File name:

uTorrent.exe

Full analysis: https://app.any.run/tasks/3f136685-762e-4caa-acec-0881c98e8c14
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 24, 2024, 15:33:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pua
adware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F83EB21E144C785913D1722E145FF946

SHA1:

18E62D2716014E77213F8D55E05CD6FECF23B5D2

SHA256:

CE7FAB69A6C10146AC89E121FBE204CA424CD886C4763674EB2E9260B2F6B722

SSDEEP:

98304:q6VnvK7vl/NfWvaN5ehEPZkvlIT1TVtaupu7GVK2pblPZLBRK4R1w7S7BMjJxfLr:/C98

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • uTorrent.exe (PID: 6916)
    • ADWARE has been detected (SURICATA)

      • GenericSetup.exe (PID: 6612)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • uTorrent.exe (PID: 6916)
    • The process creates files with name similar to system file names

      • uTorrent.exe (PID: 6916)
    • Reads security settings of Internet Explorer

      • installer.exe (PID: 2380)
      • GenericSetup.exe (PID: 6612)
    • Reads the date of Windows installation

      • installer.exe (PID: 2380)
    • Reads the Windows owner or organization settings

      • GenericSetup.exe (PID: 6612)
    • Searches for installed software

      • GenericSetup.exe (PID: 6612)
    • Mutex name with non-standard characters

      • GenericSetup.exe (PID: 6612)
    • Access to an unwanted program domain was detected

      • GenericSetup.exe (PID: 6612)
  • INFO

    • Create files in a temporary directory

      • installer.exe (PID: 2380)
      • uTorrent.exe (PID: 6916)
    • Reads the computer name

      • uTorrent.exe (PID: 6916)
      • installer.exe (PID: 2380)
      • GenericSetup.exe (PID: 6612)
    • Checks supported languages

      • uTorrent.exe (PID: 6916)
      • installer.exe (PID: 2380)
      • GenericSetup.exe (PID: 6612)
    • Process checks computer location settings

      • installer.exe (PID: 2380)
    • Reads Environment values

      • GenericSetup.exe (PID: 6612)
    • Reads the machine GUID from the registry

      • GenericSetup.exe (PID: 6612)
      • installer.exe (PID: 2380)
    • Reads the software policy settings

      • GenericSetup.exe (PID: 6612)
    • Checks proxy server information

      • GenericSetup.exe (PID: 6612)
      • slui.exe (PID: 6056)
    • Disables trace logs

      • GenericSetup.exe (PID: 6612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (29.8)
.exe | Win32 Executable MS Visual C++ (generic) (21.6)
.exe | Win64 Executable (generic) (19.1)
.exe | UPX compressed Win32 Executable (18.7)
.dll | Win32 Dynamic Link Library (generic) (4.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:04:18 18:54:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104448
InitializedDataSize: 83968
UninitializedDataSize: -
EntryPoint: 0x148d4
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.5.5.45660
ProductVersionNumber: 3.5.5.45660
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 3.5.5.45660
ProductVersion: 3.5.5.45660
CompanyName: BitTorrent Inc.
FileDescription: µTorrent
InternalName: uTorrent.exe
LegalCopyright: ©2020 BitTorrent, Inc. All Rights Reserved.
OriginalFileName: uTorrent.exe
ProductName: µTorrent
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start utorrent.exe installer.exe no specs #ADWARE genericsetup.exe slui.exe utorrent.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
464"C:\Users\admin\AppData\Local\Temp\uTorrent.exe" C:\Users\admin\AppData\Local\Temp\uTorrent.exeexplorer.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
MEDIUM
Description:
µTorrent
Exit code:
3221226540
Version:
3.5.5.45660
Modules
Images
c:\users\admin\appdata\local\temp\utorrent.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2380.\installer.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\installer.exeuTorrent.exe
User:
admin
Company:
adaware
Integrity Level:
HIGH
Description:
µTorrent
Version:
1.0.1.2857
Modules
Images
c:\users\admin\appdata\local\temp\7zs40bfbb1e\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
6056C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6612"C:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\GenericSetup.exe" C:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\GenericSetup.exe C:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\GenericSetup.exe
installer.exe
User:
admin
Integrity Level:
HIGH
Description:
µTorrent
Version:
1.0.1.2857
Modules
Images
c:\users\admin\appdata\local\temp\7zs40bfbb1e\genericsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6916"C:\Users\admin\AppData\Local\Temp\uTorrent.exe" C:\Users\admin\AppData\Local\Temp\uTorrent.exe
explorer.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
HIGH
Description:
µTorrent
Version:
3.5.5.45660
Modules
Images
c:\users\admin\appdata\local\temp\utorrent.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
12 678
Read events
12 555
Write events
123
Delete events
0

