File name: | epm.exe.malware |
Full analysis: | https://app.any.run/tasks/9689c938-e471-43a8-a047-4b76ef4ccca3 |
Verdict: | Malicious activity |
Analysis date: | November 08, 2018, 14:37:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 2604E3D6F11CE5D77E3FF6373A431A00 |
SHA1: | 36F0F30412AC9B9D2109962C0105C8A21AC020C3 |
SHA256: | E11F754D7722D2AEB155466AB9CCF216007096F18E9B6C3A81E980F795064BA0 |
SSDEEP: | 49152:SaZF8oh458aTnPwFeHjtwVjPOJ2a+5lz5oCJHN3+FnxJL:/v8om5RQVTJael1R910nnL |
.exe | | | Inno Setup installer (81.5) |
---|---|---|
.exe | | | Win32 Executable Delphi generic (10.5) |
.exe | | | Win32 Executable (generic) (3.3) |
.exe | | | Win16/32 Executable Delphi generic (1.5) |
.exe | | | Generic Win/DOS Executable (1.4) |
ProductVersion: | 1.8 |
---|---|
ProductName: | Hetoh |
LegalCopyright: | |
FileVersion: | |
FileDescription: | Hetoh Setup |
CompanyName: | |
Comments: | This installation was built with Inno Setup. |
CharacterSet: | Unicode |
LanguageCode: | Neutral |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Win32 |
FileFlags: | (none) |
FileFlagsMask: | 0x003f |
ProductVersionNumber: | 0.0.0.0 |
FileVersionNumber: | 0.0.0.0 |
Subsystem: | Windows GUI |
SubsystemVersion: | 4 |
ImageVersion: | 6 |
OSVersion: | 1 |
EntryPoint: | 0xa5f8 |
UninitializedDataSize: | - |
InitializedDataSize: | 25600 |
CodeSize: | 40448 |
LinkerVersion: | 2.25 |
PEType: | PE32 |
TimeStamp: | 1992:06:20 00:22:17+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 19-Jun-1992 22:22:17 |
Detected languages: |
|
Comments: | This installation was built with Inno Setup. |
CompanyName: | - |
FileDescription: | Hetoh Setup |
FileVersion: | - |
LegalCopyright: | - |
ProductName: | Hetoh |
ProductVersion: | 1.8 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0050 |
Pages in file: | 0x0002 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x000F |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x001A |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 19-Jun-1992 22:22:17 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 0x00001000 | 0x00009D30 | 0x00009E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.6048 |
DATA | 0x0000B000 | 0x00000250 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.75472 |
BSS | 0x0000C000 | 0x00000E90 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x0000D000 | 0x00000950 | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.43073 |
.tls | 0x0000E000 | 0x00000008 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0000F000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0.204488 |
.reloc | 0x00010000 | 0x000008C4 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0 |
.rsrc | 0x00011000 | 0x000053F4 | 0x00005400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 5.42502 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.13965 | 1580 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 5.02748 | 4264 | Latin 1 / Western European | UNKNOWN | RT_ICON |
3 | 5.02913 | 9640 | Latin 1 / Western European | UNKNOWN | RT_ICON |
4089 | 3.21823 | 754 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4090 | 3.31515 | 780 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4091 | 3.25024 | 718 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4093 | 2.86149 | 104 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4094 | 3.20731 | 180 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4095 | 3.04592 | 174 | Latin 1 / Western European | UNKNOWN | RT_STRING |
11111 | 4.61354 | 44 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
advapi32.dll |
comctl32.dll |
kernel32.dll |
oleaut32.dll |
user32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3912 | "C:\Users\admin\AppData\Local\Temp\epm.exe.malware.exe" | C:\Users\admin\AppData\Local\Temp\epm.exe.malware.exe | — | explorer.exe |
User: admin Company: Integrity Level: MEDIUM Description: Hetoh Setup Exit code: 0 Version: | ||||
1320 | "C:\Users\admin\AppData\Local\Temp\epm.exe.malware.exe" /RSF /ppn:YyhwYgxaFRAiP211FM5W /mnl | C:\Users\admin\AppData\Local\Temp\epm.exe.malware.exe | epm.exe.malware.exe | |
