File name:

Bonzify.exe

Full analysis: https://app.any.run/tasks/44a16759-a656-4c70-883b-d032beb5cee9
Verdict: Malicious activity
Analysis date: May 22, 2024, 15:40:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9C352D2CE0C0BDC40C72F52CE3480577

SHA1:

BD4C956186F33C92EB4469F7E5675510D0790E99

SHA256:

D7E6580054525D3F21F86EDFC9F30B7A75FFA829A1EB67EE3CAB33F0040DBA4E

SSDEEP:

196608:/dAMaWetTeAkLIdx751qFTkub//73lc6u7b5VJ2Yx5xIdk3o:naWedh+Idx75QYub//73lc6u7bLMYxDo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Bonzify.exe (PID: 4064)
      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
      • CCleaner.exe (PID: 1408)
    • Registers / Runs the DLL via REGSVR32.EXE

      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
    • Changes the autorun value in the registry

      • INSTALLER.exe (PID: 1664)
      • CCleaner.exe (PID: 1408)
      • dllhost.exe (PID: 3376)
      • IEExec.exe (PID: 2348)
      • dw20.exe (PID: 2904)
      • printui.exe (PID: 3132)
      • psxss.exe (PID: 4008)
      • wiaacmgr.exe (PID: 1884)
      • conhost.exe (PID: 3380)
      • PrintBrm.exe (PID: 1212)
      • lpksetup.exe (PID: 3892)
      • lpksetup.exe (PID: 5824)
      • conhost.exe (PID: 3764)
    • Creates a writable file in the system directory

      • INSTALLER.exe (PID: 1664)
      • msdtc.exe (PID: 1296)
    • Changes the AppInit_DLLs value (autorun option)

      • Bonzify.exe (PID: 4064)
    • Steals credentials from Web Browsers

      • CCleaner.exe (PID: 1408)
    • Changes appearance of the Explorer extensions

      • wiaacmgr.exe (PID: 1884)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 1408)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 4084)
    • Starts CMD.EXE for commands execution

      • Bonzify.exe (PID: 4064)
    • Executing commands from a ".bat" file

      • Bonzify.exe (PID: 4064)
    • Takes ownership (TAKEOWN.EXE)

      • cmd.exe (PID: 4084)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 4084)
    • Process drops legitimate windows executable

      • Bonzify.exe (PID: 4064)
      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
    • Starts a Microsoft application from unusual location

      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
    • Executable content was dropped or overwritten

      • Bonzify.exe (PID: 4064)
      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
      • CCleaner.exe (PID: 1408)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2304)
      • regsvr32.exe (PID: 1768)
      • regsvr32.exe (PID: 1628)
      • regsvr32.exe (PID: 660)
      • regsvr32.exe (PID: 524)
      • regsvr32.exe (PID: 1060)
      • regsvr32.exe (PID: 1620)
      • regsvr32.exe (PID: 304)
      • regsvr32.exe (PID: 768)
      • CCleaner.exe (PID: 1408)
      • wiaacmgr.exe (PID: 1884)
      • printui.exe (PID: 3132)
      • dllhost.exe (PID: 3376)
      • WinMail.exe (PID: 4024)
      • LocationNotifications.exe (PID: 3708)
    • Creates a software uninstall entry

      • INSTALLER.exe (PID: 1664)
      • wiaacmgr.exe (PID: 1884)
    • Creates file in the systems drive root

