analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

Proxo_Bootstrapper.zip

Full analysis: https://app.any.run/tasks/0337ae0f-72aa-4048-87ed-3283b49e05f3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 30, 2020, 05:13:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
loader
pua
lavasoft
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

82039EB3E6811A087645678772E895EA

SHA1:

285FD2F44EFE0A9179082B0D7D474EF366AD31E6

SHA256:

C5790E54DE7373EC84BE6543EF056FFA9B9D64C195DA66AC30A57930729EF661

SSDEEP:

24576:2ZLsBTg/zEcFw9nS1AGb0Hq/OZlkgDvzRd2mzMxZJKNKNiUPEJIjBcZGGN+H0c:/ybTFYnS1X4K/O9Ln27ZJO+XPEJaBcvQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Proxo_Bootstrapper_3.0_Auto_Updater.exe (PID: 2872)
      • Proxo_2.9.6v_76091.exe (PID: 1204)
      • Proxo_2.9.6v_76091.exe (PID: 2912)
      • setup76091.exe (PID: 1580)
      • installer.exe (PID: 2904)
      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
      • OfferInstaller.exe (PID: 1708)
      • Proxo.exe (PID: 488)
    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
      • OfferInstaller.exe (PID: 1708)
      • SearchProtocolHost.exe (PID: 2308)
    • Downloads executable files from the Internet

      • Proxo_2.9.6v_76091.exe (PID: 1204)
    • LAVASOFT was detected

      • installer.exe (PID: 2904)
    • Writes to a start menu file

      • Proxo.exe (PID: 488)
    • Changes settings of System certificates

      • Proxo.exe (PID: 488)
      • Proxo_2.9.6v_76091.exe (PID: 1204)
    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 2172)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2172)
      • Proxo_Bootstrapper_3.0_Auto_Updater.exe (PID: 2872)
      • Proxo_2.9.6v_76091.exe (PID: 1204)
      • setup76091.exe (PID: 1580)
      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 2128)
      • Proxo.exe (PID: 488)
    • Reads Internet Cache Settings

      • Proxo_2.9.6v_76091.exe (PID: 1204)
    • Creates files in the user directory

      • Proxo_2.9.6v_76091.exe (PID: 1204)
      • Proxo.exe (PID: 488)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
      • OfferInstaller.exe (PID: 1708)
    • Reads Environment values

      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
      • OfferInstaller.exe (PID: 1708)
    • Reads Windows owner or organization settings

      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
      • OfferInstaller.exe (PID: 1708)
    • Application launched itself

      • GenericSetup.exe (PID: 2748)
    • Starts Internet Explorer

      • Proxo_2.9.6v_76091.exe (PID: 1204)
    • Searches for installed software

      • GenericSetup.exe (PID: 2748)
      • GenericSetup.exe (PID: 2064)
    • Adds / modifies Windows certificates

      • Proxo.exe (PID: 488)
      • Proxo_2.9.6v_76091.exe (PID: 1204)
  • INFO

    • Reads settings of System Certificates

      • Proxo_2.9.6v_76091.exe (PID: 1204)
      • iexplore.exe (PID: 2508)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 2128)
    • Changes internet zones settings

      • iexplore.exe (PID: 2508)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2508)
    • Creates files in the user directory

