URL:

http://a46.bulehero.in/download.exe

Full analysis: https://app.any.run/tasks/11363417-1fa3-418b-a759-745c05fe9b01
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2019, 16:26:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
trojan
miner
Indicators:
MD5:

C7BDBB82333D6EAF14337931FED75026

SHA1:

6F376D4A1BBDEABA20194B0898F0D52CCD806C2A

SHA256:

C9521090D4FB35D2748E44D298DFA41479B5D636FB87DC1A500A2A22C24547C5

SSDEEP:

3:N1KfxQJ6BFnNn:C5c6BFnN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 2996)
      • iexplore.exe (PID: 3172)
      • download[1].exe (PID: 2588)
    • Application was dropped or rewritten from another process

      • download[1].exe (PID: 2588)
      • xsvinmat.exe (PID: 2336)
      • wimnat.exe (PID: 3040)
      • taskmgr.exe (PID: 3856)
    • MINER was detected

      • docropool.exe (PID: 2524)
      • taskmgr.exe (PID: 3856)
    • Changes the autorun value in the registry

      • docropool.exe (PID: 2524)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2436)
      • cmd.exe (PID: 696)
      • cmd.exe (PID: 2836)
    • Starts NET.EXE for service management

      • cmd.exe (PID: 3276)
      • cmd.exe (PID: 3440)
      • cmd.exe (PID: 3520)
      • cmd.exe (PID: 3864)
      • cmd.exe (PID: 2560)
    • Uses NET.EXE to stop Windows Update service

      • cmd.exe (PID: 3864)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2632)
      • schtasks.exe (PID: 2684)
      • schtasks.exe (PID: 3596)
    • Connects to CnC server

      • taskmgr.exe (PID: 3856)
    • Changes settings of System certificates

      • docropool.exe (PID: 2524)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2996)
      • iexplore.exe (PID: 2164)
      • download[1].exe (PID: 2588)
      • iexplore.exe (PID: 3172)
      • docropool.exe (PID: 2524)
    • Starts CMD.EXE for commands execution

      • docropool.exe (PID: 2524)
      • cmd.exe (PID: 2436)
      • cmd.exe (PID: 2836)
      • cmd.exe (PID: 696)
    • Connects to unusual port

      • docropool.exe (PID: 2524)
      • taskmgr.exe (PID: 3856)
    • Application launched itself

      • cmd.exe (PID: 2436)
      • cmd.exe (PID: 696)
      • cmd.exe (PID: 2836)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3204)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 3964)
      • cmd.exe (PID: 2232)
      • cmd.exe (PID: 2688)
    • Adds / modifies Windows certificates

      • docropool.exe (PID: 2524)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2996)
      • iexplore.exe (PID: 2164)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3172)
    • Creates files in the user directory

      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 3172)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3172)
      • iexplore.exe (PID: 2164)
    • Changes internet zones settings

      • iexplore.exe (PID: 2164)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
104
Monitored processes
53
Malicious processes
4
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs iexplore.exe iexplore.exe download[1].exe xsvinmat.exe no specs #MINER docropool.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs #MINER taskmgr.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs wimnat.exe no specs cmd.exe no specs schtasks.exe no specs cmd.exe no specs schtasks.exe no specs cmd.exe no specs schtasks.exe no specs net.exe no specs net.exe no specs net.exe no specs net.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs net.exe no specs sc.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
696cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "HomeGroupProvider" /ru system /tr "cmd /c echo Y|cacls C:\Users\admin\AppData\Local\Temp\docropool.exe /p everyone:F"C:\Windows\system32\cmd.exedocropool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2156"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=852,1271383365220138652,16944992696421106841,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=D047695F52D4E5A856185BA6D38AF85B --mojo-platform-channel-handle=940 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2164"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2232cmd /c sc config WinDefend start= disabledC:\Windows\system32\cmd.exedocropool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
5
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2244C:\Windows\system32\net1 stop WinDefendC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
2316cmd /c sc config wuauserv start= disabledC:\Windows\system32\cmd.exedocropool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
5
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2336C:\Users\admin\AppData\Local\Temp\xsvinmat.exeC:\Users\admin\AppData\Local\Temp\xsvinmat.exedownload[1].exe
User:
admin
Integrity Level:
MEDIUM
Description:
Wzd MFC Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\xsvinmat.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2436cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "MiscfostNsi" /ru system /tr "cmd /c C:\Windows\ime\docropool.exe"C:\Windows\system32\cmd.exedocropool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2500cmd.exe /c C:\Windows\InfusedAppe\Priess\scan.batC:\Windows\system32\cmd.exedocropool.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2524C:\Users\admin\AppData\Local\Temp\docropool.exeC:\Users\admin\AppData\Local\Temp\docropool.exe
download[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
OLED DocFile Propertray Page
Exit code:
0
Version:
6.1.7600.16385
Modules
Images
c:\users\admin\appdata\local\temp\docropool.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
1 106
Read events
943
Write events
155
Delete events
8

