File name:

dinocapture2.exe

Full analysis: https://app.any.run/tasks/bb73bbe8-24dd-4cbc-a2a6-3f30071f8dcf
Verdict: Malicious activity
Analysis date: February 13, 2024, 03:42:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D1E92E86FE6F2D23F6040F576245B9D1

SHA1:

18266486D6636E6C41A693F7C9082E2ED7E07205

SHA256:

D81AC94F7268EE0423B0758D75D6781C1F9CB838F1C2F5B30761AB87D010F572

SSDEEP:

393216:s0ot40AMRDL8IuETVZzbPMNDaJLmS8doyon40yueLprOWJ3BCdoaA4:e40pL8IucVZsEL4W40yTFRe3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • dinocapture2.exe (PID: 2964)
      • Edge3Driver.exe (PID: 2648)
      • Edge3Driver.tmp (PID: 2232)
      • setup.exe (PID: 3944)
    • Creates a writable file in the system directory

      • Edge3Driver.tmp (PID: 2232)
      • setup.exe (PID: 3944)
  • SUSPICIOUS

    • Searches for installed software

      • dinocapture2.exe (PID: 2964)
      • setup.exe (PID: 3944)
    • Executable content was dropped or overwritten

      • dinocapture2.exe (PID: 2964)
      • setup.exe (PID: 3944)
      • Edge3Driver.exe (PID: 2648)
      • Edge3Driver.tmp (PID: 2232)
    • Process drops legitimate windows executable

      • setup.exe (PID: 3944)
    • Reads the Windows owner or organization settings

      • setup.exe (PID: 3944)
      • Edge3Driver.tmp (PID: 2232)
    • The process drops C-runtime libraries

      • setup.exe (PID: 3944)
    • Drops a system driver (possible attempt to evade defenses)

      • Edge3Driver.tmp (PID: 2232)
    • Creates files in the driver directory

      • Edge3Driver.tmp (PID: 2232)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2112)
      • cmd.exe (PID: 980)
      • cmd.exe (PID: 3544)
      • cmd.exe (PID: 2772)
      • cmd.exe (PID: 568)
      • cmd.exe (PID: 712)
      • cmd.exe (PID: 2336)
      • cmd.exe (PID: 2468)
      • cmd.exe (PID: 128)
      • cmd.exe (PID: 1544)
      • cmd.exe (PID: 2128)
      • cmd.exe (PID: 3800)
      • cmd.exe (PID: 1792)
      • cmd.exe (PID: 840)
      • cmd.exe (PID: 2588)
      • cmd.exe (PID: 1596)
      • cmd.exe (PID: 3980)
    • Starts CMD.EXE for commands execution

      • DinoCapture.exe (PID: 2260)
    • Creates a software uninstall entry

      • setup.exe (PID: 3944)
    • Creates/Modifies COM task schedule object

      • setup.exe (PID: 3944)
  • INFO

    • Create files in a temporary directory

      • dinocapture2.exe (PID: 2964)
      • setup.exe (PID: 3944)
      • Edge3Driver.exe (PID: 2648)
      • DinoCapture.exe (PID: 2260)
    • Checks supported languages

      • dinocapture2.exe (PID: 2964)
      • setup.exe (PID: 3944)
      • Edge3Driver.exe (PID: 2648)
      • Edge3Driver.tmp (PID: 2232)
      • install-filter.exe (PID: 4000)
      • DinoCapture.exe (PID: 2260)
      • systeminfo.exe (PID: 2020)
      • install-filter.exe (PID: 3996)
      • wmpnscfg.exe (PID: 3040)
    • Reads the computer name

      • dinocapture2.exe (PID: 2964)
      • setup.exe (PID: 3944)
      • Edge3Driver.tmp (PID: 2232)
      • install-filter.exe (PID: 3996)
      • DinoCapture.exe (PID: 2260)
      • install-filter.exe (PID: 4000)
      • wmpnscfg.exe (PID: 3040)
      • systeminfo.exe (PID: 2020)
    • Reads the machine GUID from the registry

      • setup.exe (PID: 3944)
      • systeminfo.exe (PID: 2020)
    • Creates files in the program directory

      • setup.exe (PID: 3944)
      • Edge3Driver.tmp (PID: 2232)
      • DinoCapture.exe (PID: 2260)
    • Creates a software uninstall entry