      • iexplore.exe (PID: 2508)
    • Manual execution by user

      • explorer.exe (PID: 3176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Proxo_Bootstrapper_3.0_Auto_Updater.exe
ZipUncompressedSize: 1575936
ZipCompressedSize: 1512031
ZipCRC: 0x9d8a1d85
ZipModifyDate: 2020:05:23 00:59:24
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
14
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start winrar.exe proxo_bootstrapper_3.0_auto_updater.exe proxo_2.9.6v_76091.exe no specs proxo_2.9.6v_76091.exe setup76091.exe #LAVASOFT installer.exe genericsetup.exe no specs genericsetup.exe offerinstaller.exe iexplore.exe iexplore.exe proxo.exe searchprotocolhost.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2172"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Proxo_Bootstrapper.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2872"C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_Bootstrapper_3.0_Auto_Updater.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_Bootstrapper_3.0_Auto_Updater.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WindowsFormsApp89
Exit code:
0
Version:
1.0.0.0
2912"C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_2.9.6v_76091.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_2.9.6v_76091.exeProxo_Bootstrapper_3.0_Auto_Updater.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
1204"C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_2.9.6v_76091.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_2.9.6v_76091.exe
Proxo_Bootstrapper_3.0_Auto_Updater.exe
User:
admin
Integrity Level:
HIGH
Exit code:
4294967295
1580C:\Users\admin\AppData\Local\setup76091.exe hhwnd=131422 hasync hshowcarrier hextras=id:ccf318b5143cd3a-CH-Easy2C:\Users\admin\AppData\Local\setup76091.exe
Proxo_2.9.6v_76091.exe
User:
admin
Company:
DT001
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.2867
2904.\installer.exe hhwnd=131422 hasync hshowcarrier hextras=id:ccf318b5143cd3a-CH-Easy2C:\Users\admin\AppData\Local\Temp\7zSC26D1836\installer.exe
setup76091.exe
User:
admin
Company:
adaware
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.2867
2748"C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exe" C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exe hhwnd=131422 hasync hshowcarrier hextras=id:ccf318b5143cd3a-CH-Easy2C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exeinstaller.exe
User:
admin
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.2867
2064"C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exe" C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exe hhwnd=131422 hsecondrun hshowcarrier hextras=id:ccf318b5143cd3a-CH-Easy2C:\Users\admin\AppData\Local\Temp\7zSC26D1836\GenericSetup.exe
GenericSetup.exe
User:
admin
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.2867
1708"C:\Users\admin\AppData\Local\Temp\7zSC26D1836\OfferInstaller.exe" C:\Users\admin\AppData\Local\Temp\7zSC26D1836\OfferInstaller.exe
GenericSetup.exe
User:
admin
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.2867
2508"C:\Program Files\Internet Explorer\iexplore.exe" http://www.proxoexploits.com/file.php?id=76091C:\Program Files\Internet Explorer\iexplore.exe
Proxo_2.9.6v_76091.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
14 476
Read events
12 986
Write events
0
Delete events
0

Modification events

No data
Executable files
36
Suspicious files
11
Text files
27
Unknown types
4

Dropped files

PID
Process
Filename
Type
1204Proxo_2.9.6v_76091.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\K953B6I5.txttext
MD5:B20232203FE80D5A5C967CCA15EF2E46
SHA256:EC5B669A50DA74A0C68A8CB3E1ECE21D132B23EBBEBD60070E275440C54FEF04
2872Proxo_Bootstrapper_3.0_Auto_Updater.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_2.9.6v_76091.exeexecutable
MD5:F4238D1023D7B80835431109CE2C1190
SHA256:78F12572B6A9CCACCFAFA6D31759E794D39AEDD574C2DDEA9737A62E34FA2C4A
1204Proxo_2.9.6v_76091.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\offers[1].htmtext
MD5:6CAA47F7B3472053B152F84CE72C182C
SHA256:37A068536B430CF7CEB9CD44D4CF245446CB17BBCC44ACACA0379D008FF2AEF4
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo_Bootstrapper_3.0_Auto_Updater.exeexecutable
MD5:9AE793BE05CAEEE3AE3B419EE9240D6E
SHA256:953A99A05E35DC363AD4197B6B8EB12ED2AE0B606CB1BBF017A6D984902B064E
2872Proxo_Bootstrapper_3.0_Auto_Updater.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\Proxo Bootstrapper 3.0 (Auto Updater).exeexecutable
MD5:9AE793BE05CAEEE3AE3B419EE9240D6E
SHA256:953A99A05E35DC363AD4197B6B8EB12ED2AE0B606CB1BBF017A6D984902B064E
1204Proxo_2.9.6v_76091.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\info[1].htmtext
MD5:0452D8A6D54E606FA326FB277DF4AFAE
SHA256:A5D9282815E6DC7405525E2DE58AAA5CA8E78EEB11EFEEE399FD3F67317B97E8
1204Proxo_2.9.6v_76091.exeC:\Users\admin\AppData\Local\setup76091.exeexecutable
MD5:C7F52865F4C7444AF6480977272F3E1D
SHA256:FD4673EDB15D18EFD3F554ABC0F4B4A45F15FD4D48BECDB032B6279DAB2E5196
2872Proxo_Bootstrapper_3.0_Auto_Updater.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2172.48928\ScintillaNET.dllexecutable
MD5:9166536C31F4E725E6BEFE85E2889A4B
SHA256:AD0CC5A4D4A6AAE06EE360339C851892B74B8A275CE89C1B48185672179F3163
1580setup76091.exeC:\Users\admin\AppData\Local\Temp\7zSC26D1836\app.icoimage
MD5:4003EFA6E7D44E2CBD3D7486E2E0451A
SHA256:EFFD42C5E471EA3792F12538BF7C982A5CDA4D25BFBFFAF51EED7E09035F4508
1580setup76091.exeC:\Users\admin\AppData\Local\Temp\7zSC26D1836\Resources\InstallingPage.htmlhtml
MD5:29F74FBCCB8AE8E707CF96BA40DBFA9A
SHA256:F56BB8FE20B8BE18B877DFE0DD46AD3C717FC44797DB5EC904F1612F815DA120
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
31
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1204
Proxo_2.9.6v_76091.exe
GET
301
104.18.40.101:80
http://proxoexploits.com/proxoico.png
US
malicious
1204
Proxo_2.9.6v_76091.exe
GET
200
35.190.60.70:80
http://dlsft.com/callback/info.php?id=76091
US
text
105 b
malicious
1204
Proxo_2.9.6v_76091.exe
POST
200
35.190.60.70:80
http://dlsft.com/callback/geo/geo.php
US
text
18 b
malicious
1204
Proxo_2.9.6v_76091.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2Fz5hY5qj0aEmX0H4s05bY%3D
US
der
1.47 Kb
whitelisted
1204
Proxo_2.9.6v_76091.exe
POST
200
35.190.60.70:80
http://dlsft.com/callback/?channel=Easy2&id=76091&action=completed
US
text
18 b
malicious
1204
Proxo_2.9.6v_76091.exe
POST
200
35.190.60.70:80
http://dlsft.com/callback/?channel=Easy2&id=76091&action=started
US
text
3 b
malicious
1204
Proxo_2.9.6v_76091.exe
GET
200
35.190.60.70:80
http://dlsft.com/callback/offers.php
US
text
3 b
malicious
2508
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2904
installer.exe
POST
200
104.18.87.101:80
http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubStart
US
text
29 b
whitelisted
2128
iexplore.exe
GET
301
172.67.202.1:80
http://www.proxoexploits.com/file.php?id=76091
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1204
Proxo_2.9.6v_76091.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2904
installer.exe
104.18.87.101:80
flow.lavasoft.com
Cloudflare Inc
US
shared
2872
Proxo_Bootstrapper_3.0_Auto_Updater.exe
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious
1204
Proxo_2.9.6v_76091.exe
104.18.40.101:80
www.proxoexploits.com
Cloudflare Inc
US
shared
2064
GenericSetup.exe
104.18.87.101:443
flow.lavasoft.com
Cloudflare Inc
US
shared
1204
Proxo_2.9.6v_76091.exe
104.27.130.123:80
www.filedm.com
Cloudflare Inc
US
suspicious
2872
Proxo_Bootstrapper_3.0_Auto_Updater.exe
162.159.130.233:443
cdn.discordapp.com
Cloudflare Inc
shared
1708
OfferInstaller.exe
104.18.87.101:443
flow.lavasoft.com
Cloudflare Inc
US
shared
2872
Proxo_Bootstrapper_3.0_Auto_Updater.exe
172.67.202.1:443
www.proxoexploits.com
US
suspicious
1204
Proxo_2.9.6v_76091.exe
35.190.60.70:80
dlsft.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.proxoexploits.com
  • 172.67.202.1
  • 104.18.40.101
  • 104.18.41.101
malicious
cdn.discordapp.com
  • 162.159.130.233
  • 162.159.129.233
  • 162.159.134.233
  • 162.159.133.233
  • 162.159.135.233
shared
www.filedm.com
  • 172.67.195.231
  • 104.27.131.123
  • 104.27.130.123
suspicious
pastebin.com
  • 104.23.99.190
  • 104.23.98.190
shared
filedm.com
  • 104.27.130.123
  • 172.67.195.231
  • 104.27.131.123
malicious
dlsft.com
  • 35.190.60.70
malicious
proxoexploits.com
  • 104.18.40.101
  • 172.67.202.1
  • 104.18.41.101
malicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.google.com
  • 74.125.128.106
  • 74.125.128.103
  • 74.125.128.99
  • 74.125.128.147
  • 74.125.128.104
  • 74.125.128.105
whitelisted
flow.lavasoft.com
  • 104.18.87.101
  • 104.18.88.101
whitelisted

Threats

PID
Process
Class
Message
1204
Proxo_2.9.6v_76091.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1204
Proxo_2.9.6v_76091.exe
Misc activity
ADWARE [PTsecurity] Gen:Variant.Midie.55716
2904
installer.exe
A Network Trojan was detected
ET MALWARE Lavasoft PUA/Adware Client Install
1 ETPRO signatures available at the full report
Process
Message
GenericSetup.exe
Error: File not found - h2osciter:console.tis
GenericSetup.exe
at sciter:init-script.tis
GenericSetup.exe
GenericSetup.exe
GenericSetup.exe
failed to load "app.ico" file, error=2
GenericSetup.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
GenericSetup.exe
Error: File not found - h2osciter:console.tis
GenericSetup.exe
at sciter:init-script.tis
GenericSetup.exe
GenericSetup.exe