analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

pgzs_pc_11_0612.exe

Full analysis: https://app.any.run/tasks/5f697f29-3223-4f17-9448-ba73b376853e
Verdict: Malicious activity
Analysis date: June 19, 2019, 08:20:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D20EA130B454771F8D4EE700630076BE

SHA1:

BAC08138C90FE6EC3625C604A6671674AF9499C7

SHA256:

D45FC0597EC77A1EC5454B1BE41974D7FD588DEDBAB371C6EA5374A11A572CA2

SSDEEP:

393216:jCeiJJXVwurDwAPWRc2nzr3gL89xWIRA3MKNhddVRXxR+2cm4KD5ewwZff:+roab2nHgL8FRjKNHRXxo2cSkwSf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SetupFsdu.exe (PID: 2100)
      • pgzs_pc_11_0612.exe (PID: 2568)
      • SetupFsdu.exe (PID: 2392)
      • SetupFsdu.exe (PID: 252)
      • SetupFsdu.exe (PID: 1140)
      • SetupFsdu.exe (PID: 1704)
      • SetupFsdu.exe (PID: 636)
      • AppleAssistDeviceService.exe (PID: 1652)
      • AppleAssistDeviceService.exe (PID: 3204)
      • AppleAssist.exe (PID: 3284)
      • UACHelper.exe (PID: 2872)
      • update.exe (PID: 2500)
      • ServerStatistics.exe (PID: 3680)
      • AppleAssist.exe (PID: 2952)
    • Application was dropped or rewritten from another process

      • SetupFsdu.exe (PID: 2100)
      • SetupFsdu.exe (PID: 2392)
      • SetupFsdu.exe (PID: 252)
      • SetupFsdu.exe (PID: 1140)
      • nsA175.tmp (PID: 1696)
      • nsA406.tmp (PID: 620)
      • nsAA14.tmp (PID: 2092)
      • nsA7F0.tmp (PID: 2152)
      • nsA5CD.tmp (PID: 3468)
      • SetupFsdu.exe (PID: 636)
      • SetupFsdu.exe (PID: 1704)
      • nsAC38.tmp (PID: 3100)
      • AppleAssistDeviceService.exe (PID: 1652)
      • AppleAssistDeviceService.exe (PID: 3204)
      • AppleAssist.exe (PID: 3284)
      • UACHelper.exe (PID: 2872)
      • update.exe (PID: 2500)
      • AppleAssist.exe (PID: 2952)
      • AppleAssistProxy.exe (PID: 2280)
      • ServerStatistics.exe (PID: 3680)
    • Adds new firewall rule via NETSH.EXE

      • nsA175.tmp (PID: 1696)
      • nsA406.tmp (PID: 620)
      • nsA5CD.tmp (PID: 3468)
      • nsA7F0.tmp (PID: 2152)
    • Changes the autorun value in the registry

      • pgzs_pc_11_0612.exe (PID: 2568)
  • SUSPICIOUS

    • Changes IE settings (feature browser emulation)

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Uses NETSH.EXE for network configuration

      • nsA175.tmp (PID: 1696)
      • nsA406.tmp (PID: 620)
      • nsA5CD.tmp (PID: 3468)
      • nsAC38.tmp (PID: 3100)
      • nsA7F0.tmp (PID: 2152)
      • nsAA14.tmp (PID: 2092)
    • Starts application with an unusual extension

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Creates a software uninstall entry

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Modifies the open verb of a shell class

      • pgzs_pc_11_0612.exe (PID: 2568)
      • AppleAssist.exe (PID: 3284)
      • UACHelper.exe (PID: 2872)
    • Executable content was dropped or overwritten

      • pgzs_pc_11_0612.exe (PID: 2568)
      • AppleAssistDeviceService.exe (PID: 1652)
    • Creates files in the user directory

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Creates files in the program directory

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Executed as Windows Service

      • AppleAssistDeviceService.exe (PID: 3204)
    • Creates files in the Windows directory

      • AppleAssistDeviceService.exe (PID: 3204)
      • AppleAssistDeviceService.exe (PID: 1652)
    • Starts CMD.EXE for commands execution

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Creates files in the driver directory

      • AppleAssistDeviceService.exe (PID: 1652)
    • Searches for installed software

      • AppleAssistProxy.exe (PID: 2280)
      • UACHelper.exe (PID: 2872)
    • Reads internet explorer settings

      • AppleAssist.exe (PID: 3284)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • pgzs_pc_11_0612.exe (PID: 2568)
    • Manual execution by user

      • AppleAssist.exe (PID: 2952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

