| File name: | Microsoft_Security_Essentials.exe |
| Full analysis: | https://app.any.run/tasks/6cda1449-34a5-4e3f-af76-302d607c6738 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 28, 2020, 20:42:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | AE1B867937C6A26F2CACBF24AA415948 |
| SHA1: | A6BDF709456B2E469C74A481EA94D9680E12B5C5 |
| SHA256: | C570211DD10ED0D85BB16BC1D09214EC4893CCA85282E673F833099C60F72ECD |
| SSDEEP: | 49152:DzAHYd48o6OhXnbuVkNwGv/qRhsVaDGHgZiBrTL/L0ML8adHEKxLe24+:DEHYdD9vhssyAZi6cHr7 |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:02:11 12:50:49+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 1239552 |
| InitializedDataSize: | 1121792 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa8a4a |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 11-Feb-2020 11:50:49 |
| Detected languages: |
|
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000138 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 7 |
| Time date stamp: | 11-Feb-2020 11:50:49 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0012E8C6 | 0x0012EA00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.52164 |
.rdata | 0x00130000 | 0x0005799E | 0x00057A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.32908 |
.data | 0x00188000 | 0x00009BA0 | 0x00006A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.46921 |
.gfids | 0x00192000 | 0x000008FC | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.86655 |
.tls | 0x00193000 | 0x00000009 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0203931 |
.rsrc | 0x00194000 | 0x000A1858 | 0x000A1A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.9567 |
.reloc | 0x00236000 | 0x000113C8 | 0x00011400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.6071 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 4.89623 | 392 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 5.00191 | 2440 | Latin 1 / Western European | Russian - Russia | RT_ICON |
3 | 4.81395 | 4264 | Latin 1 / Western European | Russian - Russia | RT_ICON |
4 | 4.5487 | 9640 | Latin 1 / Western European | Russian - Russia | RT_ICON |
5 | 4.47802 | 16936 | Latin 1 / Western European | Russian - Russia | RT_ICON |
6 | 4.24993 | 67624 | Latin 1 / Western European | Russian - Russia | RT_ICON |
7 | 2.79915 | 130 | Latin 1 / Western European | Russian - Russia | RT_STRING |
8 | 2.82161 | 4264 | Latin 1 / Western European | Russian - Russia | RT_ICON |
9 | 2.9458 | 1128 | Latin 1 / Western European | Russian - Russia | RT_ICON |
29 | 3.29502 | 308 | Latin 1 / Western European | Russian - Russia | RT_STRING |
ADVAPI32.dll |
CRYPT32.dll |
GDI32.dll |
KERNEL32.dll |
OLEAUT32.dll |
SHELL32.dll |
SHLWAPI.dll |
USER32.dll |
WINHTTP.dll |
WS2_32.dll |
Title | Ordinal | Address |
|---|---|---|
_EmbeddedWebBrowserAbort@4 | 1 | 0x000149B0 |
_EmbeddedWebBrowserCheckItem@8 | 2 | 0x00014890 |
_EmbeddedWebBrowserCheckOffersContent@20 | 3 | 0x00014B90 |
_EmbeddedWebBrowserCreate@28 | 4 | 0x0000DFF0 |
_EmbeddedWebBrowserDestroy@4 | 5 | 0x00014680 |
_EmbeddedWebBrowserGetLastClick@8 | 6 | 0x00014870 |
_EmbeddedWebBrowserGetOfferIndex@4 | 7 | 0x00015260 |
_EmbeddedWebBrowserGetOffersCount@4 | 8 | 0x00015210 |
_EmbeddedWebBrowserGetPage@4 | 9 | 0x00014A90 |
_EmbeddedWebBrowserGetTitleBarHeight@0 | 10 | 0x00015290 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 472 | C:\Windows\system32\services.exe | C:\Windows\System32\services.exe | — | wininit.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Services and Controller app Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 620 | "c:\Program Files\Microsoft Security Client\MsMpEng.exe" | c:\Program Files\Microsoft Security Client\MsMpEng.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Antimalware Service Executable Exit code: 0 Version: 4.10.0209.0 Modules
| |||||||||||||||
| 700 | "C:\Windows\system32\wermgr.exe" "-outproc" "868" "4664" | C:\Windows\system32\wermgr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 868 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 916 | "C:\Users\admin\AppData\Local\Temp\Microsoft_Security_Essentials.exe" | C:\Users\admin\AppData\Local\Temp\Microsoft_Security_Essentials.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1000 | "C:\Users\admin\AppData\Local\Temp\Microsoft_Security_Essentials.exe" | C:\Users\admin\AppData\Local\Temp\Microsoft_Security_Essentials.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 1400 | C:\Users\admin\AppData\Local\Temp\install\0\58a3ab93445391306ebd.exe | C:\Users\admin\AppData\Local\Temp\install\0\58a3ab93445391306ebd.exe | Microsoft_Security_Essentials.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: MSEInstall Package Exit code: 0 Version: 4.10.0209.0 Modules
| |||||||||||||||
| 1732 | "C:\Windows\system32\EventCreate.exe" /L APPLICATION /T INFORMATION /SO "Microsoft Security Client Setup" /ID 100 /D "HRESULT:0x00000000 Description:The operation completed successfully. " | C:\Windows\system32\EventCreate.exe | — | Setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Event Create - Creates a custom event in an event log Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1844 | C:\Windows\system32\sppsvc.exe | C:\Windows\system32\sppsvc.exe | — | services.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Software Protection Platform Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1896 | "C:\Windows\system32\wermgr.exe" "-outproc" "868" "3180" | C:\Windows\system32\wermgr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 10000 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 10000 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 10000 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_GPU_RENDERING |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
