analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

EasyXploits_API_81905.exe

Full analysis: https://app.any.run/tasks/337e0260-c82b-47d8-bbd8-f52fa9cce655
Verdict: Malicious activity
Analysis date: October 05, 2022, 01:28:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D95304D22479D196942A8E188113884C

SHA1:

F9F88C60A21B7348DD4732134862B80EB324BE60

SHA256:

CC8884209D49144B756C86A3A65385307C06415776863EEEC0746438FF8D3E36

SSDEEP:

196608:yIIQxYuxFeQFrqNYaG59Fa9FVDNWXVkHo/EZb:rI0PFLrqNYv529PDNs2Ho/EZb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • EasyXploits_API_81905.exe (PID: 4024)
      • setup81905.exe (PID: 2524)
      • GenericSetup.exe (PID: 3024)
      • setup81905.exe (PID: 2396)
    • Application was dropped or rewritten from another process

      • setup81905.exe (PID: 2524)
      • GenericSetup.exe (PID: 3024)
      • setup81905.exe (PID: 2396)
      • GenericSetup.exe (PID: 1080)
    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 3024)
      • GenericSetup.exe (PID: 1080)
    • Changes settings of System certificates

      • GenericSetup.exe (PID: 3024)
    • Actions looks like stealing of personal data

      • GenericSetup.exe (PID: 3024)
  • SUSPICIOUS

    • Checks supported languages

      • EasyXploits_API_81905.exe (PID: 4024)
      • setup81905.exe (PID: 2524)
      • GenericSetup.exe (PID: 3024)
      • setup81905.exe (PID: 2396)
      • GenericSetup.exe (PID: 1080)
    • Reads the computer name

      • EasyXploits_API_81905.exe (PID: 4024)
      • GenericSetup.exe (PID: 3024)
      • GenericSetup.exe (PID: 1080)
    • Executable content was dropped or overwritten

      • EasyXploits_API_81905.exe (PID: 4024)
      • setup81905.exe (PID: 2524)
      • GenericSetup.exe (PID: 3024)
      • setup81905.exe (PID: 2396)
    • Drops a file with a compile date too recent

      • EasyXploits_API_81905.exe (PID: 4024)
      • setup81905.exe (PID: 2524)
      • GenericSetup.exe (PID: 3024)
      • setup81905.exe (PID: 2396)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 3024)
    • Reads Windows owner or organization settings

      • GenericSetup.exe (PID: 3024)
    • Reads Environment values

      • GenericSetup.exe (PID: 3024)
    • Adds / modifies Windows certificates

      • GenericSetup.exe (PID: 3024)
    • Searches for installed software

      • GenericSetup.exe (PID: 3024)
  • INFO

    • Reads settings of System Certificates

      • GenericSetup.exe (PID: 3024)
    • Checks Windows Trust Settings

      • GenericSetup.exe (PID: 3024)
    • Checks supported languages

      • NOTEPAD.EXE (PID: 1052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-May-14 11:23:37
Detected languages:
  • Dutch - Netherlands
  • English - United States

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 296

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 5
TimeDateStamp: 2022-May-14 11:23:37
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
4248059
4248064
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.65052
.rdata
4255744
1023226
1023488
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.51035
.data
5279744
172268
146944
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.8239
.rsrc
5455872
3398240
3398656
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.94858
.reloc
8855552
305076
305152
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.58622

Resources

Title
Entropy
Size
Codepage
Language
Type
1
7.03313
2051
UNKNOWN
Dutch - Netherlands
RT_ICON
2
2.73071
67624
UNKNOWN
Dutch - Netherlands
RT_ICON
3
2.77417
16936
UNKNOWN
Dutch - Netherlands
RT_ICON
4
3.65334
9640
UNKNOWN
Dutch - Netherlands
RT_ICON
5
2.82974
4264
UNKNOWN
Dutch - Netherlands
RT_ICON
6
4.49114
1128
UNKNOWN
Dutch - Netherlands
RT_ICON
101
7.98701
3295384
UNKNOWN
Dutch - Netherlands
RT_RCDATA
103
2.75463
90
UNKNOWN
Dutch - Netherlands
RT_GROUP_ICON
1 (#2)
5.04264
562
UNKNOWN
English - United States
RT_MANIFEST