      • Bonzify.exe (PID: 4064)
      • gpscript.exe (PID: 2328)
      • WMIADAP.exe (PID: 1980)
      • powercfg.exe (PID: 1484)
      • DFDWiz.exe (PID: 3528)
      • curl.exe (PID: 2284)
      • CCleaner.exe (PID: 1408)
      • CCleaner.exe (PID: 3944)
      • wininit.exe (PID: 3368)
      • CompatTelRunner.exe (PID: 3152)
      • aspnet_state.exe (PID: 2976)
      • CompatTelRunner.exe (PID: 3284)
      • conhost.exe (PID: 3532)
      • ntvdm.exe (PID: 3796)
      • dllhost.exe (PID: 3376)
      • IEExec.exe (PID: 2348)
      • wiaacmgr.exe (PID: 1884)
      • dllhost.exe (PID: 1596)
      • shrpubw.exe (PID: 1972)
      • qprocess.exe (PID: 2204)
      • ieUnatt.exe (PID: 3272)
      • dw20.exe (PID: 2904)
      • xwizard.exe (PID: 2828)
      • printui.exe (PID: 3132)
      • ksetup.exe (PID: 2964)
      • WsatConfig.exe (PID: 2844)
      • psxss.exe (PID: 4008)
      • OARPMANY.EXE (PID: 3436)
      • WFS.exe (PID: 3912)
      • msdt.exe (PID: 3332)
      • drvinst.exe (PID: 1020)
      • FXSUNATD.exe (PID: 1128)
      • timeout.exe (PID: 3520)
      • ie4uinit.exe (PID: 1840)
      • msdtc.exe (PID: 1296)
      • mtstocom.exe (PID: 3508)
      • Microsoft.Workflow.Compiler.exe (PID: 2340)
      • msg.exe (PID: 3596)
      • wermgr.exe (PID: 1696)
      • makecab.exe (PID: 3532)
      • runonce.exe (PID: 2512)
      • conhost.exe (PID: 3380)
      • alg.exe (PID: 1020)
      • imjppdmg.exe (PID: 2480)
      • FreeCell.exe (PID: 992)
      • ntvdm.exe (PID: 1992)
      • WinMail.exe (PID: 4024)
      • PrintBrm.exe (PID: 1212)
      • lpksetup.exe (PID: 3892)
      • WinMgmt.exe (PID: 3184)
      • ctfmon.exe (PID: 3724)
      • SearchIndexer.exe (PID: 2808)
      • TSWbPrxy.exe (PID: 3652)
      • raserver.exe (PID: 4684)
      • notepad.exe (PID: 5000)
      • lpksetup.exe (PID: 5824)
      • LocationNotifications.exe (PID: 3708)
      • iscsicpl.exe (PID: 4440)
      • RMActivate.exe (PID: 5160)
      • WsatConfig.exe (PID: 4092)
      • ODEPLOY.EXE (PID: 5040)
      • SearchFilterHost.exe (PID: 5708)
      • wextract.exe (PID: 1284)
      • sbunattend.exe (PID: 6124)
      • ddodiag.exe (PID: 6092)
      • mshta.exe (PID: 4340)
      • setupSNK.exe (PID: 2128)
      • WmiPrvSE.exe (PID: 2692)
      • conhost.exe (PID: 3764)
      • charmap.exe (PID: 6744)
    • The process executes via Task Scheduler

      • CCleaner.exe (PID: 1408)
      • conhost.exe (PID: 3532)
      • ntvdm.exe (PID: 3796)
      • aspnet_state.exe (PID: 2976)
      • shrpubw.exe (PID: 1972)
      • IEExec.exe (PID: 2348)
      • ksetup.exe (PID: 2964)
      • psxss.exe (PID: 4008)
    • Checks Windows Trust Settings

      • CCleaner.exe (PID: 1408)
      • WsatConfig.exe (PID: 2844)
      • WsatConfig.exe (PID: 4092)
    • Reads security settings of Internet Explorer

      • CCleaner.exe (PID: 1408)
      • WsatConfig.exe (PID: 2844)
      • WsatConfig.exe (PID: 4092)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 1408)
      • WinMail.exe (PID: 4024)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 1408)
      • WsatConfig.exe (PID: 2844)
      • WsatConfig.exe (PID: 4092)
      • RMActivate.exe (PID: 5160)
    • Reads the Internet Settings

      • CCleaner.exe (PID: 1408)
      • ie4uinit.exe (PID: 1840)
    • Reads the date of Windows installation

      • CCleaner.exe (PID: 1408)
    • Searches for installed software

      • CCleaner.exe (PID: 1408)
    • Executed via WMI

      • cvtres.exe (PID: 2800)
      • ieUnatt.exe (PID: 3272)
      • qprocess.exe (PID: 2204)
    • Executes as Windows Service

      • dllhost.exe (PID: 3376)
      • msdtc.exe (PID: 1296)
    • Changes internet zones settings

