File name:

DeepNude v.3.exe

Full analysis: https://app.any.run/tasks/59d1e5ea-ecde-49aa-9432-003b1fa0e629
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: July 09, 2019, 22:21:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

07556B72ECF1715BAD8C11EBB40D2F00

SHA1:

195B9058981DA6E13D04C14BA4F16CF804AFFB0B

SHA256:

D7B7E1FCFF8C7AF9485F2C6F13EA1A47EBF151E6C0244F1EA23045F4164F6323

SSDEEP:

98304:22cPK8BydIFRkYFgtsVXnr2FTjTcAcVzEu5P56xl1yAJc9ZcVkhNbskd0VSO5lnW:5CK2fkYTXKFbwVz9wVSykhi6m5MYsco

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Build.exe (PID: 3944)
      • GlobCollationHost.exe (PID: 2128)
      • Build.exe (PID: 3324)
      • Build.exe (PID: 1860)
    • Loads the Task Scheduler COM API

      • Build.exe (PID: 3944)
      • Build.exe (PID: 3324)
      • Build.exe (PID: 1860)
      • GlobCollationHost.exe (PID: 2128)
    • Stealing of credential data

      • GlobCollationHost.exe (PID: 2128)
  • SUSPICIOUS

    • Creates files in the user directory

      • DeepNude v.3.exe (PID: 2160)
      • Build.exe (PID: 3944)
      • GlobCollationHost.exe (PID: 2128)
      • GlobCollationHost.module.exe (PID: 3212)
    • Starts itself from another location

      • Build.exe (PID: 3944)
    • Executable content was dropped or overwritten

      • Build.exe (PID: 3944)
      • DeepNude v.3.exe (PID: 2160)
    • Uses RUNDLL32.EXE to load library

      • GlobCollationHost.exe (PID: 2128)
    • Reads Internet Cache Settings

      • rundll32.exe (PID: 3048)
      • rundll32.exe (PID: 2024)
      • rundll32.exe (PID: 2952)
    • Reads the cookies of Google Chrome

      • GlobCollationHost.exe (PID: 2128)
    • Reads the cookies of Mozilla Firefox

      • GlobCollationHost.exe (PID: 2128)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 2496)
      • cmd.exe (PID: 3936)
      • GlobCollationHost.exe (PID: 2128)
    • Starts CMD.EXE for commands execution

      • Build.exe (PID: 3324)
      • Build.exe (PID: 1860)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 2496)
  • INFO