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
IMM32.dll
KERNEL32.dll
OLEACC.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start easyxploits_api_81905.exe no specs easyxploits_api_81905.exe setup81905.exe genericsetup.exe setup81905.exe genericsetup.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3376"C:\Windows\EasyXploits_API_81905.exe" C:\Windows\EasyXploits_API_81905.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\windows\easyxploits_api_81905.exe
c:\windows\system32\ntdll.dll
4024"C:\Windows\EasyXploits_API_81905.exe" C:\Windows\EasyXploits_API_81905.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\easyxploits_api_81905.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2524C:\Users\admin\AppData\Local\setup81905.exe hhwnd=196904 hreturntoinstaller hextras=id:--C:\Users\admin\AppData\Local\setup81905.exe
EasyXploits_API_81905.exe
User:
admin
Company:
DT001
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\setup81905.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3024.\GenericSetup.exe hhwnd=196904 hreturntoinstaller hextras=id:--C:\Users\admin\AppData\Local\Temp\7zSCD90FE43\GenericSetup.exe
setup81905.exe
User:
admin
Integrity Level:
HIGH
Description:
DT001
Exit code:
0
Version:
2.0.2.5763
Modules
Images
c:\users\admin\appdata\local\temp\7zscd90fe43\genericsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2396C:\Users\admin\AppData\Local\setup81905.exe hreadyC:\Users\admin\AppData\Local\setup81905.exe
EasyXploits_API_81905.exe
User:
admin
Company:
DT001
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\setup81905.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
1080.\GenericSetup.exe hreadyC:\Users\admin\AppData\Local\Temp\7zSC59BD2A3\GenericSetup.exesetup81905.exe
User:
admin
Integrity Level:
HIGH
Description:
DT001
Exit code:
0
Version:
2.0.2.5763
Modules
Images
c:\users\admin\appdata\local\temp\7zsc59bd2a3\genericsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\shlwapi.dll
1052"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\link.txtC:\Windows\system32\NOTEPAD.EXEEasyXploits_API_81905.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
7 250
Read events
7 178
Write events
72
Delete events
0

Modification events

(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(4024) EasyXploits_API_81905.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{362E934C-743B-4588-8259-D2482DB771A8}
Operation:writeName:WpadDecisionReason
Value:
1
Executable files
34
Suspicious files
1
Text files
19
Unknown types
0

