| File name: | HorrorTrojan4.exe |
| Full analysis: | https://app.any.run/tasks/9cb7ff80-1169-433a-834d-f9d957e6e2a0 |
| Verdict: | Malicious activity |
| Analysis date: | February 16, 2024, 00:18:21 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | 776C50B8E115FA57E9BD1A52E39D486C |
| SHA1: | EDC9CFC9FF7370F006AEBF6DEB9605F7F859153C |
| SHA256: | DF5716773A8C3E09D24C62B738D33FC40D6B74590F03A269FB40521946CE832F |
| SSDEEP: | 98304:64po9x1PWEN0GpV62sYrx5bCAKP6FPqCYUjLXLaqRDX0jzoLJ+zvVTBLYGr34zVi:P |
| .exe | | | UPX compressed Win32 Executable (39.3) |
|---|---|---|
| .exe | | | Win32 EXE Yoda's Crypter (38.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (9.5) |
| .exe | | | Win32 Executable (generic) (6.5) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:11:08 13:12:07+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 2727936 |
| InitializedDataSize: | 208896 |
| UninitializedDataSize: | 5091328 |
| EntryPoint: | 0x774e90 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.0.0.0 |
| ProductVersionNumber: | 4.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug, Pre-release, Private build |
| FileOS: | Windows 16-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | HorrorTrojans |
| FileDescription: | Please Don't run this file |
| FileVersion: | 4,0,0,0 |
| ProductName: | HorrorTrojan 4.0 |
| InternalName: | Horror |
| ProductVersion: | 4,0,0,0 |
| LegalCopyright: | 2021 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\9A0.tmp\1.vbs" | C:\Windows\System32\wscript.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 240 | scream.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\scream.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1112 | scream.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\scream.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 1073807364 Modules
| |||||||||||||||
| 1116 | C:\Windows\system32\sipnotify.exe -LogonOrUnlock | C:\Windows\System32\sipnotify.exe | taskeng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: sipnotify Exit code: 0 Version: 6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716) Modules
| |||||||||||||||
| 1512 | C:\Windows\System32\ctfmon.exe | C:\Windows\System32\ctfmon.exe | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: CTF Loader Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1560 | scream.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\scream.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1572 | scream.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\scream.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 1073807364 Modules
| |||||||||||||||
| 1576 | net user admin /fullname:"YOU ARE VERY DOOMED" | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1740 | takeown /f C:\Windows\system32\taskmgr.exe | C:\Windows\System32\takeown.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Takes ownership of a file Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1768 | C:\Windows\system32\net1 user admin /fullname:"YOU ARE VERY DOOMED" | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2848) HorrorTrojan4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2848) HorrorTrojan4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2848) HorrorTrojan4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2848) HorrorTrojan4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3848) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3848) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3848) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3848) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3500) reg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | DisableTaskMgr |
Value: 1 | |||
| (PID) Process: | (3956) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Windows System Update Service |
Value: C:\SystemLoaderPRO.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2848 | HorrorTrojan4.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\bg.bmp | — | |
MD5:— | SHA256:— | |||
| 3848 | cmd.exe | C:\bg.bmp | — | |
MD5:— | SHA256:— | |||
| 2316 | MBRKill.exe | \Device\Harddisk0\DR0 | — | |
MD5:— | SHA256:— | |||
| 3848 | cmd.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\1.vbs | text | |
MD5:B0108A49C743B8E07752E9666BEBFF84 | SHA256:35C22FE4267A0E69977A9ACC1B71E19DE0E00E67C776DA63941E72D0B67BE43B | |||
| 2848 | HorrorTrojan4.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\prompt.vbs | text | |
MD5:75B3FB717D34E175A500E2EB19EED705 | SHA256:8981B0A442482F5F3448F0F2012181F6A77937EC7189AA12726AE41CA4D098B4 | |||
| 2156 | SystemLoaderPRO.exe | C:\Users\admin\AppData\Local\Temp\4769.tmp\scream.exe | executable | |
MD5:941322C1B14DDBAB9D6C45B38BBA7F57 | SHA256:40E370CE6712DF1A6E18DA3BEF6C7E8496243E1E3EB099851A78BD5F39D8BF1A | |||
| 2848 | HorrorTrojan4.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\scream.exe | executable | |
MD5:941322C1B14DDBAB9D6C45B38BBA7F57 | SHA256:40E370CE6712DF1A6E18DA3BEF6C7E8496243E1E3EB099851A78BD5F39D8BF1A | |||
| 2848 | HorrorTrojan4.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\SystemLoaderPRO.exe | executable | |
MD5:219032DD6347D5FDBB82647FDFC207A0 | SHA256:C8F4D4891618F8905BA7395640E7124575AA627A7F89ADC66F22E365A1AD48D1 | |||
| 2848 | HorrorTrojan4.exe | C:\Users\admin\AppData\Local\Temp\9A0.tmp\horror4.bat | text | |
MD5:AFDC1968CD160869457D74921ADE999E | SHA256:6DAE624DE9EAD7FCC43795096D1F5C51FF60307AE9BDD6833E7D080D896474E7 | |||
| 2156 | SystemLoaderPRO.exe | C:\Users\admin\AppData\Local\Temp\4769.tmp\beeper.exe | executable | |
MD5:8D1A9C2E8D53425499F3A1853D2E0910 | SHA256:1D89BD45A36DD300A250292CACF22A7BEFF3CFE0DFDDAB0D7B77C3C260032131 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1116 | sipnotify.exe | HEAD | 200 | 23.7.136.68:80 | http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133525163598120000 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1124 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1452 | svchost.exe | 239.255.255.250:3702 | — | — | — | unknown |
1116 | sipnotify.exe | 23.7.136.68:80 | query.prod.cms.rt.microsoft.com | AKAMAI-AS | US | unknown |
Domain | IP | Reputation |
|---|---|---|
query.prod.cms.rt.microsoft.com |
| whitelisted |