ProductVersion: 2.0.3.162
ProductName: 苹果助手
LegalCopyright: 苹果助手 Copyright(c)2017
InternalName: AppleAssist.exe
FileVersion: 2.0.3.162
FileDescription: 苹果助手安装包
CompanyName: 苹果助手
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 2.0.3.162
FileVersionNumber: 2.0.3.162
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: 6
OSVersion: 5
EntryPoint: 0x3883
UninitializedDataSize: 16896
InitializedDataSize: 445952
CodeSize: 28160
LinkerVersion: 10
PEType: PE32
TimeStamp: 2012:02:24 20:19:54+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Feb-2012 19:19:54
Detected languages:
  • English - United States
CompanyName: 苹果助手
FileDescription: 苹果助手安装包
FileVersion: 2.0.3.162
InternalName: AppleAssist.exe
LegalCopyright: 苹果助手 Copyright(c)2017
ProductName: 苹果助手
ProductVersion: 2.0.3.162

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 24-Feb-2012 19:19:54
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006DAE
0x00006E00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.50853
.rdata
0x00008000
0x00002A62
0x00002C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.39054
.data
0x0000B000
0x00067EBC
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.43086
.ndata
0x00073000
0x000D5000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00148000
0x000050D0
0x00005200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.55883
.reloc
0x0014E000
0x00000F32
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
4.38873

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.21712
968
UNKNOWN
English - United States
RT_MANIFEST
2
4.67942
4264
UNKNOWN
English - United States
RT_ICON
3
4.5697
2440
UNKNOWN
English - United States
RT_ICON
4
5.05529
1128
UNKNOWN
English - United States
RT_ICON
103
2.62308
62
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.68733
494
UNKNOWN
English - United States
RT_DIALOG
106
2.86626
228
UNKNOWN
English - United States
RT_DIALOG
111
2.9304
218
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
29
Malicious processes
10
Suspicious processes
8

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start start pgzs_pc_11_0612.exe no specs pgzs_pc_11_0612.exe setupfsdu.exe setupfsdu.exe setupfsdu.exe setupfsdu.exe nsa175.tmp no specs netsh.exe no specs nsa406.tmp no specs netsh.exe no specs nsa5cd.tmp no specs netsh.exe no specs nsa7f0.tmp no specs netsh.exe no specs nsaa14.tmp no specs netsh.exe no specs nsac38.tmp no specs netsh.exe no specs setupfsdu.exe setupfsdu.exe appleassistdeviceservice.exe appleassistdeviceservice.exe cmd.exe no specs appleassist.exe uachelper.exe update.exe appleassistproxy.exe no specs appleassist.exe serverstatistics.exe

Process information

PID
CMD
Path
Indicators
Parent process
3668"C:\Users\admin\AppData\Local\Temp\pgzs_pc_11_0612.exe" C:\Users\admin\AppData\Local\Temp\pgzs_pc_11_0612.exeexplorer.exe
User:
admin
Company:
苹果助手
Integrity Level:
MEDIUM
Description:
苹果助手安装包
Exit code:
3221226540
Version:
2.0.3.162
Modules
Images
c:\users\admin\appdata\local\temp\pgzs_pc_11_0612.exe
c:\systemroot\system32\ntdll.dll
2568"C:\Users\admin\AppData\Local\Temp\pgzs_pc_11_0612.exe" C:\Users\admin\AppData\Local\Temp\pgzs_pc_11_0612.exe
explorer.exe
User:
admin
Company:
苹果助手
Integrity Level:
HIGH
Description:
苹果助手安装包
Exit code:
0
Version:
2.0.3.162
Modules
Images
c:\users\admin\appdata\local\temp\pgzs_pc_11_0612.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2392"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe" -protocol=2 -appname="安装程序" -screenname="安装与卸载程序" -ver=2.0.3.162C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe
pgzs_pc_11_0612.exe
User:
admin
Company:
TODO: <公司名>
Integrity Level:
HIGH
Description:
TODO: <文件说明>
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\setupfsdu.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2100"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe" -protocol=1 -category=安装流程 -action=启动安装包 -label= -ver=2.0.3.162 -channelid=5f9or9MZAosCu0YX5qu2qQ== C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe
pgzs_pc_11_0612.exe
User:
admin
Company:
TODO: <公司名>
Integrity Level:
HIGH
Description:
TODO: <文件说明>
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\setupfsdu.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
1140"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe" -type=1 -ver=2.0.3.162 -channelid=5f9or9MZAosCu0YX5qu2qQ== C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe
pgzs_pc_11_0612.exe
User:
admin
Company:
TODO: <公司名>
Integrity Level:
HIGH
Description:
TODO: <文件说明>
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\setupfsdu.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
252"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe" -protocol=1 -category=安装流程 -action=开始普通安装 -label=自定义安装,点击下一步 -ver=2.0.3.162 -channelid=5f9or9MZAosCu0YX5qu2qQ== C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exe
pgzs_pc_11_0612.exe
User:
admin
Company:
TODO: <公司名>
Integrity Level:
HIGH
Description:
TODO: <文件说明>
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\setupfsdu.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1696"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\nsA175.tmp" netsh advfirewall firewall add rule name="苹果助手" dir=in program="C:\Program Files\91 Wireless\AppleAssist\2.0.3.162\AppleAssist.exe" action=allowC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\nsA175.tmppgzs_pc_11_0612.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\nsa175.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
392netsh advfirewall firewall add rule name="苹果助手" dir=in program="C:\Program Files\91 Wireless\AppleAssist\2.0.3.162\AppleAssist.exe" action=allowC:\Windows\system32\netsh.exensA175.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
620"C:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\nsA406.tmp" netsh advfirewall firewall add rule name="苹果助手代理程序" dir=in program="C:\Program Files\91 Wireless\AppleAssist\2.0.3.162\AppleAssistProxy.exe" action=allowC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\nsA406.tmppgzs_pc_11_0612.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsf70fe.tmp\nsa406.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
712netsh advfirewall firewall add rule name="苹果助手代理程序" dir=in program="C:\Program Files\91 Wireless\AppleAssist\2.0.3.162\AppleAssistProxy.exe" action=allowC:\Windows\system32\netsh.exensA406.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
Total events
1 427
Read events
718
Write events
0
Delete events
0