Modification events

(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2976) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2996-13192216012920125
Value:
259
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3516-13180984670829101
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2996-13192216012920125
Value:
259
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
6
Suspicious files
21
Text files
84
Unknown types
8

Dropped files

PID
Process
Filename
Type
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\d694553e-e257-48d2-9413-691be3b33ca8.tmp
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\85b362e2-4734-4b4f-8cfc-5daf05a67692.tmp
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF246dce.TMPtext
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF246dfd.TMPtext
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\56e3625e-0ab5-4c1e-b694-b45e429ff081.tmp
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
24
DNS requests
16
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2524
docropool.exe
GET
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
suspicious
2524
docropool.exe
GET
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
suspicious
2524
docropool.exe
GET
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
suspicious
2524
docropool.exe
GET
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
suspicious
2524
docropool.exe
GET
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
suspicious
2524
docropool.exe
GET
200
139.162.88.36:57890
http://a88.bulehero.in:57890/Cfg.ini
JP
text
410 b
suspicious
2524
docropool.exe
GET
200
139.162.88.36:57890
http://a88.bulehero.in:57890/Cfg.ini
JP
text
410 b
suspicious
2524
docropool.exe
GET
200
125.77.198.152:80
http://2019.ip138.com/ic.asp
CN
html
214 b
suspicious
3172
iexplore.exe
GET
200
139.162.91.84:80
http://a46.bulehero.in/download.exe
JP
executable
315 Kb
malicious
2588
download[1].exe
GET
200
139.162.91.84:80
http://a46.bulehero.in/docropool.exe
JP
executable
3.59 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2996
chrome.exe
172.217.22.35:443
www.gstatic.com
Google Inc.
US
whitelisted
2996
chrome.exe
139.162.91.84:80
a46.bulehero.in
Linode, LLC
JP
suspicious
2996
chrome.exe
216.58.207.45:443
accounts.google.com
Google Inc.
US
whitelisted
2996
chrome.exe
172.217.23.164:443
www.google.com
Google Inc.
US
whitelisted
2996
chrome.exe
172.217.21.234:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2164
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2996
chrome.exe
172.217.16.131:443
www.google.de
Google Inc.
US
whitelisted
2588
download[1].exe
139.162.91.84:80
a46.bulehero.in
Linode, LLC
JP
suspicious
3172
iexplore.exe
139.162.91.84:80
a46.bulehero.in
Linode, LLC
JP
suspicious
2524
docropool.exe
139.162.18.99:80
a47.bulehero.in
Linode, LLC
SG
suspicious

DNS requests

Domain
IP
Reputation
a46.bulehero.in
  • 139.162.91.84
malicious
www.gstatic.com
  • 172.217.22.35
whitelisted
clientservices.googleapis.com
  • 216.58.207.67
whitelisted
accounts.google.com
  • 216.58.207.45
shared
safebrowsing.googleapis.com
  • 172.217.21.234
whitelisted
www.google.com
  • 172.217.23.164
malicious
www.google.de
  • 172.217.16.131
whitelisted
ssl.gstatic.com
  • 172.217.16.131
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
a88.bulehero.in
  • 139.162.88.36
malicious

Threats

PID
Process
Class
Message
2996
chrome.exe
Misc activity
ET INFO Packed Executable Download
2996
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3172
iexplore.exe
Misc activity
ET INFO Packed Executable Download
3172
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2588
download[1].exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2588
download[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2524
docropool.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2524
docropool.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan.Win32/64.XMR-Miner
3856
taskmgr.exe
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
3856
taskmgr.exe
Misc activity
MINER [PTsecurity] CoinMiner CryptoNight XMRig JSON_RPC Client Login
6 ETPRO signatures available at the full report
No debug info