      • CCleaner.exe (PID: 1408)
      • dw20.exe (PID: 2904)
      • printui.exe (PID: 3132)
      • psxss.exe (PID: 4008)
      • wiaacmgr.exe (PID: 1884)
      • msdt.exe (PID: 3332)
      • Microsoft.Workflow.Compiler.exe (PID: 2340)
      • dllhost.exe (PID: 3376)
      • WinMail.exe (PID: 4024)
      • iscsicpl.exe (PID: 4440)
      • WsatConfig.exe (PID: 4092)
      • ddodiag.exe (PID: 6092)
      • LocationNotifications.exe (PID: 3708)
      • charmap.exe (PID: 6744)
    • Application launched itself

      • CompatTelRunner.exe (PID: 3152)
    • Changes default file association

      • wiaacmgr.exe (PID: 1884)
    • Uses TIMEOUT.EXE to delay execution

      • dllhost.exe (PID: 3376)
    • Adds/modifies Windows certificates

      • wiaacmgr.exe (PID: 1884)
    • Disables SEHOP

      • wiaacmgr.exe (PID: 1884)
    • Starts SC.EXE for service management

      • TSWbPrxy.exe (PID: 3652)
    • Start notepad (likely ransomware note)

      • wiaacmgr.exe (PID: 1884)
    • Modifies the phishing filter of IE

      • raserver.exe (PID: 4684)
    • Changes Internet Explorer settings (feature browser emulation)

      • lpksetup.exe (PID: 5824)
    • Checks for external IP

      • CCleaner.exe (PID: 1408)
    • Process changes security settings for the VBA macro

      • lpksetup.exe (PID: 5824)
  • INFO

    • Create files in a temporary directory

      • Bonzify.exe (PID: 4064)
      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
      • msdt.exe (PID: 3332)
      • ODEPLOY.EXE (PID: 5040)
    • Checks supported languages

      • Bonzify.exe (PID: 4064)
      • INSTALLER.exe (PID: 1292)
      • AgentSvr.exe (PID: 1652)
      • INSTALLER.exe (PID: 1664)
      • AgentSvr.exe (PID: 2060)
      • wmpnscfg.exe (PID: 924)
      • wmpnscfg.exe (PID: 972)
      • curl.exe (PID: 2284)
      • WMIADAP.exe (PID: 1980)
      • DFDWiz.exe (PID: 3528)
      • CCleaner.exe (PID: 1408)
      • CCleaner.exe (PID: 3944)
      • cvtres.exe (PID: 2800)
      • aspnet_state.exe (PID: 2976)
      • wmpnscfg.exe (PID: 3200)
      • ieUnatt.exe (PID: 3272)
      • conhost.exe (PID: 3532)
      • shrpubw.exe (PID: 1972)
      • IEExec.exe (PID: 2348)
      • wiaacmgr.exe (PID: 1884)
      • dw20.exe (PID: 2904)
      • printui.exe (PID: 3132)
      • xwizard.exe (PID: 2828)
      • WsatConfig.exe (PID: 2844)
      • psxss.exe (PID: 4008)
      • WFS.exe (PID: 3912)
      • OARPMANY.EXE (PID: 3436)
      • msdt.exe (PID: 3332)
      • drvinst.exe (PID: 1020)
      • Microsoft.Workflow.Compiler.exe (PID: 2340)
      • FXSUNATD.exe (PID: 1128)
      • wermgr.exe (PID: 1696)
      • runonce.exe (PID: 2512)
      • conhost.exe (PID: 3380)
      • imjppdmg.exe (PID: 2480)
      • FreeCell.exe (PID: 992)
      • WinMail.exe (PID: 4024)
      • lpksetup.exe (PID: 3892)
      • ctfmon.exe (PID: 3724)
      • SearchIndexer.exe (PID: 2808)
      • TSWbPrxy.exe (PID: 3652)
      • wecutil.exe (PID: 4288)
      • SvcIni.exe (PID: 4276)
      • WsatConfig.exe (PID: 4092)
      • ODEPLOY.EXE (PID: 5040)
      • SearchFilterHost.exe (PID: 5708)
      • mshta.exe (PID: 4340)
      • conhost.exe (PID: 3764)
      • auditpol.exe (PID: 4956)
    • Reads the computer name