Modification events

No data
Executable files
124
Suspicious files
62
Text files
124
Unknown types
6

Dropped files

PID
Process
Filename
Type
2568pgzs_pc_11_0612.exeC:\Program Files\91 Wireless\AppleAssist\2.0.3.162\app.7z
MD5:
SHA256:
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\SetupFsdu.exeexecutable
MD5:33938970B5D62E3976635DDEE66BE4F9
SHA256:FA729D27BBCBB818E49B13BE8AD54945564A5346A0E784098E22D94A4357E0DC
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\Tqwavlib.dlltext
MD5:BA8554748662CDFFCC635C6DEECC750C
SHA256:DF943049119CEA24074BA18F530169DBD9D67B25AF48243BF05F358A7DDC94D7
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\killer.dllexecutable
MD5:D2CBB21C65C97BF42ABF8E5D9C70B2DB
SHA256:91628006ED19F3110D3BC5EEFD474759D2C0B3314D34D8B8717339259F6E8569
2568pgzs_pc_11_0612.exeC:\Program Files\91 Wireless\AppleAssist\2.0.3.162\logo.icoimage
MD5:85025D50AB96071812A303CFF452E182
SHA256:FA9D40C750687386846DA9097A77ED6FF280C640A24208C39DD65D42003EFBAF
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\System.dllexecutable
MD5:7203DC8D3EE861071302E1F65D7C3CCC
SHA256:AB2C3E0304D5B85A7AE8D84C4B2FE2F071B69E4EE4A116E7AAFA3640001C6A92
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\DirectUI.dllexecutable
MD5:CF6442B43A1A58F65F1E024949D87A19
SHA256:799EB3C4A5A5AD46E6C5725D9CC65BCCB709591DA23A62D2BC4785B4010DE34A
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\skin.zipcompressed
MD5:DC2D9E659B951E98A0B62411C62C1AAE
SHA256:487A202F6D78ED7805CB0764F741FB66334E497E058D41F7E10D7A8A38F96905
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\logo.icoimage
MD5:85025D50AB96071812A303CFF452E182
SHA256:FA9D40C750687386846DA9097A77ED6FF280C640A24208C39DD65D42003EFBAF
2568pgzs_pc_11_0612.exeC:\Users\admin\AppData\Local\Temp\nsf70FE.tmp\BgWorker.dllexecutable
MD5:4CA28105360819DE3731805C14464DD8
SHA256:8256F91CEB1F2FFAD8D1434F6136ED1936E3A0857B59CC0DEC09D097F3EFFC15
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
124
TCP/UDP connections
65
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3204
AppleAssistDeviceService.exe
GET
45.126.120.235:80
http://nav.sj.soupingguo.com/controller.ashx?action=gettutorial&brand=ddm_error_log&model=default&fwversion=default&project=0
CN
malicious
1140
SetupFsdu.exe
POST
200
45.126.120.235:80
http://tj.service.soupingguo.com/stats/
CN
abr
26 b
malicious
2500
update.exe
GET
200
45.126.120.235:80
http://sjupdate.sj.soupingguo.com/checkupdate.ashx?mt=255&softid=227&fwv=all&version=2.0.3.162&branch=0&format=xml&lan=0&isbeta=0&ismanual=0&md5=972c8a2b7660de27625cd7843be9b922
CN
text
801 b
malicious
3284
AppleAssist.exe
POST
200
45.126.120.235:80
http://pc5.sj.soupingguo.com/V6/config
CN
pi2
8.50 Kb
malicious
252
SetupFsdu.exe
POST
200
172.217.22.78:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
2392
SetupFsdu.exe
POST
200
172.217.22.78:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
3284
AppleAssist.exe
POST
200
45.126.120.235:80
http://appuse.sj.soupingguo.com/api2.ashx
CN
binary
79 b
malicious
3284
AppleAssist.exe
GET
200
45.126.120.235:80
http://pc5.sj.soupingguo.com/controller.ashx?act=getsoftidfinstallanduninstall&version=0&platform=Android&fw=&isipad=0&jailbreak=false&protocolVer=2.0&user=6&clientver=2%2E0%2E3%2E162
CN
text
450 b
malicious
3284
AppleAssist.exe
GET
200
45.126.120.235:80
http://sjupdate.sj.soupingguo.com/checkupdate.ashx?mt=255&softid=3005&fwv=all&version=2.0.2.53&branch=0&format=xml&lan=0&isbeta=0&ismanual=0&md5=f094364c5b3333e15607e6d9f949b0e7
CN
text
236 b
malicious
3204
AppleAssistDeviceService.exe
GET
200
45.126.120.235:80
http://device.sj.soupingguo.com/Controller.ashx?action=getservertime
CN
text
19 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
252
SetupFsdu.exe
172.217.22.78:80
www.google-analytics.com
Google Inc.
US
whitelisted
172.217.21.206:80
www.google-analytics.com
Google Inc.
US
whitelisted
2392
SetupFsdu.exe
172.217.22.78:80
www.google-analytics.com
Google Inc.
US
whitelisted
1704
SetupFsdu.exe
172.217.22.78:80
www.google-analytics.com
Google Inc.
US
whitelisted
1140
SetupFsdu.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious
636
SetupFsdu.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious
2568
pgzs_pc_11_0612.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious
3204
AppleAssistDeviceService.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious
3284
AppleAssist.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious
2500
update.exe
45.126.120.235:80
pc5.sj.soupingguo.com
Fuzhou
CN
malicious

