analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

screenrecorder_8f3b3b68.exe

Full analysis: https://app.any.run/tasks/33918204-1dd6-4cff-937d-57b26c85fef1
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: March 06, 2020, 09:19:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D24600160AA9E5729B2F6BC35A510CBC

SHA1:

D7D21EC36F321A7168E72375797D11CF9B714C1A

SHA256:

DF41F7A58DEDF5DDE4921485977C265A77C81A6B125B1B8609B9B025158BAC86

SSDEEP:

24576:6KQ8WgNLfz1oCp6Teyae/sddDo/C+VyLAgSv8bNimsedQuZjqCQ5:jQsFzz6TeVcsTo/C+V8neuhnq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • screenrecorder_8f3b3b68.exe (PID: 2500)
    • Application was dropped or rewritten from another process

      • Jnz.exe (PID: 3580)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • screenrecorder_8f3b3b68.exe (PID: 2500)
    • Creates files in the user directory

      • screenrecorder_8f3b3b68.exe (PID: 2500)
    • Executable content was dropped or overwritten

      • screenrecorder_8f3b3b68.exe (PID: 2500)
    • Connects to unusual port

      • Jnz.exe (PID: 3580)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

SpecialBuild: 3.5.14.146
ProductVersion: 3.5.14.146
ProductName: 嗨格式录屏大师
PrivateBuild: 3.5.14.146
OriginalFileName: hilpds.exe
LegalCopyright: 开心盒子软件 (C) 2020
InternalName: 嗨格式录屏大师
FileVersion: 3.5.14.146
FileDescription: 嗨格式录屏大师
CompanyName: 苏州开心盒子软件有限公司
Comments: hilpds.exe
CharacterSet: Unicode
LanguageCode: Chinese (Simplified)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: Private build, Special build
FileFlagsMask: 0x003f
ProductVersionNumber: 3.5.14.146
FileVersionNumber: 3.5.14.146
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 5
EntryPoint: 0x33d6b
UninitializedDataSize: -
InitializedDataSize: 839168
CodeSize: 346624
LinkerVersion: 9
PEType: PE32
TimeStamp: 2020:02:28 11:08:04+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 28-Feb-2020 10:08:04
Detected languages:
  • Chinese - PRC
Debug artifacts:
  • E:\BasePlatform\tags\SDK_53\Installer_butterfly\HIRECORDER\hilpds.pdb
Comments: hilpds.exe
CompanyName: 苏州开心盒子软件有限公司
FileDescription: 嗨格式录屏大师
FileVersion: 3.5.14.146
InternalName: 嗨格式录屏大师
LegalCopyright: 开心盒子软件 (C) 2020
OriginalFilename: hilpds.exe
PrivateBuild: 3.5.14.146
ProductName: 嗨格式录屏大师
ProductVersion: 3.5.14.146
SpecialBuild: 3.5.14.146

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 28-Feb-2020 10:08:04
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000548D1
0x00054A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.62041
.rdata
0x00056000
0x000113CE
0x00011400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.29653
.data
0x00068000
0x0000491C
0x00002800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.85078
.rsrc
0x0006D000
0x000B12E0
0x000B1400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.89228
.reloc
0x0011F000
0x00005A8A
0x00005C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
5.23666

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.87405
392
UNKNOWN
Chinese - PRC
RT_MANIFEST
2
3.97888
2920
UNKNOWN
Chinese - PRC
RT_ICON
3
3.86976
5160
UNKNOWN
Chinese - PRC
RT_ICON
4
3.77658
11560
UNKNOWN
Chinese - PRC
RT_ICON
5
3.67664
20520
UNKNOWN
Chinese - PRC
RT_ICON
6
7.98792
53747
UNKNOWN
Chinese - PRC
RT_ICON
102
2.75765
90
UNKNOWN
Chinese - PRC
RT_GROUP_ICON
103
7.89831
127181
UNKNOWN
Chinese - PRC
BINARYSYSTEM
105
7.99777
501275
UNKNOWN
Chinese - PRC
BINARYSYSTEM