User: admin Company: Integrity Level: HIGH Description: Hetoh Setup Exit code: 0 Version: | ||||
3628 | /d /c TIMEOUT 1 & cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D48420095553501.dat"+"C:\Users\admin\AppData\Local\Temp\D48420095553502.dat" "C:\Users\admin\AppData\Local\Temp\in2C8A3B3E\09367DE5_stp\SETUP.exe" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D48420095553501.dat" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D48420095553502.dat" | C:\Windows\system32\cmd.exe | — | epm.exe.malware.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3744 | TIMEOUT 1 | C:\Windows\system32\timeout.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3768 | cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D48420095553501.dat"+"C:\Users\admin\AppData\Local\Temp\D48420095553502.dat" "C:\Users\admin\AppData\Local\Temp\in2C8A3B3E\09367DE5_stp\SETUP.exe" | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2548 | cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D48420095553501.dat" | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
4000 | cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D48420095553502.dat" | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2316 | "C:\Users\admin\AppData\Local\Temp\in2C8A3B3E\09367DE5_stp\SETUP.exe" /SP- /VERYSILENT /LANG=English | C:\Users\admin\AppData\Local\Temp\in2C8A3B3E\09367DE5_stp\SETUP.exe | epm.exe.malware.exe | |
User: admin Company: EaseUS Integrity Level: HIGH Description: EaseUS Partition Master Setup Exit code: 0 Version: 12.10 | ||||
128 | "C:\Users\admin\AppData\Local\Temp\is-5L9S3.tmp\SETUP.tmp" /SL5="$C05C2,37452199,119296,C:\Users\admin\AppData\Local\Temp\in2C8A3B3E\09367DE5_stp\SETUP.exe" /SP- /VERYSILENT /LANG=English | C:\Users\admin\AppData\Local\Temp\is-5L9S3.tmp\SETUP.tmp | SETUP.exe | |
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 | ||||
2648 | "C:\Windows\system32\setupempdrv03.exe" | C:\Windows\system32\setupempdrv03.exe | — | SETUP.tmp |
User: admin Integrity Level: HIGH Exit code: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\005DA4C7.log | — | |
MD5:— | SHA256:— | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\main.css | text | |
MD5:F71853280B05098908F7274FD779BB2E | SHA256:40A44079D2253CF3F1790F616CA8DB13BD322BAF30ED032EFD177049B87545D3 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\_variables.scss | text | |
MD5:07922410C30F0117CBC3C140F14AEA88 | SHA256:AF1999B49C03F5DCBB19466466FAC2D8172C684C0FF18931B85A8D0A06332C73 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\main.scss | text | |
MD5:260D6A630246464BA0EF3458BD437DD5 | SHA256:3BBA8A3BFCC3607EABD903C0CD5EC669F9C0232CA3E27C15B4BDE607F2880B66 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\helpers\_border.scss | text | |
MD5:681FB7EB197E8E7EBD89F828D1181FD6 | SHA256:51E8AFA69ED6D92EB82F71939B0B8FD34EF23FAECEE457698238E5A4F28DF984 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\helpers\_colors.scss | text | |
MD5:2DA278FBB61E370E0CC9F548E8154E1C | SHA256:857A73FC1DA7CF54525048AA60EC9E2F07328EE1D718A66E3B17186170BB5B5B | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\ie6_main.scss | text | |
MD5:F336AA4D3AC7F291984D6CF4933EDFA8 | SHA256:B6B8795FAD34918DD3B8387E1EF585E0D97F40CA1BE76A2D3BE6515223761D68 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\form.bmp.Mask | binary | |
MD5:D2FC989F9C2043CD32332EC0FAD69C70 | SHA256:27DD029405CBFB0C3BF8BAC517BE5DB9AA83E981B1DC2BD5C5D6C549FA514101 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\helpers\_float.scss | text | |
MD5:BC5EB91B59A99E0FC439E02F80319975 | SHA256:EAF9D36E3E75177E64090AC71C6FCF9BB6465CD21F5C0A5CCB05666033609DA8 | |||
1320 | epm.exe.malware.exe | C:\Users\admin\AppData\Local\Temp\inH613703150905\css\helpers\_width-height.scss | text | |
MD5:DD8AF246E3A767AEB684A8272FC7C2C9 | SHA256:86D060BFD279CF4E9CBBAA9A3F444DA99339F247AF0C9D9E85B109A31474BDD9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1320 | epm.exe.malware.exe | GET | — | 199.115.112.67:80 | http://ww1.tacecsono.com/app/EaseUS_pub/EaseUS_SETUP_5Aug18_Free.cis | US | — | — | malicious |