DNS requests

Domain
IP
Reputation
www.google-analytics.com
  • 172.217.22.78
  • 172.217.21.206
whitelisted
pc5.sj.soupingguo.com
  • 45.126.120.235
malicious
tj.service.soupingguo.com
  • 45.126.120.235
malicious
device.sj.soupingguo.com
  • 45.126.120.235
malicious
nav.sj.soupingguo.com
  • 45.126.120.235
malicious
sjupdate.sj.soupingguo.com
  • 45.126.120.235
malicious
appuse.sj.soupingguo.com
  • 45.126.120.235
malicious
itunesapp2.sj.soupingguo.com
  • 45.126.120.235
malicious
bos.pgzs.com
  • 103.254.191.59
malicious
cfg.service.soupingguo.com
  • 45.126.120.235
malicious

Threats

PID
Process
Class
Message
2100
SetupFsdu.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
2392
SetupFsdu.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
252
SetupFsdu.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
1140
SetupFsdu.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
2568
pgzs_pc_11_0612.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
1704
SetupFsdu.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
2568
pgzs_pc_11_0612.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
2500
update.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
3204
AppleAssistDeviceService.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
3284
AppleAssist.exe
A Network Trojan was detected
ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible ))
Process
Message
pgzs_pc_11_0612.exe
????GA:UA-82224620-6-????-??[????]-
AppleAssist.exe
91Assist=>????
AppleAssist.exe
91Assist=>????:??????????,??
AppleAssist.exe
91Assist=>????:?????MUTEX??
AppleAssist.exe
91Assist=>CheckIntegrity start
AppleAssist.exe
91Assist=>CheckIntegrity end
AppleAssist.exe
91Assist=>Main::StartApp
AppleAssist.exe
CFileOperation::CreateEmptyFile failed with error 5 : Access is denied.
UACHelper.exe
uachelper main
UACHelper.exe
uachelper SetUnhandleException begin