File name:

ZSsafe.exe

Full analysis: https://app.any.run/tasks/4793f1ea-1dbb-4c69-9f2b-7f26f93e393d
Verdict: Malicious activity
Analysis date: August 19, 2019, 12:02:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

78CC1FBAA1A89984591C90218E9D8806

SHA1:

400D6F503BA76129E9D2F9FE77C65F6CCEB24F47

SHA256:

C1F8A2BE52E1739A4D8475F97F73DAEAE71AF56BCD5BF468862B38B5F7E4A10B

SSDEEP:

49152:7fkH7Ag+ZNBaX5FvI6zZDQ6Y3eqa3rpq9nBmuT+xahqg2ryR7KmBS2RBokBF45ck:Dr9aX5l83f0rcBtTUao7yq27okBa5oA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ZSsafe.exe (PID: 4092)
    • Changes settings of System certificates

      • ctfmon.exe (PID: 3344)
  • SUSPICIOUS

    • Reads internet explorer settings

      • ctfmon.exe (PID: 3344)
    • Executable content was dropped or overwritten

      • ZSsafe.exe (PID: 4092)
    • Creates files in the user directory

      • ctfmon.exe (PID: 3344)
    • Adds / modifies Windows certificates

      • ctfmon.exe (PID: 3344)
    • Reads Internet Cache Settings

      • ctfmon.exe (PID: 3344)
  • INFO

    • Reads settings of System Certificates

      • ctfmon.exe (PID: 3344)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE Yoda's Crypter (63.7)
.dll | Win32 Dynamic Link Library (generic) (15.7)
.exe | Win32 Executable (generic) (10.8)
.exe | Generic Win/DOS Executable (4.8)
.exe | DOS Executable Generic (4.8)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x1000
UninitializedDataSize: -
InitializedDataSize: -
CodeSize: -
LinkerVersion: 5.12
PEType: PE32
TimeStamp: 1972:12:25 06:33:23+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 25-Dec-1972 05:33:23
Detected languages:
  • Chinese - PRC
FileVersion: 1.1.6.8
FileDescription: ZSsafe主程序
ProductName: ZSsafe
ProductVersion: 1.1.6.8
CompanyName: 逝去的青春
LegalCopyright: 逝去的青春 版权所有
Comments: 本程序使用易语言编写(http://www.eyuyan.com)

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 2
Time date stamp: 25-Dec-1972 05:33:23
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.UPX1
0x001C7000
0x0014CA75
0x001485B3
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.88471

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.02094
697
Latin 1 / Western European
Chinese - PRC
RT_MANIFEST
129
2.01924
20
Latin 1 / Western European
Chinese - PRC
RT_GROUP_ICON

Imports

kernel32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start zssafe.exe no specs zssafe.exe ctfmon.exe

Process information

PID
CMD
Path
Indicators
Parent process
3572"C:\Users\admin\AppData\Local\Temp\ZSsafe.exe" C:\Users\admin\AppData\Local\Temp\ZSsafe.exeexplorer.exe
User:
admin
Company:
逝去的青春
Integrity Level:
MEDIUM
Description:
ZSsafe主程序
Exit code:
3221226540
Version:
1.1.6.8
Modules
Images
c:\users\admin\appdata\local\temp\zssafe.exe
c:\systemroot\system32\ntdll.dll
4092"C:\Users\admin\AppData\Local\Temp\ZSsafe.exe" C:\Users\admin\AppData\Local\Temp\ZSsafe.exe
explorer.exe
User:
admin
Company:
逝去的青春
Integrity Level:
HIGH
Description:
ZSsafe主程序
Exit code:
0
Version:
1.1.6.8
Modules
Images
c:\users\admin\appdata\local\temp\zssafe.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3344ctfmon.exeC:\Windows\system32\ctfmon.exe
ZSsafe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CTF Loader
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
189
Read events
149
Write events
39
Delete events
1

Modification events

(PID) Process:(3344) ctfmon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3344) ctfmon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3344) ctfmon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ctfmon_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
12
Suspicious files
0
Text files
88
Unknown types
4

Dropped files

PID
Process
Filename
Type
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\16a26f.tmp
MD5:
SHA256:
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\16a27f.tmp
MD5:
SHA256:
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\16a280.tmp
MD5:
SHA256:
3344ctfmon.exeC:\Users\admin\AppData\Local\Temp\4OCh7YM.sys
MD5:
SHA256:
3344ctfmon.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@163[1].txttext
MD5:6979C4DB1A1F24E4D52E9CD877532126
SHA256:716D29EB8240A70C70F17351371749A73D00453DA268C4FD9A87947F8960A2FF
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\E_N60005\eAPI.fneexecutable
MD5:9248F3EE55CC9EF82D8A9AB080A59955
SHA256:83AF496BFDF67EBA9B1A3A3175EFE904223F699BA61234D2A6C306F956828F0A
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\E_N60005\dp1.fneexecutable
MD5:575FA39D371F124FBE76D334E2655390
SHA256:38E8F0EDF0EB7FD5386930874D7D81BD1559568F8BD2858DC62D15151CC2FE56
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\E_N60005\spec.fneexecutable
MD5:B35CA284FB4D1DDE5F678D6774369237
SHA256:1E7BCFCD3AF2C6F810E07A0401BF9763EE21E939DB1D786C001C69E4BD995195
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\E_N60005\iext.fnrexecutable
MD5:A6FA377C1E8656158E5AF42361665A86
SHA256:A1830064712D6881D8F31AD0D584C059F386E3C80BE478EC0FB7B0C805AED9BB
4092ZSsafe.exeC:\Users\admin\AppData\Local\Temp\E_N60005\krnln.fnrexecutable
MD5:F7454CB7722589332411E53C3AE67BB9
SHA256:E596602FE565B046237B940D7045D5FDBC5F461FB34076A448617C63A3DF6997
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
77
TCP/UDP connections
41
DNS requests
29
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3344
ctfmon.exe
GET
302
123.58.180.39:80
http://mojunxie521.blog.163.com/blog/static/27250327320174622243849/
CN
malicious
3344
ctfmon.exe
GET
218.11.8.232:80
http://leyun-1251032746.file.myqcloud.com/404/style.css?3
CN
malicious
3344
ctfmon.exe
GET
200
139.99.98.4:80
http://www.mojunyy.cn/css/index.css
SG
text
2.76 Kb
malicious
3344
ctfmon.exe
GET
404
139.99.98.4:80
http://www.mojunxie.win/cansu521.txt
SG
html
1.16 Kb
malicious
3344
ctfmon.exe
GET
200
139.99.98.4:80
http://www.mojunyy.cn/css/style.css
SG
text
11.2 Kb
malicious
3344
ctfmon.exe
GET
200
122.114.130.31:80
http://yuanlin.6600.org/cansu521.txt
CN
text
1.42 Kb
unknown
3344
ctfmon.exe
GET
200
139.99.98.4:80
http://www.mojunyy.cn/
SG
html
8.98 Kb
malicious
3344
ctfmon.exe
GET
200
139.99.98.4:80
http://www.mojunyy.cn/images/qrcode.png
SG
image
49.3 Kb
malicious
3344
ctfmon.exe
GET
200
64.32.8.138:80
http://pic.youku778.com/upload/vod/2019-08-19/15661797690.jpg
US
image
25.5 Kb
suspicious
3344
ctfmon.exe
GET
200
139.99.98.4:80
http://www.mojunyy.cn/images/logo.png
SG
image
4.43 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3344
ctfmon.exe
123.58.180.39:80
mojunxie521.blog.163.com
Guangzhou NetEase Computer System Co., Ltd.
CN
malicious
3344
ctfmon.exe
122.114.130.31:80
yuanlin.6600.org
CHINA UNICOM China169 Backbone
CN
unknown
3344
ctfmon.exe
64.32.8.138:80
pic.youku778.com
Sharktech
US
suspicious
3344
ctfmon.exe
119.146.74.49:80
apps.bdimg.com
Guangdong
CN
suspicious
3344
ctfmon.exe
172.247.253.131:443
img.yongjiu7.com
CNSERVERS LLC
US
unknown
3344
ctfmon.exe
163.171.133.124:80
b.bst.126.net
US
malicious
3344
ctfmon.exe
172.247.253.140:443
img.yongjiu7.com
CNSERVERS LLC
US
unknown
3344
ctfmon.exe
54.230.93.65:80
p7.qhimg.com
Amazon.com, Inc.
US
unknown
3344
ctfmon.exe
220.242.139.165:443
js.users.51.la
CN
unknown
3344
ctfmon.exe
172.247.253.198:443
img.yongjiu7.com
CNSERVERS LLC
US
unknown

DNS requests

Domain
IP
Reputation
mojunxie521.blog.163.com
  • 123.58.180.39
  • 123.58.180.101
malicious
blog.163.com
  • 123.58.180.39
  • 123.58.180.101
whitelisted
b.bst.126.net
  • 163.171.133.124
malicious
www.mojunxie.win
  • 139.99.98.4
malicious
leyun-1251032746.file.myqcloud.com
  • 218.11.8.232
  • 101.71.72.192
  • 221.204.166.70
  • 1.189.213.64
  • 113.200.16.234
  • 59.83.204.11
  • 116.95.25.196
  • 42.56.76.104
  • 112.132.32.250
  • 59.80.39.110
  • 14.204.74.140
  • 211.91.160.228
  • 42.236.125.84
  • 211.97.73.224
  • 218.11.11.73
malicious
yuanlin.6600.org
  • 122.114.130.31
unknown
www.mojunyy.cn
  • 139.99.98.4
malicious
apps.bdimg.com
  • 119.146.74.49
whitelisted
img.yongjiu7.com
  • 172.247.253.198
  • 104.216.240.75
  • 172.247.253.140
  • 172.247.253.35
  • 45.195.70.131
  • 45.195.70.11
  • 172.247.253.67
  • 172.247.253.108
  • 172.247.253.166
  • 172.247.253.131
  • 172.247.253.236
unknown
pic.youku778.com
  • 64.32.8.138
suspicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS HTTP Request to a 3322.net Domain *.6600.org
No debug info