URL:

http://resource.wondershare.com/003/066/fda142a5099b5ac8ce8851f99aa4bdbf.exe

Full analysis: https://app.any.run/tasks/e98e40da-3725-4d38-b017-a4e7000ba6f8
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 19, 2023, 19:33:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

50A16D520C7F80DBA2FC341EACACE627

SHA1:

6D9AF0D27B35E657C0C1C9425EEDBF814368EC5E

SHA256:

BF20EAB3637FEAB742C22F6622A3D97A5803727283F2F58099563CEC74702358

SSDEEP:

3:N1KMWdZPQLGKFNsAA1pac+RXN:CMWdhQLGsNT9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • fda142a5099b5ac8ce8851f99aa4bdbf.exe (PID: 584)
      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Process drops legitimate windows executable

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Reads the Internet Settings

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Uses TASKKILL.EXE to kill process

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • The process drops C-runtime libraries

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Process drops SQLite DLL files

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
  • INFO

    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 2184)
      • iexplore.exe (PID: 864)
    • Checks supported languages

      • fda142a5099b5ac8ce8851f99aa4bdbf.exe (PID: 584)
      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Application launched itself

      • iexplore.exe (PID: 2184)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2184)
    • Create files in a temporary directory

      • fda142a5099b5ac8ce8851f99aa4bdbf.exe (PID: 584)
      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Reads the computer name

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Creates files or folders in the user directory

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
    • Dropped object may contain TOR URL's

      • fda142a5099b5ac8ce8851f99aa4bdbf.tmp (PID: 1836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe fda142a5099b5ac8ce8851f99aa4bdbf.exe no specs fda142a5099b5ac8ce8851f99aa4bdbf.tmp no specs taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
584"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exeiexplore.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
DownloadUpdateSetup
Exit code:
0
Version:
3.0.0.147
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\fda142a5099b5ac8ce8851f99aa4bdbf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
864"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2184 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1216"C:\Windows\system32\TASKKILL.exe" /F /IM URLReqService.exeC:\Windows\System32\taskkill.exefda142a5099b5ac8ce8851f99aa4bdbf.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1836"C:\Users\admin\AppData\Local\Temp\is-8OD6S.tmp\fda142a5099b5ac8ce8851f99aa4bdbf.tmp" /SL5="$4014E,6669864,119296,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exe" C:\Users\admin\AppData\Local\Temp\is-8OD6S.tmp\fda142a5099b5ac8ce8851f99aa4bdbf.tmpfda142a5099b5ac8ce8851f99aa4bdbf.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-8od6s.tmp\fda142a5099b5ac8ce8851f99aa4bdbf.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2184"C:\Program Files\Internet Explorer\iexplore.exe" "http://resource.wondershare.com/003/066/fda142a5099b5ac8ce8851f99aa4bdbf.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
5 555
Read events
5 490
Write events
65
Delete events
0

Modification events

(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2184) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
159
Suspicious files
11
Text files
1 010
Unknown types
0

Dropped files

PID
Process
Filename
Type
2184iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exe.1gxywgb.partial:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
2184iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{833A9AB7-9EA5-11EE-AE0A-12A9866C77DE}.datbinary
MD5:C5392F35A18E3C2DCB09F6F0A4FACD36
SHA256:E44BE7D4C748C3F06C378B6CACE72A4D0245F78EB058E3F73305472860E14576
2184iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF184EF70B6B9824E9.TMPbinary
MD5:B4F318BB75178DA96B41DB79DDE2BD95
SHA256:4EFB22FAC2AF8C8D28275317A71B774477BA2D5581E7A76726B327CF642D7F6F
864iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exe.1gxywgb.partialexecutable
MD5:FDA142A5099B5AC8CE8851F99AA4BDBF
SHA256:786A21F39D5EE00767F102C44585F35A65FBB75398841983329664E2A5269864
2184iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fda142a5099b5ac8ce8851f99aa4bdbf.exeexecutable
MD5:FDA142A5099B5AC8CE8851F99AA4BDBF
SHA256:786A21F39D5EE00767F102C44585F35A65FBB75398841983329664E2A5269864
1836fda142a5099b5ac8ce8851f99aa4bdbf.tmpC:\Users\admin\AppData\Local\Temp\is-G8B95.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
584fda142a5099b5ac8ce8851f99aa4bdbf.exeC:\Users\admin\AppData\Local\Temp\is-8OD6S.tmp\fda142a5099b5ac8ce8851f99aa4bdbf.tmpexecutable
MD5:4DE6F44810BAD050AC81F45549D58F34
SHA256:CF8A77F4CBD38F6AB44FCFF738F81EC8DFDAA7EF5A64D62FDD84C6FE897ADFF5
1836fda142a5099b5ac8ce8851f99aa4bdbf.tmpC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\DownloadRes\is-FLDC0.tmptext
MD5:5EB70C5B988B6DC77BF3FF41C60B06EE
SHA256:97E8455DEA0C9C693E4B4B9943F55B247EE74201DBA77DB7F9D7C6547F8DF0CE
1836fda142a5099b5ac8ce8851f99aa4bdbf.tmpC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\DownloadRes\is-U4EN8.tmptext
MD5:CD013C002C9E490796302F253B5BC38D
SHA256:56F064C1AE05A9CFBF6E70A68AE6E754AD9176167013DB639898A7E0147FD595
1836fda142a5099b5ac8ce8851f99aa4bdbf.tmpC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\DownloadRes\is-3MHR0.tmptext
MD5:98E1AA04DF7D0C971E97036DC4E912A7
SHA256:364A556DFED68C75FF9C2E5E93315F3CBBAAEBB4511F05597D7AF20B9A0D9BFC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
13
DNS requests
7
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
864
iexplore.exe
GET
200
163.181.92.180:80
http://resource.wondershare.com/003/066/fda142a5099b5ac8ce8851f99aa4bdbf.exe
unknown
executable
6.80 Mb
unknown
2184
iexplore.exe
GET
200
104.110.191.198:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a85e8d0c2f0a71a5
unknown
compressed
4.66 Kb
unknown
2184
iexplore.exe
GET
200
104.110.191.198:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?914f352674d8023c
unknown
compressed
4.66 Kb
unknown
2184
iexplore.exe
GET
200
104.110.191.198:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0cd9c6b93b31954c
unknown
compressed
4.66 Kb
unknown
2184
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
864
iexplore.exe
163.181.92.180:80
resource.wondershare.com
Zhejiang Taobao Network Co.,Ltd
DE
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2184
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted
2184
iexplore.exe
104.110.191.198:80
ctldl.windowsupdate.com
Akamai International B.V.
NL
unknown
2184
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
resource.wondershare.com
  • 163.181.92.180
unknown
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ctldl.windowsupdate.com
  • 104.110.191.198
  • 104.110.191.184
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
864
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info