2644 | EuDownload.exe | HEAD | 200 | 163.171.128.148:80 | http://www.easeus.com/update/epm/innerbuy/epm_Plug_OB.ini | US | — | — | whitelisted |
1320 | epm.exe.malware.exe | HEAD | 200 | 85.159.237.103:80 | http://cloud.tacecsono.com/app/EaseUS_pub/EaseUS_SETUP_5Aug18_Free.cis | NL | — | — | malicious |
1320 | epm.exe.malware.exe | GET | — | 199.115.112.67:80 | http://ww1.tacecsono.com/app/EaseUS_pub/EaseUS_SETUP_5Aug18_Free.cis | US | — | — | malicious |
1320 | epm.exe.malware.exe | GET | — | 199.115.112.67:80 | http://ww1.tacecsono.com/app/EaseUS_pub/EaseUS_SETUP_5Aug18_Free.cis | US | — | — | malicious |
4080 | EuDownload.exe | HEAD | 200 | 163.171.128.148:80 | http://www.easeus.com/update/epm/innerbuy/epm_Free_Plug_OB.zip | US | — | — | whitelisted |
3596 | TrayTipAgentE.exe | GET | — | 66.39.112.91:80 | http://api.easeus.com/index/gettipsid?pid=1&edtion=13 | US | — | — | suspicious |
1320 | epm.exe.malware.exe | GET | 206 | 85.159.237.103:80 | http://cloud.tacecsono.com/app/EaseUS_pub/EaseUS_SETUP_5Aug18_Free.cis | NL | binary | 7.23 Mb | malicious |
1320 | epm.exe.malware.exe | POST | 200 | 52.210.42.57:80 | http://remote.tacecsono.com/EaseUS_pub/ | IE | binary | 157 Kb | malicious |
1320 | epm.exe.malware.exe | POST | 200 | 52.214.73.247:80 | http://vpn.tacecsono.com/ | IE | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1320 | epm.exe.malware.exe | 52.214.73.247:80 | vpn.tacecsono.com | Amazon.com, Inc. | IE | malicious |
1320 | epm.exe.malware.exe | 199.115.112.67:80 | ww1.tacecsono.com | Leaseweb USA, Inc. | US | malicious |
2812 | uexperice.exe | 216.92.47.198:80 | track.easeus.com | pair Networks | US | suspicious |
1320 | epm.exe.malware.exe | 52.210.42.57:80 | remote.tacecsono.com | Amazon.com, Inc. | IE | malicious |
4080 | EuDownload.exe | 163.171.128.148:80 | www.easeus.com | — | US | malicious |
3596 | TrayTipAgentE.exe | 66.39.112.91:80 | api.easeus.com | pair Networks | US | suspicious |
2576 | EuDownload.exe | 163.171.128.148:80 | www.easeus.com | — | US | malicious |
1320 | epm.exe.malware.exe | 85.159.237.103:80 | cloud.tacecsono.com | NForce Entertainment B.V. | NL | malicious |
2644 | EuDownload.exe | 163.171.128.148:80 | www.easeus.com | — | US | malicious |
2404 | EuDownload.exe | 163.171.128.148:80 | www.easeus.com | — | US | malicious |
Domain | IP | Reputation |
---|---|---|
vpn.tacecsono.com |
| malicious |
remote.tacecsono.com |
| malicious |
cloud.tacecsono.com |
| malicious |
ww1.tacecsono.com |
| malicious |
track.easeus.com |
| suspicious |
api.easeus.com |
| suspicious |
www.easeus.com |
| whitelisted |
update.easeus.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
1320 | epm.exe.malware.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2 |
1320 | epm.exe.malware.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1 |
1320 | epm.exe.malware.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3 |
1320 | epm.exe.malware.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4 |
Process | Message |
---|---|
uexperice.exe | 2018-11-08 14:39:04:785[UE] --Info. log level=3
|
uexperice.exe | 2018-11-08 14:39:04:801[UE] --Info. join=1
|
uexperice.exe | 2018-11-08 14:39:04:801[UE] --Info. top num =3
|
uexperice.exe | 2018-11-08 14:39:04:801[UE] --Info. try send=1
|
uexperice.exe | 2018-11-08 14:39:04:801[UE] --Info. InstallSpy. inst=6CD92158
|
uexperice.exe | 2018-11-08 14:39:04:801[UE] --Info. SetText. id=0x3 (3), text=1, inst=6CD92158
|
uexperice.exe | 2018-11-08 14:39:04:816[UE] --Info. SetValue. id=0x2 (2), val=1, inst=6CD92158
|
uexperice.exe | 2018-11-08 14:39:04:816[UE] --Info. SetText. id=0x5003 (20483), text=12.10, inst=6CD92158
|
uexperice.exe | 2018-11-08 14:39:04:816[UE] --Info. SetText. id=0x5004 (20484), text=63, inst=6CD92158
|
uexperice.exe | 2018-11-08 14:39:04:816[UE] --Info. SetText. id=0x5005 (20485), text=1033, inst=6CD92158
|