R) Win 7 DDK provider Integrity Level: MEDIUM Description: Microsoft (R) DirectX Control Panel Exit code: 0 Version: 6.3.9600.16384 Modules
| |||||||||||||||
| 3100 | "C:\Users\admin\AppData\Local\Temp\weeew.exe" | C:\Users\admin\AppData\Local\Temp\weeew.exe | BLuecord.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3168 | "C:\Users\admin\AppData\Local\Temp\weeew.exe" | C:\Users\admin\AppData\Local\Temp\weeew.exe | weeew.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3204 | "C:\Users\admin\AppData\Local\Temp\hehehe.exe" | C:\Users\admin\AppData\Local\Temp\hehehe.exe | BLuecord.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 Modules
| |||||||||||||||
| 3924 | "C:\Users\admin\AppData\Local\Temp\svchost.exe" | C:\Users\admin\AppData\Local\Temp\svchost.exe | BLuecord.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 1 Version: 0.0.0.0 Modules
| |||||||||||||||
| 3980 | "C:\Users\admin\AppData\Local\Temp\BLuecord.exe" | C:\Users\admin\AppData\Local\Temp\BLuecord.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3980) BLuecord.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3204) hehehe.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe | |||
| (PID) Process: | (3924) svchost.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3924) svchost.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3924) svchost.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3980 | BLuecord.exe | C:\Users\admin\AppData\Local\Temp\hehehe.exe | executable | |
MD5:CD598615AACEE2EA1E5559BC0B4F7B25 | SHA256:47D42B0EFF8EF74351A5F639EC18B4A08139B077DB9707147B23C0FADCF1DA9B | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\PIL\_imagingcms.cp310-win32.pyd | executable | |
MD5:F47756792144E3696BC72BCEE3E5D8A5 | SHA256:14E948F1797C70B7C4C42B27F95EFACDBC1E95EC95F06E0752A415025C60083E | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\_decimal.pyd | executable | |
MD5:06AB63CD64FB7A3F3356F843BB294072 | SHA256:5AEE22492C520A21292C84CBD0FE4B7E1038F73AE231809F18A8A7CF0097B48A | |||
| 3980 | BLuecord.exe | C:\Users\admin\AppData\Local\Temp\qualcom2.exe | executable | |
MD5:355BC46C8A6019902CC98ADDFC80C458 | SHA256:FF3BFA8D5E30259700ACE5C838C90757682850570EB961A12C2E780750F99DD1 | |||
| 3980 | BLuecord.exe | C:\Users\admin\AppData\Local\Temp\Built.exe | executable | |
MD5:495004999CFE58F3E80DD41EF06BDCD9 | SHA256:166E4B41E4E56B5F521AFE7117643CE99E56CE0E2388E9382EC1DCBCD1355AA1 | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\_ctypes.pyd | executable | |
MD5:6A64B32FF56498158110875DF5CF684F | SHA256:78F42580C9AD4DA257DA8AB8CC7A289EECFFD78CA754F8B582F63089EF3D762B | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\PIL\_imaging.cp310-win32.pyd | executable | |
MD5:646D295497A457622F5D5456FC37133E | SHA256:4F4C3ED3A558F3813969D7749EED7B5D79526AF46B2C463075C339A98750E325 | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\VCRUNTIME140.dll | executable | |
MD5:1E6E97D60D411A2DEE8964D3D05ADB15 | SHA256:8598940E498271B542F2C04998626AA680F2172D0FF4F8DBD4FFEC1A196540F9 | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\PIL\_imagingtk.cp310-win32.pyd | executable | |
MD5:F176ACEA16B13B437FB6F44F30677778 | SHA256:43866ABF690F3B11B7ACB4FA301F3389C072B8FDBCA92F4219547E0FAB1AF818 | |||
| 2940 | Built.exe | C:\Users\admin\AppData\Local\Temp\_MEI29402\_queue.pyd | executable | |
MD5:045E1030DA6356BCAA78E0AEB0C3A688 | SHA256:49DD7382D79D2DCFACBC65DEBBBD6BDD8854F42C04742F6DE3950A63A988DC5F | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3400 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1076 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
baggard477.ddns.net |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3168 | weeew.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3168 | weeew.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
1076 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3168 | weeew.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3168 | weeew.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |