analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe

Full analysis: https://app.any.run/tasks/11560b82-8fc4-42d5-9944-cba488fb006a
Verdict: Malicious activity
Analysis date: November 14, 2018, 09:25:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

6D6F153A43B5E37A70AC496BEB71FDB3

SHA1:

AA290238CC5022BCE25F182569352CC9095ADE03

SHA256:

C4777F0019AB390313E02F8B0D4655245FAE832C16EAD6C3F3A223A8F5BC3ED7

SSDEEP:

768:tgtC7FBAVHy/Fk+YwqwDEeeMLgnB+6KFlB6iowk+4ItEhcI0J5:tgtC7Fqpy/FSwyeeM2B+6KQiowk+4ItB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Modifies files in Chrome extension folder

      • c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe (PID: 184)
    • Actions looks like stealing of personal data

      • c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe (PID: 184)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

AssemblyVersion: 1.0.0.0
ProductVersion: 1.0.0.0
ProductName: WindowsFormsApplication1
OriginalFileName: GrujaRSorium.exe
LegalCopyright: Copyright © 2018
InternalName: GrujaRSorium.exe
FileVersion: 1.0.0.0
FileDescription: WindowsFormsApplication1
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0xab6e
UninitializedDataSize: -
InitializedDataSize: 2048
CodeSize: 35840
LinkerVersion: 11
PEType: PE32
TimeStamp: 2018:11:11 12:50:10+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 11-Nov-2018 11:50:10
Debug artifacts:
  • D:\delphi\35\WindowsFormsApplication1\WindowsFormsApplication1\obj\x86\Release\GrujaRSorium.pdb
FileDescription: WindowsFormsApplication1
FileVersion: 1.0.0.0
InternalName: GrujaRSorium.exe
LegalCopyright: Copyright © 2018
OriginalFilename: GrujaRSorium.exe
ProductName: WindowsFormsApplication1
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 11-Nov-2018 11:50:10
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x00008B74
0x00008C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.16377
.rsrc
0x0000C000
0x00000590
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.04857
.reloc
0x0000E000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.0815394

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00112
490
UNKNOWN
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
31
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe

Process information

PID
CMD
Path
Indicators
Parent process
184"C:\Users\admin\AppData\Local\Temp\c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe" C:\Users\admin\AppData\Local\Temp\c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WindowsFormsApplication1
Version:
1.0.0.0
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
87
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_find20x20.png.aesbinary
MD5:858D5916504D569AC593CA56893FCBB6
SHA256:9BE95ABB0B970E3D8C1B2B70CD1E0BDEC98A3D7839001C8CE52BD6267AC731CB
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_compare20x20.png.aesbinary
MD5:B2BA1690CE9D1C564EB9DB4DD3B2898D
SHA256:6BD5A967074A949816175FBE093E3AE5289C45B04A88267DE5A44BD5C50B6594
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_disconnect20x20.png.aesbinary
MD5:2311BAF6A3242D60E865087390E735FF
SHA256:BFDF0D30BED1E9BB432B0FE19B7383003F6E00A32889DF20327A7931C9B08A16
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_dropdown12x12.png.aesbinary
MD5:DC8CC4C017020A57A60D336EAEDF5592
SHA256:6D0BE445F629385D527888B9B01439C64C04BBA55A6F6D1291AEE162D58E5682
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_cancel24x24.png.aesbinary
MD5:606364D27524C0026CBBCB52A9D100AA
SHA256:1DD3EE13625C887C21013B2A09A3562407945A088817919395A76CD06B9F0429
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_file16x16.png.aesbinary
MD5:4E5ED035450FE1E87999E1E42ACF888D
SHA256:0B6F4FDE911E864C721773F2D9B14692B070A8F16FD69525690D0F30D6450576
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_auto16x16.png.aesbinary
MD5:239AA493F10E6CC1A814165E68FB870D
SHA256:3A731245EEC3AC13C3CC94A2D628588671DBBCFBE7F99E94771500AEDF583046
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_auto16x16.png.aesedbinary
MD5:2E2E23CB40F228F52F07007938E4DDB7
SHA256:B124438AA4223FBE746F813936BD816BD37CD6FC7DFF142FAEB295D908A4212B
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_dropdown12x12.png.aesedbinary
MD5:E72EF57BE98C7D5700615DF60B21E542
SHA256:B9AB1D0658D921EAEA6D3C1F1ADE79A28C6A7403C37029964E77C650EF28C7F6
184c4777f0019ab390313e02f8b0d4655245fae832c16ead6c3f3a223a8f5bc3ed7.exeC:\Users\admin\AppData\Local\FileZilla\default_file16x16.png.aesedbinary
MD5:A3EA23E18D36282FF059A3FE50102EEE
SHA256:7104A1C5DE835C5533B2E7B4897D530521C2667AD1FA2930E667FAA2BBE4D83C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info