      • INSTALLER.exe (PID: 1292)
      • INSTALLER.exe (PID: 1664)
      • Bonzify.exe (PID: 4064)
      • AgentSvr.exe (PID: 2060)
      • wmpnscfg.exe (PID: 924)
      • wmpnscfg.exe (PID: 972)
      • WMIADAP.exe (PID: 1980)
      • DFDWiz.exe (PID: 3528)
      • CCleaner.exe (PID: 3944)
      • CCleaner.exe (PID: 1408)
      • aspnet_state.exe (PID: 2976)
      • wmpnscfg.exe (PID: 3200)
      • wiaacmgr.exe (PID: 1884)
      • dw20.exe (PID: 2904)
      • shrpubw.exe (PID: 1972)
      • WsatConfig.exe (PID: 2844)
      • msdt.exe (PID: 3332)
      • Microsoft.Workflow.Compiler.exe (PID: 2340)
      • lpksetup.exe (PID: 3892)
      • ctfmon.exe (PID: 3724)
      • TSWbPrxy.exe (PID: 3652)
      • WinMail.exe (PID: 4024)
      • wecutil.exe (PID: 4288)
      • WsatConfig.exe (PID: 4092)
      • auditpol.exe (PID: 4956)
    • Reads the machine GUID from the registry

      • AgentSvr.exe (PID: 2060)
      • Bonzify.exe (PID: 4064)
      • CCleaner.exe (PID: 1408)
      • CCleaner.exe (PID: 3944)
      • aspnet_state.exe (PID: 2976)
      • conhost.exe (PID: 3532)
      • wiaacmgr.exe (PID: 1884)
      • IEExec.exe (PID: 2348)
      • shrpubw.exe (PID: 1972)
      • dw20.exe (PID: 2904)
      • printui.exe (PID: 3132)
      • WsatConfig.exe (PID: 2844)
      • psxss.exe (PID: 4008)
      • msdt.exe (PID: 3332)
      • drvinst.exe (PID: 1020)
      • Microsoft.Workflow.Compiler.exe (PID: 2340)
      • conhost.exe (PID: 3380)
      • runonce.exe (PID: 2512)
      • FreeCell.exe (PID: 992)
      • lpksetup.exe (PID: 3892)
      • ctfmon.exe (PID: 3724)
      • WMIADAP.exe (PID: 3824)
      • TSWbPrxy.exe (PID: 3652)
      • WinMail.exe (PID: 4024)
      • WsatConfig.exe (PID: 4092)
      • conhost.exe (PID: 3764)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 924)
      • wmpnscfg.exe (PID: 972)
      • gpscript.exe (PID: 2328)
      • WMIADAP.exe (PID: 1980)
      • powercfg.exe (PID: 1484)
      • DFDWiz.exe (PID: 3528)
      • curl.exe (PID: 2284)
      • CCleaner.exe (PID: 3944)
      • ntoskrnl.exe (PID: 3740)
      • ntoskrnl.exe (PID: 2504)
      • CompatTelRunner.exe (PID: 3152)
      • wmpnscfg.exe (PID: 3200)
      • snmptrap.exe (PID: 3972)
      • wiaacmgr.exe (PID: 1884)
      • ntoskrnl.exe (PID: 2544)
      • msg.exe (PID: 3596)
      • ie4uinit.exe (PID: 1840)
      • iscsicli.exe (PID: 3812)
      • ntoskrnl.exe (PID: 1772)
      • WinMail.exe (PID: 4024)
      • ntvdm.exe (PID: 1992)
      • SearchIndexer.exe (PID: 2808)
      • TSWbPrxy.exe (PID: 3652)
      • setupsqm.exe (PID: 2872)
    • Reads Environment values

      • CCleaner.exe (PID: 3944)
      • CCleaner.exe (PID: 1408)
    • Reads CPU info

      • CCleaner.exe (PID: 1408)
      • runonce.exe (PID: 2512)
    • Reads product name

      • CCleaner.exe (PID: 1408)
    • Creates files in the program directory

      • CCleaner.exe (PID: 1408)
      • dw20.exe (PID: 2904)
    • Reads the software policy settings