    • Reads settings of System Certificates

      • GlobCollationHost.exe (PID: 2128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:09 15:31:07+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 581632
InitializedDataSize: 6897664
UninitializedDataSize: -
EntryPoint: 0x2800a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 46.66.28.43
ProductVersionNumber: 46.66.28.43
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 46.66.28.43
ProductVersion: 46.66.28.43
FileDescription: API смарт-карт (Microsoft)
CompanyName: OneCoreUAP Common Proxy Stub
LegalCopyright: (C) KdiWYZHsNvZgUVcOpIqVOlvVFrkexePqRM9r3Gx85PksSWi8yfD2bs Technology Co. Ltd., All rights reserved.
ProductName:
Comments: wQqXNEl5v8tOzkp6A3RrcCvNVKGYH9gQt8PAohscNVWYDRWE8ef9Zndc
InternalName: find.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
16
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start drop and start deepnude v.3.exe build.exe globcollationhost.exe rundll32.exe no specs build.exe no specs rundll32.exe no specs cmd.exe no specs taskkill.exe no specs attrib.exe no specs build.exe no specs globcollationhost.module.exe no specs cmd.exe no specs taskkill.exe no specs attrib.exe no specs rundll32.exe no specs attrib.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1324attrib +s +h "C:\Users\admin\AppData\Roaming\amd64_microsoft-windows-appx-alluserstore"C:\Windows\system32\attrib.exeGlobCollationHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1860"C:\Users\admin\AppData\Roaming\vZxnUX62un2qM\Build.exe" C:\Users\admin\AppData\Roaming\vZxnUX62un2qM\Build.exeDeepNude v.3.exe
User:
admin
Company:
Client Virtualization Subsystems
Integrity Level:
MEDIUM
Description:
Network Location Awareness 2
Exit code:
0
Version:
40.86.98.65
Modules
Images
c:\users\admin\appdata\roaming\vzxnux62un2qm\build.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2024"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exeGlobCollationHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imagehlp.dll
2128C:\Users\admin\AppData\Roaming\amd64_microsoft-windows-appx-alluserstore\GlobCollationHost.exeC:\Users\admin\AppData\Roaming\amd64_microsoft-windows-appx-alluserstore\GlobCollationHost.exe
Build.exe
User:
admin
Company:
Client Virtualization Subsystems
Integrity Level:
MEDIUM
Description:
Network Location Awareness 2
Exit code:
0
Version:
40.86.98.65
Modules
Images
c:\users\admin\appdata\roaming\amd64_microsoft-windows-appx-alluserstore\globcollationhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2160"C:\Users\admin\Desktop\DeepNude v.3.exe" C:\Users\admin\Desktop\DeepNude v.3.exe
explorer.exe
User:
admin
Company:
OneCoreUAP Common Proxy Stub
Integrity Level:
MEDIUM
Description:
API смарт-карт (Microsoft)
Exit code:
0
Version:
46.66.28.43
Modules
Images
c:\users\admin\desktop\deepnude v.3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2496C:\Windows\system32\cmd.exe /c taskkill /f /pid 1860 & attrib -s -h -r -a /S /D "C:\Users\admin\AppData\Roaming\vZxnUX62un2qM" & del /q /f "C:\Users\admin\AppData\Roaming\vZxnUX62un2qM\Build.exe"C:\Windows\system32\cmd.exeBuild.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2712attrib -s -h -r -a /S /D "C:\Users\admin\AppData\Roaming\vZxnUX62un2qM" C:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2768attrib -s -h -r -a /S /D "C:\Users\admin\AppData\Roaming\HxGSSrvTkeBhbzFqahEPir" C:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2952"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exeGlobCollationHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\imagehlp.dll
3048"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exeGlobCollationHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
621
Read events
582
Write events
39
Delete events
0

Modification events

(PID) Process:(2160) DeepNude v.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2160) DeepNude v.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2128) GlobCollationHost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GlobCollationHost_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
7
Suspicious files
2
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\autE554.tmp
MD5:
SHA256:
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\autE7C6.tmp
MD5:
SHA256:
3944Build.exeC:\Users\admin\AppData\Roaming\amd64_microsoft-windows-appx-alluserstore\ENU_6887FE9730D2535E9D41
MD5:
SHA256:
2128GlobCollationHost.exeC:\Users\admin\AppData\Local\Temp\autF08F.tmp
MD5:
SHA256:
2128GlobCollationHost.exeC:\Users\admin\AppData\Roaming\amd64_microsoft-windows-appx-alluserstore\GlobCollationHost.sqlite3.module.dll
MD5:
SHA256:
2128GlobCollationHost.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\autF767.tmp
MD5:
SHA256:
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\autF891.tmp
MD5:
SHA256:
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\autFF87.tmp
MD5:
SHA256:
2160DeepNude v.3.exeC:\Users\admin\AppData\Local\Temp\aut92.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
3
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2128
GlobCollationHost.exe
149.154.167.220:443
api.telegram.org
Telegram Messenger LLP
GB
malicious
2128
GlobCollationHost.exe
104.25.210.99:443
ipapi.co
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
api.telegram.org
  • 149.154.167.220
shared
ipapi.co
  • 104.25.210.99
  • 104.25.209.99
shared

Threats

PID
Process
Class
Message
1052
svchost.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (ipapi .co in DNS lookup)
1052
svchost.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup Domain (ipapi .co in DNS lookup)
2128
GlobCollationHost.exe
A Network Trojan was detected
MALWARE [PTsecurity] MASAD/QULAB Clipper/Stealer Exfiltration by Telegram
No debug info