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
WINMM.dll
WS2_32.dll
gdiplus.dll
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start screenrecorder_8f3b3b68.exe no specs screenrecorder_8f3b3b68.exe jnz.exe

Process information

PID
CMD
Path
Indicators
Parent process
3000"C:\Users\admin\AppData\Local\Temp\screenrecorder_8f3b3b68.exe" C:\Users\admin\AppData\Local\Temp\screenrecorder_8f3b3b68.exeexplorer.exe
User:
admin
Company:
苏州开心盒子软件有限公司
Integrity Level:
MEDIUM
Description:
嗨格式录屏大师
Exit code:
3221226540
Version:
3.5.14.146
2500"C:\Users\admin\AppData\Local\Temp\screenrecorder_8f3b3b68.exe" C:\Users\admin\AppData\Local\Temp\screenrecorder_8f3b3b68.exe
explorer.exe
User:
admin
Company:
苏州开心盒子软件有限公司
Integrity Level:
HIGH
Description:
嗨格式录屏大师
Version:
3.5.14.146
3580"C:\Users\admin\AppData\Roaming\AuntecPkg\Jnz\Jnz.exe" -n 2D28A83C-7F18-4960-8FFC-16364F08E0EE -s 65536 -p 2500C:\Users\admin\AppData\Roaming\AuntecPkg\Jnz\Jnz.exe
screenrecorder_8f3b3b68.exe
User:
admin
Company:
苏州开心盒子软件有限公司
Integrity Level:
HIGH
Description:
Jnz Executable File
Version:
1, 0, 0, 1
Total events
18
Read events
15
Write events
3
Delete events
0

Modification events

(PID) Process:(2500) screenrecorder_8f3b3b68.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\{71162BF7C2071D480629AF113CF0EB2D}\Collect
Operation:writeName:MID
Value:
af8614516b5ab4a3f780dcfab88d21ff
(PID) Process:(2500) screenrecorder_8f3b3b68.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\{71162BF7C2071D480629AF113CF0EB2D}\Collect
Operation:writeName:GUID
Value:
61A345B2-7D42-414D-AE91-A2A425BFEDEC
(PID) Process:(2500) screenrecorder_8f3b3b68.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\{71162BF7C2071D480629AF113CF0EB2D}\Collect
Operation:writeName:TIME
Value:
1583486382
Executable files
2
Suspicious files
2
Text files
86
Unknown types
0