      • CCleaner.exe (PID: 1408)
      • WsatConfig.exe (PID: 2844)
      • WsatConfig.exe (PID: 4092)
      • RMActivate.exe (PID: 5160)
    • Checks proxy server information

      • CCleaner.exe (PID: 1408)
    • Checks transactions between databases Windows and Oracle

      • dllhost.exe (PID: 3376)
      • msdtc.exe (PID: 1296)
      • lpksetup.exe (PID: 3892)
    • Process checks whether UAC notifications are on

      • psxss.exe (PID: 4008)
    • Reads the time zone

      • runonce.exe (PID: 2512)
    • Creates files or folders in the user directory

      • WinMail.exe (PID: 4024)
    • Reads security settings of Internet Explorer

      • RMActivate.exe (PID: 5160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 MS Cabinet Self-Extractor (WExtract stub) (86.7)
.exe | Win32 Executable MS Visual C++ (generic) (8.9)
.dll | Win32 Dynamic Link Library (generic) (1.8)
.exe | Win32 Executable (generic) (1.2)
.exe | Generic Win/DOS Executable (0.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:03:04 14:58:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 4096
InitializedDataSize: 6697472
UninitializedDataSize: -
EntryPoint: 0x16b0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
504
Monitored processes
127
Malicious processes
21
Suspicious processes
11

Behavior graph

Click at the process to see the details
start bonzify.exe cmd.exe no specs taskkill.exe no specs takeown.exe no specs icacls.exe no specs installer.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs agentsvr.exe no specs grpconv.exe no specs installer.exe regsvr32.exe no specs regsvr32.exe no specs grpconv.exe no specs agentsvr.exe wmpnscfg.exe no specs wmpnscfg.exe no specs dfdwiz.exe no specs curl.exe no specs gpscript.exe no specs wmiadap.exe no specs powercfg.exe no specs ntoskrnl.exe no specs ccleaner.exe no specs ccleaner.exe ntoskrnl.exe no specs osk.exe no specs setupsqm.exe no specs wininit.exe no specs compattelrunner.exe no specs cvtres.exe no specs aspnet_state.exe no specs wmpnscfg.exe no specs compattelrunner.exe no specs ieunatt.exe no specs dllhost.exe conhost.exe no specs snmptrap.exe no specs ntvdm.exe no specs qprocess.exe no specs autofmt.exe no specs ieexec.exe wiaacmgr.exe dllhost.exe no specs shrpubw.exe no specs dw20.exe xwizard.exe no specs printui.exe ksetup.exe no specs wsatconfig.exe no specs migwiz.exe no specs migsetup.exe no specs psxss.exe outlook.exe no specs rstrui.exe no specs wfs.exe no specs oarpmany.exe no specs msdt.exe no specs ntoskrnl.exe no specs autoconv.exe no specs timeout.exe no specs ie4uinit.exe no specs drvinst.exe no specs fxsunatd.exe no specs msg.exe no specs iscsicli.exe no specs microsoft.workflow.compiler.exe mtstocom.exe no specs msdtc.exe systempropertieshardware.exe no specs ntoskrnl.exe no specs ntkrnlpa.exe no specs wermgr.exe no specs makecab.exe no specs runonce.exe no specs conhost.exe alg.exe no specs imjppdmg.exe no specs freecell.exe no specs winmail.exe no specs printbrm.exe explorer.exe no specs lpksetup.exe smss.exe no specs ntvdm.exe no specs wmiadap.exe