File name: | Result.exe |
Full analysis: | https://app.any.run/tasks/999ae2cf-4aee-42b0-aca2-15dd586e7bcd |
Verdict: | Malicious activity |
Analysis date: | November 29, 2020, 08:25:01 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | A8E460F5084F8D4F6F9BD68E159F4606 |
SHA1: | 14263F14F9DF330817791F4F6173C6273162B020 |
SHA256: | D297E77C023AEF46E9FBA5D0190BBBB4DA6838C846CED00EA32E038EAF57329E |
SSDEEP: | 98304:hqB4rJ4v8kvT7GdoV0EEgzMNscEz9JpRyG:84r+0kvT7tVnEGMNscEL |
.exe | | | InstallShield setup (53.2) |
---|---|---|
.exe | | | Win32 Executable Delphi generic (17.5) |
.scr | | | Windows screen saver (16.1) |
.exe | | | Win32 Executable (generic) (5.5) |
.exe | | | Win16/32 Executable Delphi generic (2.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 1992:06:20 00:22:17+02:00 |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 5120 |
InitializedDataSize: | 3495424 |
UninitializedDataSize: | - |
EntryPoint: | 0x20cc |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 19-Jun-1992 22:22:17 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0050 |
Pages in file: | 0x0002 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x000F |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x001A |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 19-Jun-1992 22:22:17 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 0x00001000 | 0x000013B8 | 0x00001400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.34099 |
DATA | 0x00003000 | 0x0000007C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.11763 |
BSS | 0x00004000 | 0x00000695 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00005000 | 0x00000302 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.47732 |
.tls | 0x00006000 | 0x00000004 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x00007000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0.199108 |
.reloc | 0x00008000 | 0x000001C8 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 5.7833 |
.rsrc | 0x00009000 | 0x00354A70 | 0x00354C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 7.91224 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
A1 | 7.96432 | 3021501 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
A2 | 7.32039 | 470183 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
B1 | 2.9477 | 9 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
B2 | 3.02717 | 11 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
C1 | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
C2 | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
D1 | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
D2 | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
DVCLAL | 4 | 16 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
E1 | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
kernel32.dll |
shell32.dll |
shfolder.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2444 | "C:\Users\admin\AppData\Local\Temp\Result.exe" | C:\Users\admin\AppData\Local\Temp\Result.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
1980 | "C:\Users\admin\AppData\Local\Temp\build.exe" | C:\Users\admin\AppData\Local\Temp\build.exe | Result.exe | |
User: admin Integrity Level: MEDIUM | ||||
2228 | "C:\Users\admin\AppData\Local\Temp\Desktop.exe" | C:\Users\admin\AppData\Local\Temp\Desktop.exe | Result.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
924 | "C:\Users\admin\AppData\Local\Temp\RarSFX1\vidzet.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX1\vidzet.exe | Desktop.exe | |
User: admin Integrity Level: MEDIUM Exit code: 4294967295 | ||||
3316 | "C:\Users\admin\AppData\Local\Temp\RarSFX0\WannaLol.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX0\WannaLol.exe | build.exe | |
User: admin Company: Todes Integrity Level: MEDIUM Version: 1.0.0.0 |
(PID) Process: | (2444) Result.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (2444) Result.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (2228) Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (2228) Desktop.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (1980) build.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (1980) build.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (924) vidzet.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vidzet_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (924) vidzet.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vidzet_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (924) vidzet.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vidzet_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
(PID) Process: | (924) vidzet.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vidzet_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3316 | WannaLol.exe | C:\Users\admin\AppData\Local\Temp\PSE11\93A066E5CB4B9B4F98D1FE20DFCC21E8\php.ini | — | |
MD5:— | SHA256:— | |||
2228 | Desktop.exe | C:\Users\admin\AppData\Local\Temp\RarSFX1\vidzet.exe | executable | |
MD5:6D11243E26988CA0D663FD1D56E652EC | SHA256:78602BEEEC5929D7AEE7206E538F44A20BD2E1AB36F6E07775D404D4A1899968 | |||
1980 | build.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\WannaLol.exe | executable | |
MD5:93A066E5CB4B9B4F98D1FE20DFCC21E8 | SHA256:170508FEBE7C4FAFA856F60A2D1F471CAD844054D467A9F579CC479A39685C5D | |||
2228 | Desktop.exe | C:\Users\admin\AppData\Local\Temp\RarSFX1\vidzet.pdb | pdb | |
MD5:6B8B7DA80EC7AE2A2B743918B5318B58 | SHA256:75B084F30A9E5236057B92D761AA99C8738B23D4BA5433A74EC9EDB40C7E1923 | |||
2444 | Result.exe | C:\Users\admin\AppData\Local\Temp\build.exe | executable | |
MD5:B704D5A7AAB68F46A8AF3EBB91B2BCD3 | SHA256:0DA25E127E4E8F653C88E37CE632819F6CAC36A0F3DA348C6CF7E56ECE47F375 | |||
924 | vidzet.exe | C:\Users\admin\AppData\Local\Temp\tmp7CF.tmp | image | |
MD5:095B4987BED865BA1AE2576A8188B213 | SHA256:0CA0BA5C7345C0A26B0E76965AEF14010E133E49BD9CE4E1D6D28FA0B98FB316 | |||
2444 | Result.exe | C:\Users\admin\AppData\Local\Temp\Desktop.exe | executable | |
MD5:51FDB3629E740295634EB1E8A82AB6A1 | SHA256:D0278B0754F19971E3BE9B0B93AC2468185291EF9E575AB7DCDC741E3B747D57 | |||
1980 | build.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\msvcr71.dll | executable | |
MD5:5776A4EF7F492636C052AE64B35BF4CE | SHA256:42DED6072E28ED5394B0A832A0559B8E618490764F2490DBEDCF7E5479537573 | |||
3316 | WannaLol.exe | C:\Users\admin\AppData\Local\Temp\PSE11\php\modules\php_bz2.dll | executable | |
MD5:2F8BC6C1741BC86EE012F444C56D192E | SHA256:EC6F6310E3A08AD80EA159C336E93CC024DAE223A5BD4B08AE2E0351941AEC07 | |||
2228 | Desktop.exe | C:\Users\admin\AppData\Local\Temp\RarSFX1\vidzet.sb | text | |
MD5:21D4B6DAB42B0DA7706C069B8C589B70 | SHA256:22B2E240030A5D1F2EBF04A7CB2E540D4815C140847849BF326F1625A2704ECC |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
924 | vidzet.exe | 87.240.185.168:443 | sun9-69.userapi.com | VKontakte Ltd | RU | unknown |
Domain | IP | Reputation |
---|---|---|
sun9-69.userapi.com |
| whitelisted |