Dropped files

PID
Process
Filename
Type
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_browse_click.pngimage
MD5:17FADC897F7906958A3B9EACE151C2EC
SHA256:962555C40E15EC3FCE97ECB9D6B2B0888927345C3534CBC8FD5602FA675CC2EB
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_bg.pngimage
MD5:B3E2AD4396E791B214453AEBEE062195
SHA256:45208C30132565B25E88C384A2E3AA3CF7FEF84C80CA68CCEB99908AC1A496B7
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_install_disable.pngimage
MD5:DF3E9F406D56FB0387B2EF87BEF0541F
SHA256:EEB3284E2BDC05D1EED5E882532427687E931FA5556FCDAE42EA70EFAB8C9B34
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_back_normal.pngimage
MD5:221761C580DD5354CA455D246BC24E0A
SHA256:E68D24D12505F0FE55A270A6C4D77F9F652F3C360086F75CA674C6FFB32A595A
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_install_normal.pngimage
MD5:DA1677FFF7F01597172F50C934D263DD
SHA256:D65397B7576EF9179AC3D4ABE6A917AB3BB6A4CB32E4566FA0BA7E13CFB1078C
2500screenrecorder_8f3b3b68.exeC:\Users\admin\AppData\Roaming\AuntecPkg\Jnz\Jnz.exeexecutable
MD5:267FB4A3EB3540F49E2ED5A464B83DA9
SHA256:C4FFE5001910C5630CEB50BEEC3D8898EABC36A99FCA49759D8BF76018D8E701
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_checkbox_select.pngimage
MD5:F8FA7DB5CEF451AE030ADF2169EBC786
SHA256:43D1AD635DEA99AAD5BDC339E121FDCC8510CA006F84E5ED96B5484C11CCC0D9
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_back_hover.pngimage
MD5:5A22CBD50A9D5AD6BB24E8F84879D46F
SHA256:639112171D3DD9EE53EC8970FC93EB11AE06F44B2B0DADE902BA82A51EA93C9E
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_word_available.pngimage
MD5:BB194B30FBD94EA48B8423A67BC36E38
SHA256:F4DA14F2E3B3294602D743940206775BB41066C9073BC7273586FAEBD5BCD4AA
2500screenrecorder_8f3b3b68.exeC:\AuntecPkg_1583486382\images\custom_btn_browse_hover.pngimage
MD5:11D031DE05D9C2E5665890B79B0FBBA4
SHA256:65FD9EC67FE1E93D60169880F8FBBE99E11404B51C6FEFA5D24599312DBD392F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
16
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2500
screenrecorder_8f3b3b68.exe
HEAD
200
125.77.142.171:80
http://cdn-desktop-oss.aunbox.cn/screenrecorder/software/1.1.22.133/install.exe
CN
malicious
3580
Jnz.exe
POST
200
47.98.172.50:8106
http://sa.aunload.com:8106/sa?project=production
CN
unknown
3580
Jnz.exe
POST
101.37.111.213:80
http://support.aunapi.com/v1/log/function-log
CN
malicious
3580
Jnz.exe
POST
101.37.111.213:80
http://support.aunapi.com/v1/log/function-log
CN
malicious
2500
screenrecorder_8f3b3b68.exe
POST
200
101.37.111.213:80
http://support.aunapi.com/v1.1/installer/package/index
CN
text
747 b
malicious
2500
screenrecorder_8f3b3b68.exe
GET
125.77.142.171:80
http://cdn-desktop-oss.aunbox.cn/screenrecorder/software/1.1.22.133/install.exe
CN
malicious
3580
Jnz.exe
POST
200
101.37.111.213:80
http://support.aunapi.com/v1/log/function-log
CN
text
33 b
malicious
3580
Jnz.exe
POST
200
101.37.111.213:80
http://support.aunapi.com/v1/log/function-log
CN
text
33 b
malicious
3580
Jnz.exe
POST
200
101.37.111.213:80
http://support.aunapi.com/v1/report/install
CN
text
33 b
malicious
3580
Jnz.exe
POST
200
101.37.111.213:80
http://support.aunapi.com/v1/log/user-operate
CN
text
33 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2500
screenrecorder_8f3b3b68.exe
125.77.142.171:80
cdn-desktop-oss.aunbox.cn
No.31,Jin-rong Street
CN
malicious
3580
Jnz.exe
101.37.111.213:80
support.aunapi.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious
3580
Jnz.exe
47.98.172.50:8106
sa.aunload.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
2500
screenrecorder_8f3b3b68.exe
101.37.111.213:80
support.aunapi.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious

DNS requests

Domain
IP
Reputation
support.aunapi.com
  • 101.37.111.213
malicious
sa.aunload.com
  • 47.98.172.50
unknown
cdn-desktop-oss.aunbox.cn
  • 125.77.142.171
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
2500
screenrecorder_8f3b3b68.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
2500
screenrecorder_8f3b3b68.exe
Potential Corporate Privacy Violation
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
2500
screenrecorder_8f3b3b68.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.
2500
screenrecorder_8f3b3b68.exe
A Network Trojan was detected
ET TROJAN GENERIC Likely Malicious Fake IE Downloading .exe
3580
Jnz.exe
Misc activity
ADWARE [PTsecurity] Kunshan Aunbox software
No debug info