no specs winmgmt.exe no specs searchindexer.exe no specs ctfmon.exe no specs wmpconfig.exe no specs poqexec.exe no specs tswbprxy.exe wecutil.exe no specs hdwwiz.exe no specs raserver.exe no specs sc.exe no specs notepad.exe no specs lpksetup.exe locationnotifications.exe no specs hostname.exe no specs svcini.exe no specs iscsicpl.exe no specs rmactivate.exe no specs wsatconfig.exe no specs odeploy.exe no specs searchfilterhost.exe no specs wextract.exe no specs sbunattend.exe no specs ddodiag.exe no specs mshta.exe no specs winresume.exe no specs setupsnk.exe no specs runlegacycplelevated.exe no specs osk.exe no specs dccw.exe no specs wmiprvse.exe no specs auditpol.exe no specs conhost.exe atbroker.exe no specs charmap.exe no specs dllhost.exe no specs bonzify.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304regsvr32 /s "C:\Windows\msagent\AgentDP2.dll"C:\Windows\System32\regsvr32.exeINSTALLER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
524regsvr32 /s "C:\Windows\msagent\AgentSR.dll"C:\Windows\System32\regsvr32.exeINSTALLER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
660regsvr32 /s "C:\Windows\msagent\AgentMPx.dll"C:\Windows\System32\regsvr32.exeINSTALLER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
768regsvr32 /s C:\Windows\lhsp\tv\tvenuax.dllC:\Windows\System32\regsvr32.exeINSTALLER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
924"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
960"C:\Windows\System32\SystemPropertiesHardware.exe"C:\Windows\System32\SystemPropertiesHardware.exewiaacmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Hardware Settings
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\systempropertieshardware.exe
c:\windows\system32\ntdll.dll
972"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
992"C:\Windows\winsxs\x86_microsoft-windows-s..inboxgames-freecell_31bf3856ad364e35_6.1.7600.16385_none_58481bbdfe2e6164\FreeCell.exe"C:\Windows\winsxs\x86_microsoft-windows-s..inboxgames-freecell_31bf3856ad364e35_6.1.7600.16385_none_58481bbdfe2e6164\FreeCell.exewiaacmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Executable for FreeCell Game
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\winsxs\x86_microsoft-windows-s..inboxgames-freecell_31bf3856ad364e35_6.1.7600.16385_none_58481bbdfe2e6164\freecell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
1020taskkill /f /im AgentSvr.exeC:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1020"C:\Windows\winsxs\x86_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.21733_none_797c13b0a45ccd8c\drvinst.exe"C:\Windows\winsxs\x86_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.21733_none_797c13b0a45ccd8c\drvinst.exeprintui.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Driver Installation Module
Exit code:
5
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\winsxs\x86_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.21733_none_797c13b0a45ccd8c\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
36 356
Read events
33 099
Write events
3 219
Delete events
38

