File name:

dsr.exe

Full analysis: https://app.any.run/tasks/079b4af5-4a6b-4118-b83c-6458a56a673d
Verdict: Malicious activity
Analysis date: January 15, 2024, 04:12:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

DE7760E35B6B6F6FDCF4BA02FF10B6F3

SHA1:

3AC8FD54607990645A8224E84EF347140C76531E

SHA256:

D205F48DD98C98B5BF714B6B0F2576B356482C53C8A4BEB4078635333E5D9B68

SSDEEP:

98304:kETd3DmrLmCpCQOoHyQon1K4oYx0PiUg88ztooWAud85PXdMiBCL7heTKrHtcuhw:j1SA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • dsr.exe (PID: 2420)
      • GLBFAFA.tmp (PID: 2016)
    • Creates a writable file in the system directory

      • GLBFAFA.tmp (PID: 2016)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • dsr.exe (PID: 2420)
      • GLBFAFA.tmp (PID: 2016)
    • Executable content was dropped or overwritten

      • dsr.exe (PID: 2420)
      • GLBFAFA.tmp (PID: 2016)
    • Reads the Internet Settings

      • GLBFAFA.tmp (PID: 2016)
  • INFO

    • Create files in a temporary directory

      • dsr.exe (PID: 2420)
      • GLBFAFA.tmp (PID: 2016)
    • Checks supported languages

      • dsr.exe (PID: 2420)
      • GLBFAFA.tmp (PID: 2016)
      • DSR.exe (PID: 1652)
      • GLJFBE6.tmp (PID: 480)
    • Reads the computer name

      • GLBFAFA.tmp (PID: 2016)
      • DSR.exe (PID: 1652)
    • Creates files or folders in the user directory

      • GLBFAFA.tmp (PID: 2016)
    • Reads the machine GUID from the registry

      • DSR.exe (PID: 1652)
    • Creates files in the program directory

      • GLBFAFA.tmp (PID: 2016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:08:16 20:13:16+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 1024
InitializedDataSize: 2171904
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.8.0.0
ProductVersionNumber: 1032.4455.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: DataNumen, Inc.
FileDescription: DataNumen SQL Recovery Installer
FileVersion: 2.8
LegalCopyright: Copyright(C) 2001 - 2018 DataNumen, Inc.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dsr.exe glbfafa.tmp gljfbe6.tmp no specs dsr.exe no specs dsr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Local\Temp\dsr.exe" C:\Users\admin\AppData\Local\Temp\dsr.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\dsr.exe
c:\windows\system32\ntdll.dll
480"C:\Users\admin\AppData\Local\Temp\GLJFBE6.tmp" C:\Program Files\DSR\DSRSHL.dllC:\Users\admin\AppData\Local\Temp\GLJFBE6.tmpGLBFAFA.tmp
User:
admin
Company:
Altiris
Integrity Level:
HIGH
Description:
WiseScript COM Registration Tool
Exit code:
0
Version:
10.03.0.250
Modules
Images
c:\users\admin\appdata\local\temp\gljfbe6.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1652"C:\PROGRA~1\DSR\DSR.exe" C:\Program Files\DSR\DSR.exeGLBFAFA.tmp
User:
admin
Company:
DataNumen, Inc.
Integrity Level:
HIGH
Exit code:
0
Version:
2.8.0.2
Modules
Images
c:\program files\dsr\dsr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2016C:\Users\admin\AppData\Local\Temp\GLBFAFA.tmp 6656 C:\Users\admin\AppData\Local\Temp\dsr.exeC:\Users\admin\AppData\Local\Temp\GLBFAFA.tmp
dsr.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\glbfafa.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2420"C:\Users\admin\AppData\Local\Temp\dsr.exe" C:\Users\admin\AppData\Local\Temp\dsr.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dsr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
Total events
1 676
Read events
1 647
Write events
28
Delete events
1

Modification events

(PID) Process:(2016) GLBFAFA.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2016) GLBFAFA.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2016) GLBFAFA.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2016) GLBFAFA.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
06000000000000000B0000000100000002000000070000000C0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0200000006000000000000000B00000001000000070000000C0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_FolderType
Value:
{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_TopViewID
Value:
{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
(PID) Process:(1652) DSR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlgLegacy
Operation:writeName:TV_TopViewVersion
Value:
0
Executable files
22
Suspicious files
8
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2016GLBFAFA.tmpC:\Program Files\DSR\~GLH0001.TMPexecutable
MD5:483C9E7E370B301A8AEC02480E343618
SHA256:F0042B2321C7CF73ABD333B6DDA322E5DF21482305298C208EF68CED8866E0EA
2016GLBFAFA.tmpC:\Users\admin\AppData\Local\Temp\GLF7D2.tmpexecutable
MD5:08988E92764767F217CBD6A3BB358BF5
SHA256:819130EDCA130ED1D382E7CB783B04C0256AF6480F7CAAB478B60A85FDF5021B
2016GLBFAFA.tmpC:\Users\admin\AppData\Local\Temp\GLW1E3.tmptext
MD5:4424D7EB26D6BE02D8C3E18D4962D964
SHA256:A04AC56B276D46DECCED6B11145C5D1CC3B3C2EBDE7DB2DC21E9073D39E1DEB7
2016GLBFAFA.tmpC:\Users\admin\AppData\Local\Temp\GLKFDEA.tmpexecutable
MD5:693653316F18CA508C6EEC2E2FD988DC
SHA256:AEE1EB527D74ADE3DEC0B5D5CAF8E4244A1DAD00C0170A032CEE9036223D3E69
2016GLBFAFA.tmpC:\Users\admin\AppData\Local\Temp\GLJFBE6.tmpexecutable
MD5:EF6ABA90B8A30869CF0CC9978BE6BF63
SHA256:8D172BC2473F04DAC1AE0ED3F6BEC87B7FE1E0CD05DF2B2ADD528C7175E31185
2016GLBFAFA.tmpC:\Users\admin\AppData\Local\Temp\~GLH0000.TMPexecutable
MD5:08988E92764767F217CBD6A3BB358BF5
SHA256:819130EDCA130ED1D382E7CB783B04C0256AF6480F7CAAB478B60A85FDF5021B
2016GLBFAFA.tmpC:\PROGRA~1\DSR\temp.000executable
MD5:23BB1729D2903F6CD6746592B27469E2
SHA256:539023D669EFA03D34424C9A6AE890E243B91D866327F7551E4C4539BD45CECE
2016GLBFAFA.tmpC:\Program Files\DSR\UNWISE.EXEexecutable
MD5:483C9E7E370B301A8AEC02480E343618
SHA256:F0042B2321C7CF73ABD333B6DDA322E5DF21482305298C208EF68CED8866E0EA
2016GLBFAFA.tmpC:\Program Files\DSR\SQLPreview.dllexecutable
MD5:9DE0F2896CD20A48658C9F6EEA798BBE
SHA256:CA00BD0874B27C99F9089AED27F709DD2CAAB8505353DAA0F4ABC869E6FB343A
2016GLBFAFA.tmpC:\Program Files\DSR\~GLH0002.TMPexecutable
MD5:9DE0F2896CD20A48658C9F6EEA798BBE
SHA256:CA00BD0874B27C99F9089AED27F709DD2CAAB8505353DAA0F4ABC869E6FB343A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info