      • Edge3Driver.tmp (PID: 2232)
    • Manual execution by a user

      • DinoCapture.exe (PID: 2260)
      • wmpnscfg.exe (PID: 3040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ax | DirectShow filter (47.1)
.exe | Win32 EXE PECompact compressed (v2.x) (13.8)
.exe | Win32 EXE PECompact compressed (generic) (9.7)
.exe | Win32 Executable (generic) (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:07:27 12:02:44+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 705536
InitializedDataSize: 487424
UninitializedDataSize: -
EntryPoint: 0x5e61f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.5.48.0
ProductVersionNumber: 1.5.48.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: AnMo Electronics Corporation
FileDescription: InstallScript Setup Launcher Unicode
FileVersion: 1.5.48.C
InternalName: Setup
LegalCopyright: Copyright (c) 2015 Flexera Software LLC. All Rights Reserved.
OriginalFileName: InstallShield Setup.exe
ProductName: DinoCapture 2.0
ProductVersion: 1.5.48.C
InternalBuildNumber: 176888
ISInternalVersion: 22.0.401
ISInternalDescription: InstallScript Setup Launcher Unicode
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
112
Monitored processes
46
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dinocapture2.exe setup.exe edge3driver.exe edge3driver.tmp install-filter.exe no specs install-filter.exe no specs rundll32.exe no specs dinocapture.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs systeminfo.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs wmpnscfg.exe no specs dinocapture2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128cmd.exe /c REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p3c /t REG_SZ /d "?A" /fC:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
532REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p1c /t REG_SZ /d "?A" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
568cmd.exe /c REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p0y /t REG_SZ /d 0 /fC:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
680cmd.exe /c systeminfo.exe > "C:\Users\admin\Documents\Digital Microscope\Setting\systeminfo.txt"C:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
712cmd.exe /c REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p1y /t REG_SZ /d 0 /fC:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
840cmd.exe /c REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p1c /t REG_SZ /d "?A" /fC:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
920REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p0y /t REG_SZ /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
980cmd.exe /c REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v MultiUser /t REG_SZ /d 1 /fC:\Windows\System32\cmd.exeDinoCapture.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1124REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p3c /t REG_SZ /d "?A" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1264REG ADD "HKLM\SOFTWARE\DinoCapture 2.0" /v p2y /t REG_SZ /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 759
Read events
5 674
Write events
74
Delete events
11

Modification events

(PID) Process:(3944) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
Operation:delete valueName:%IS_PREREQ%-DinoCapture 2.0
Value:
(PID) Process:(3944) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
Operation:delete valueName:%IS_PREREQF%-DinoCapture 2.0
Value:
(PID) Process:(3944) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName: ISSetupPrerequisistes
Value:
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Eye4Software\GpsToolkit
Operation:writeName:RegistrationKey
Value:
VN37M6CSH41IH1WC
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:SNP2STD
Value:
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\SONIX\PCCAM\SNP2STD
Operation:delete valueName:DisplaySelection
Value:
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLinkedConnections
Value:
1
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DinoCapture 2.0
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Common Files\Dnc2\DinoCapture.ico
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DinoCapture 2.0
Operation:writeName:DisplayName
Value:
DinoCapture 2.0
(PID) Process:(3944) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DinoCapture 2.0
Operation:writeName:DisplayVersion
Value:
1.5.48.C
Executable files
194
Suspicious files
40
Text files
212
Unknown types
5

Dropped files

PID
Process
Filename
Type
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x040a.initext
MD5:E1FA2AFAB71A41C7BA7701383F38343D
SHA256:ADA071BC2382D0532E19DBBF69DAC595E4631F8BAB5871E13CE9C8BB81E20436
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0407.initext
MD5:127FB89921BFC43F17F1ED878E7A2458
SHA256:2935484F7B2A0E4FC5881D7ED1B4AB2A7B20A3DBB4F7DC4DFC231F8AC4E61D53
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0405.initext
MD5:AAFAB4AEA779955690D68EF2F8DF1009
SHA256:61211492E1AC058A4CED5BBF4FE026F39E60E50E7FE66D575E1D006E83F3D45C
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x040e.initext
MD5:BB631A8BD94C2BDE52A4C14DB0247132
SHA256:1FBE4D091B1B6D433E7F67EA43D7C13C66C2A8981212F7FD951D33D0E6F1FBB2
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x040b.initext
MD5:3815A8D4C6AE886C5FF7A2034E04B59E
SHA256:D35CD8E4C6FA02F8A743923F65BC14BA7B886BA0175A614B71B60AFE6432B925
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0404.initext
MD5:D2375044346BA50DD1E3F1208185FD0E
SHA256:CDDB0BBF712C57ACC6B8AD2D20514B25331A93FD1B95C1A2155C2F670A5C5CEA
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0406.initext
MD5:8AA9E8A4101DBFB50432E94F087C717A
SHA256:B3AD2FE3238F8D2A6B2CDF9435FB628D0BECCC1904D6C319AEB0ABFF48FF733D
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\data1.cab
MD5:
SHA256:
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0409.initext
MD5:8586214463BD73E1C2716113E5BD3E13
SHA256:089D3068E42958DD2C0AEC668E5B7E57B7584ACA5C77132B1BCBE3A1DA33EF54
2964dinocapture2.exeC:\Users\admin\AppData\Local\Temp\{93C9BF8F-DB71-4946-B511-B84D5E94CBBC}\Disk1\0x0418.initext
MD5:7EF0FBA61B6604C2A8CDE22A5FA42C83
SHA256:6570FBCA8581E3907902A835FAD97BE5DDB2F5A76A34B1682B8B146142247DA3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info