Modification events

(PID) Process:(1292) INSTALLER.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.app.log
Value:
4096
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\Control
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\MiscStatus\1
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\MiscStatus
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\ProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\Programmable
Operation:delete keyName:(default)
Value:
(PID) Process:(2304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\ToolboxBitmap32
Operation:delete keyName:(default)
Value:
Executable files
55
Suspicious files
23
Text files
11
Unknown types
3

Dropped files

PID
Process
Filename
Type
4064Bonzify.exeC:\Users\admin\AppData\Local\Temp\TakeOwn.battext
MD5:F80E36CD406022944558D8A099DB0FA7
SHA256:7B41E5A6C2DD92F60C38CB4FE09DCBE378C3E99443F7BAF079ECE3608497BDC7
4064Bonzify.exeC:\Windows\executables.binbinary
MD5:F3160BA7F8BB9D7A9C6080EF2C9869C5
SHA256:F6A3286714A661612EAC65E4A6CB78736C370492151B692A8F1E666740C0A00E
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGENTDP2.DLLexecutable
MD5:A334BBF5F5A19B3BDB5B7F1703363981
SHA256:C33BEABA130F8B740DDDB9980FE9012F9322AC6E94F36A6AA6086851C51B98DE
4064Bonzify.exeC:\Users\admin\AppData\Local\Temp\INSTALLER.exeexecutable
MD5:66996A076065EBDCDAC85FF9637CEAE0
SHA256:16CA09AD70561F413376AD72550AE5664C89C6A76C85C872FFE2CB1E7F49E2AA
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGENTANM.DLLexecutable
MD5:48C00A7493B28139CBF197CCC8D1F9ED
SHA256:905CB1A15ECCAA9B79926EE7CFE3629A6F1C6B24BDD6CEA9CCB9EBC9EAA92FF7
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGT0409.HLPhlp
MD5:466D35E6A22924DD846A043BC7DD94B8
SHA256:E4CCF06706E68621BB69ADD3DD88FED82D30AD8778A55907D33F6D093AC16801
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGENTPSH.DLLexecutable
MD5:B4AC608EBF5A8FDEFA2D635E83B7C0E8
SHA256:8414DFE399813B7426C235BA1E625BD2B5635C8140DA0D0CFC947F6565FE415F
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\MSLWVTTS.DLLexecutable
MD5:316999655FEF30C52C3854751C663996
SHA256:EA4CA740CD60D2C88280FF8115BF354876478EF27E9E676D8B66601B4E900BA0
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGT0409.DLLexecutable
MD5:0CBF0F4C9E54D12D34CD1A772BA799E1
SHA256:6B0B57E5B27D901F4F106B236C58D0B2551B384531A8F3DAD6C06ED4261424B1
1292INSTALLER.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\AGENTSR.DLLexecutable
MD5:9FAFB9D0591F2BE4C2A846F63D82D301
SHA256:E78E74C24D468284639FAF9DCFDBA855F3E4F00B2F26DB6B2C491FA51DA8916D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
15
DNS requests
11
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1408
CCleaner.exe
GET
200
23.219.78.200:80
http://ncc.avast.com/ncc.txt
unknown
unknown
1408
CCleaner.exe
GET
304
23.219.78.213:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0790c116bb36ff43
unknown
unknown
1408
CCleaner.exe
GET
304
23.219.78.213:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d1ba94d7dfb08484
unknown
unknown
1408
CCleaner.exe
GET
304
23.219.78.213:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d168d2dda013a763
unknown
unknown
1408
CCleaner.exe
GET
304
23.219.78.213:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?be239ad867a0275f
unknown
unknown
2748
SETUP.EXE
GET
200
23.219.78.201:80
http://crl.microsoft.com/pki/crl/products/CSPCA.crl
unknown
unknown
284
RMActivate.exe
GET
200
23.219.78.201:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
unknown
728
RMActivate_isv.exe
GET
200
184.25.228.216:80
http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
unknown
224.0.0.252:5355
unknown
1408
CCleaner.exe
23.219.78.200:80
ncc.avast.com
CLARO S.A.
BR
unknown
1408
CCleaner.exe
34.117.223.223:443
analytics.ff.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1408
CCleaner.exe
34.149.149.62:443
ip-info.ff.avast.com
GOOGLE
US
unknown
1408
CCleaner.exe
34.160.176.28:443
shepherd.ff.avast.com
GOOGLE
US
unknown
1408
CCleaner.exe
34.111.24.1:443
ipm-provider.ff.avast.com
GOOGLE
US
unknown
1408
CCleaner.exe
184.25.211.189:443
www.ccleaner.com
Akamai International B.V.
US
unknown
1408
CCleaner.exe
23.219.78.213:80
ctldl.windowsupdate.com
CLARO S.A.
BR
unknown

DNS requests

Domain
IP
Reputation
ncc.avast.com
  • 23.219.78.200
  • 23.219.78.205
whitelisted
analytics.ff.avast.com
  • 34.117.223.223
whitelisted
ip-info.ff.avast.com
  • 34.149.149.62
whitelisted
shepherd.ff.avast.com
  • 34.160.176.28
whitelisted
ipm-provider.ff.avast.com
  • 34.111.24.1
whitelisted
www.ccleaner.com
  • 184.25.211.189
whitelisted
ctldl.windowsupdate.com
  • 23.219.78.213
  • 23.219.78.199
whitelisted
crl.microsoft.com
  • 23.219.78.201
  • 23.219.78.206
whitelisted
www.microsoft.com
  • 184.25.228.216
whitelisted

Threats

PID
Process
Class
Message
1088
svchost.exe
Misc activity
ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com)
1408
CCleaner.exe
Misc activity
ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI
Process
Message
AgentSvr.exe
ClaimOutput
AgentSvr.exe
UnclaimOutput
AgentSvr.exe
ClaimOutput
AgentSvr.exe
UnclaimOutput
AgentSvr.exe
ClaimOutput
AgentSvr.exe
UnclaimOutput
AgentSvr.exe
ClaimOutput
AgentSvr.exe
UnclaimOutput
AgentSvr.exe
ClaimOutput
AgentSvr.exe
ClaimOutput