Modification events

(PID) Process:(2380) installer.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\de\DevLib.resources.dll
(PID) Process:(2380) installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2380) installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2380) installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2380) installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6612) GenericSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6612) GenericSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6612) GenericSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6612) GenericSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6612) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
22
Suspicious files
1
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\BundleConfig.jsonbinary
MD5:0ED7F99F49EE89A66B5C6FFF6B82AF75
SHA256:B50C6F2E98946D4C56A06D035051FD1356308C7B33540FB3E2C9D633EA88E1B2
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\app.icoimage
MD5:21D40E1B37AD7CFDEAC5BE2BC5C2B58D
SHA256:D29353F6C8BA117BDED73A2A12C9F3E5C5E286C168AB4F91DE33CCBAD942AC18
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\images\loader.gifimage
MD5:2B26F73D382AB69F3914A7D9FDA97B0F
SHA256:A6A0B05B1D5C52303DD3E9E2F9CDA1E688A490FBE84EA0D6E22A051AB6EFD643
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\SettingPage1.htmlhtml
MD5:55A4C91743FD057A8C430767A32AC9A5
SHA256:361F60D1C7DE5B16C3C0FCA967A8B729D85AC19CA4BD847DBA8AAFB2CB5C8BBF
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\FinishPage.htmlhtml
MD5:C80FA35AD16A8E6F6D02A003D408200C
SHA256:0C1C1704D0858BBF271EDEEF7C1A9C76126B90AF71A39D121D1159A3EE69599B
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\tis\TranslateOfferTemplate.tistext
MD5:551029A3E046C5ED6390CC85F632A689
SHA256:7B8C76A85261C5F9E40E49F97E01A14320E9B224FF3D6AF8286632CA94CF96F8
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\GenericSetup.exe.configxml
MD5:7F333011CCAE6D7E0125BC6AE5385333
SHA256:8F48AEDC5ECF10FA28858C14A64999DF80E68EF0ECB486C0F9027C27A9EDAEEB
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\tis\ViewStateLoader.tistext
MD5:C1B831DE5085D4B5CDAD186F08E2E3A7
SHA256:A60B9281DAD0D5E36AC7EA180058AB9E14E6146C7EC7ABBD5359248FEDC423E3
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\WelcomePage.htmlhtml
MD5:26D4E8AC8004F8CD9D622A6C46F15E6B
SHA256:168B5C9528FFDF1E188712DB475390301DA90575C50EF99C35B43DBF317FE8BA
6916uTorrent.exeC:\Users\admin\AppData\Local\Temp\7zS40BFBB1E\Resources\tis\Log.tistext
MD5:CEF7A21ACF607D44E160EAC5A21BDF67
SHA256:73ED0BE73F408AB8F15F2DA73C839F86FEF46D0A269607330B28F9564FAE73C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
47
DNS requests
23
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7112
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6332
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6012
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.148:443
www.bing.com
Akamai International B.V.
GB
unknown
4204
svchost.exe
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6612
GenericSetup.exe
104.16.213.94:443
sos.adaware.com
CLOUDFLARENET
unknown
5368
SearchApp.exe
2.23.209.176:443
www.bing.com
Akamai International B.V.
GB
unknown
5272
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
www.google.com
  • 172.217.16.196
whitelisted
sos.adaware.com
  • 104.16.213.94
  • 104.16.212.94
whitelisted
www.bing.com
  • 2.23.209.176
  • 2.23.209.140
  • 2.23.209.133
  • 2.23.209.149
  • 2.23.209.158
  • 2.23.209.177
  • 2.23.209.150
  • 2.23.209.148
  • 2.23.209.135
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.134
  • 20.190.160.20
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.72
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
arc.msn.com
  • 20.103.156.88
  • 20.223.35.26
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
Process
Message
GenericSetup.exe
Error: File not found - h2osciter:console.tis
GenericSetup.exe
at sciter:init-script.tis
GenericSetup.exe
GenericSetup.exe
GenericSetup.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'