Dropped files

PID
Process
Filename
Type
4024EasyXploits_API_81905.exeC:\Users\admin\AppData\Local\setup81905.exeexecutable
MD5:369ACF60D8B5ED6168C74955EE04654F
SHA256:3FF8EC8F9F27A27F414A90BFED5B7F5A3C118B33CF0F80AEB7026E0A53E26632
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\DynActsBLL.dllexecutable
MD5:C7151D4057D2B91DA27BFAB58415DD81
SHA256:4263A69119AE27E65B3BF25E1552C89E1FF2DBF0FBD6865CBD69A95CF851D81B
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\MyDownloader.Core.dllexecutable
MD5:F931E960CC4ED0D2F392376525FF44DB
SHA256:1C1C5330EA35F518BF85FAD69DC2DA1A98A4DFEADBF6AC0BA0AC7CC51BBCC870
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\GenericSetup.exe.configxml
MD5:FD63EE3928EDD99AFC5BDF17E4F1E7B6
SHA256:2A2DDBDC4600E829AD756FD5E84A79C0401FA846AD4F2F2FB235B410E82434A9
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\de\GenericSetup.resources.dllexecutable
MD5:B597E0A66EAC08849CB8CA80F9F2E8B4
SHA256:B0C5246B10D5DFAF55B2112910C1CA11815F066C2854EECD326C657A7E46AD57
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\GenericSetup.dllexecutable
MD5:4D65E6EB25DB2CE61F4A7A48D9F6082A
SHA256:1E2E26D769D69F6B06CAD2F2FEC81A125E4F3D14AEE969357784FB533D80B89A
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\MyDownloader.Extension.dllexecutable
MD5:28F1996059E79DF241388BD9F89CF0B1
SHA256:C3F8A46E81F16BBFC75DE44DC95F0D145213C8AF0006BB097950AC4D1562F5CE
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\es\GenericSetup.resources.dllexecutable
MD5:BE272836941982A1A22473E27976766E
SHA256:971AE92220940AC6FBBD2AE155138C348DE9CE2E6927FC83D48E27BBD988F3CD
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\HtmlAgilityPack.dllexecutable
MD5:7874850410E21B5F48BFE34174FB318C
SHA256:C6250DA15C349033DE9B910C3DC10A156E47D69EC7E2076CE9011AF7F3D885D1
2524setup81905.exeC:\Users\admin\AppData\Local\Temp\7zSCD90FE43\ru\GenericSetup.resources.dllexecutable
MD5:7EA51496582B5B25FD9E6DB9DE6D1B8D
SHA256:AD97150BAEDB7406086E2BED93E121A0CBF40459643C3AD3A0669B659D5FF2C2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
84
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4024
EasyXploits_API_81905.exe
GET
404
35.190.60.70:80
http://dlsft.com/callback/info.php?id=81905
US
xml
341 b
malicious
4024
EasyXploits_API_81905.exe
GET
404
35.190.60.70:80
http://dlsft.com/callback/offers.php
US
xml
341 b
malicious
4024
EasyXploits_API_81905.exe
POST
404
35.190.60.70:80
http://dlsft.com/callback/?channel=&id=81905&action=completed
US
xml
341 b
malicious
4024
EasyXploits_API_81905.exe
POST
404
35.190.60.70:80
http://dlsft.com/callback/geo/geo.php
US
xml
341 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4024
EasyXploits_API_81905.exe
35.190.60.70:443
www.dlsft.com
GOOGLE
US
whitelisted
3024
GenericSetup.exe
104.16.236.79:443
sos.adaware.com
CLOUDFLARENET
shared
3024
GenericSetup.exe
104.16.235.79:443
sos.adaware.com
CLOUDFLARENET
shared
3024
GenericSetup.exe
104.18.88.101:443
flow.lavasoft.com
CLOUDFLARENET
shared
3024
GenericSetup.exe
104.18.87.101:443
flow.lavasoft.com
CLOUDFLARENET
shared
4024
EasyXploits_API_81905.exe
35.190.60.70:80
www.dlsft.com
GOOGLE
US
whitelisted
52.239.214.132:443
offerservicefallback.blob.core.windows.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
104.18.87.101:443
flow.lavasoft.com
CLOUDFLARENET
shared
104.18.88.101:443
flow.lavasoft.com
CLOUDFLARENET
shared
3024
GenericSetup.exe
52.239.214.132:443
offerservicefallback.blob.core.windows.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
www.dlsft.com
  • 35.190.60.70
malicious
www.google.com
  • 172.217.18.4
whitelisted
flow.lavasoft.com
  • 104.18.87.101
  • 104.18.88.101
whitelisted
sos.adaware.com
  • 104.16.236.79
  • 104.16.235.79
whitelisted
dlsft.com
  • 35.190.60.70
malicious
offerservicefallback.blob.core.windows.net
  • 52.239.214.132
suspicious

Threats

No threats detected
Process
Message
GenericSetup.exe
Error: File not found - genericsetup.wrappers.sciter:console.tis
GenericSetup.exe
at sciter:init-script.tis
GenericSetup.exe
GenericSetup.exe
GenericSetup.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
GenericSetup.exe
Error: File not found - genericsetup.wrappers.sciter:console.tis
GenericSetup.exe
at sciter:init-script.tis
GenericSetup.exe
GenericSetup.exe
GenericSetup.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'