| (PID) Process: | (916) Microsoft_Security_Essentials.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI |
| Operation: | write | Name: | Microsoft_Security_Essentials.exe |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1400 | 58a3ab93445391306ebd.exe | C:\9b7399fd66a01719cfba480c\x86\epp.msi | — | |
MD5:— | SHA256:— | |||
| 868 | svchost.exe | C:\Windows\appcompat\programs\RecentFileCache.bcf | txt | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\install\0\offer0.html | html | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\conn.htm | html | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\1.png | image | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\2.png | image | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\0.png | image | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\4.png | image | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\3.png | image | |
MD5:— | SHA256:— | |||
| 916 | Microsoft_Security_Essentials.exe | C:\Users\admin\AppData\Local\Temp\installer\5.png | image | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3284 | wermgr.exe | GET | — | 51.143.111.81:80 | http://watson.microsoft.com/StageOne/Generic/MSSecurityClient/Setup_exe/4_10_209_0/0x80070003/MorroBootstraper__CInstallFlow__InternalRunEpp%20-%20GetBackupAction/MorroBootstraper__CFlow__ProcessFlowActionResult/0/Security%20Essentials.htm?LCID=1033&OS=6.1.7601.2.00010100.1.0.48.17514&SM=DELL&SPN=DELL&BV=DELL | US | — | — | whitelisted |
— | — | HEAD | 200 | 8.247.205.126:80 | http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2006282044 | US | — | — | whitelisted |
— | — | HEAD | 200 | 8.247.205.126:80 | http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2006282044 | US | — | — | whitelisted |
— | — | HEAD | 200 | 13.107.4.50:80 | http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muredir.cab?2006282044 | US | compressed | 23.3 Kb | whitelisted |
— | — | GET | 200 | 13.107.4.50:80 | http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2006282044 | US | compressed | 23.3 Kb | whitelisted |
— | — | HEAD | 200 | 13.107.4.50:80 | http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muredir.cab?2006282044 | US | compressed | 22.9 Kb | whitelisted |
— | — | HEAD | 200 | 13.107.4.50:80 | http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2006282044 | US | compressed | 23.3 Kb | whitelisted |
916 | Microsoft_Security_Essentials.exe | GET | 301 | 88.212.252.27:80 | http://softrary.com/api/offers/912/4DEF171F-177A-356F-956F-E049CF28E3AE | RU | html | 162 b | malicious |
— | — | GET | 200 | 13.107.4.50:80 | http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muredir.cab?2006282044 | US | compressed | 22.9 Kb | whitelisted |
916 | Microsoft_Security_Essentials.exe | GET | 301 | 88.212.252.27:80 | http://softrary.com/download/912/{4DEF171F-177A-356F-956F-E049CF28E3AE}/4E3014F88A1776A95D57E2AE3211A742FF35E455C4BA3647840D3F88CBE93699DA9581CA4AEBB3D68F3D66AD/1/0 | RU | html | 162 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
916 | Microsoft_Security_Essentials.exe | 88.212.252.27:80 | softrary.com | Servers.com, Inc. | RU | malicious |
916 | Microsoft_Security_Essentials.exe | 88.212.252.27:443 | softrary.com | Servers.com, Inc. | RU | malicious |
3284 | wermgr.exe | 51.143.111.81:80 | watson.microsoft.com | Microsoft Corporation | US | suspicious |
— | — | 8.247.205.126:80 | download.windowsupdate.com | Level 3 Communications, Inc. | US | unknown |
— | — | 40.91.124.111:443 | www.update.microsoft.com | Microsoft Corporation | US | unknown |
2832 | MpCmdRun.exe | 92.123.32.24:443 | www.microsoft.com | Akamai Technologies, Inc. | — | whitelisted |
2832 | MpCmdRun.exe | 23.57.80.230:443 | definitionupdates.microsoft.com | Akamai Technologies, Inc. | US | whitelisted |
2832 | MpCmdRun.exe | 23.43.200.93:80 | go.microsoft.com | Akamai International B.V. | US | unknown |
— | — | 13.107.4.50:80 | ds.download.windowsupdate.com | Microsoft Corporation | US | whitelisted |
3840 | msseces.exe | 23.43.200.93:80 | go.microsoft.com | Akamai International B.V. | US | unknown |
Domain | IP | Reputation |
|---|---|---|
softrary.com |
| malicious |
watson.microsoft.com |
| whitelisted |
download.windowsupdate.com |
| whitelisted |
ds.download.windowsupdate.com |
| whitelisted |
sqm.microsoft.com |
| unknown |
www.update.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
definitionupdates.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3284 | wermgr.exe | Potential Corporate Privacy Violation | ET POLICY Application Crash Report Sent to Microsoft |
3284 | wermgr.exe | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
Process | Message |
|---|---|
Setup.exe | Invalid parameter passed to C runtime function.
|
Setup.exe | Invalid parameter passed to C runtime function.
|
wermgr.exe | |
wermgr.exe | |
wermgr.exe | Error - |
wermgr.exe | |
wermgr.exe | Error - |
wermgr.exe | ReadProcessMemory failed while trying to read PebBaseAddress |