URL:

http://update-akamai.brother.co.jp/CS/BrMain4810.exe

Full analysis: https://app.any.run/tasks/24327b6e-5bc6-4746-8510-fde389cdeed2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 28, 2020, 20:35:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

1D9C91E013F0480EF3911DF31ACC4B06

SHA1:

3181BF6F4E3F3AA6804A078AB58A0F7D01EC8AE0

SHA256:

E38F9022D318B65A693E05D3124A9E2A998300898E5ADB6EA6AF8A68790DDA61

SSDEEP:

3:N1KLQRA5OE5M7FtU8XoRRdUaA:CU8C03PA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • BrPdrMai.exe (PID: 3084)
      • BrMain4810.exe (PID: 1504)
      • FirmwareUpdater.exe (PID: 1008)
      • Pack.exe (PID: 3232)
      • Pack.exe (PID: 4008)
      • TestDriver.exe (PID: 1544)
      • TestDriver.exe (PID: 1636)
      • FirmwareUpdater.exe (PID: 3304)
      • FirmwareUpdater.exe (PID: 3112)
      • FirmwareUpdater.exe (PID: 2412)
      • Pack.exe (PID: 3288)
      • BrMain4810.exe (PID: 3228)
    • Loads dropped or rewritten executable

      • BrPdrMai.exe (PID: 3084)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3252)
    • Changes settings of System certificates

      • FirmwareUpdater.exe (PID: 1008)
  • SUSPICIOUS

    • Creates files in the program directory

      • BrMain4810.exe (PID: 1504)
      • BrPdrMai.exe (PID: 3084)
      • FirmwareUpdater.exe (PID: 1008)
    • Executable content was dropped or overwritten

      • BrMain4810.exe (PID: 1504)
      • iexplore.exe (PID: 3892)
      • iexplore.exe (PID: 3252)
    • Reads Internet Cache Settings

      • FirmwareUpdater.exe (PID: 1008)
    • Application launched itself

      • BrMain4810.exe (PID: 3228)
    • Adds / modifies Windows certificates

      • FirmwareUpdater.exe (PID: 1008)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3892)
      • iexplore.exe (PID: 3252)
    • Application launched itself

      • iexplore.exe (PID: 3892)
    • Changes internet zones settings

      • iexplore.exe (PID: 3892)
    • Manual execution by user

      • explorer.exe (PID: 2780)
      • Pack.exe (PID: 3232)
      • FirmwareUpdater.exe (PID: 3112)
      • Pack.exe (PID: 3288)
      • TestDriver.exe (PID: 1544)
      • TestDriver.exe (PID: 1636)
    • Reads settings of System Certificates

      • FirmwareUpdater.exe (PID: 1008)
      • iexplore.exe (PID: 3892)
    • Creates files in the user directory

      • iexplore.exe (PID: 3892)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3892)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3892)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
15
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start iexplore.exe iexplore.exe brmain4810.exe no specs brmain4810.exe pack.exe no specs firmwareupdater.exe brpdrmai.exe no specs explorer.exe no specs pack.exe no specs firmwareupdater.exe no specs testdriver.exe no specs testdriver.exe no specs firmwareupdater.exe no specs pack.exe no specs firmwareupdater.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1008"C:\Program Files\Brother\Firmware\FirmwareUpdater.exe" C:\Program Files\Brother\Firmware\FirmwareUpdater.exe
Pack.exe
User:
admin
Company:
Brother Industries, Ltd.
Integrity Level:
HIGH
Description:
Brother Firmware Update Tool
Exit code:
140
Version:
4.9.0.0
Modules
Images
c:\program files\brother\firmware\firmwareupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
1504"C:\Users\admin\Downloads\BrMain4810.exe" -el -s2 "-dC:\Program Files\Brother\Firmware" "-sp"C:\Users\admin\Downloads\BrMain4810.exe
BrMain4810.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\downloads\brmain4810.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1544"C:\Program Files\Brother\Firmware\TestDriver.exe" C:\Program Files\Brother\Firmware\TestDriver.exeexplorer.exe
User:
admin
Company:
TODO: <会社名>
Integrity Level:
MEDIUM
Description:
TODO: <ファイルの説明>
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\program files\brother\firmware\testdriver.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
1636"C:\Program Files\Brother\Firmware\TestDriver.exe" C:\Program Files\Brother\Firmware\TestDriver.exeexplorer.exe
User:
admin
Company:
TODO: <会社名>
Integrity Level:
MEDIUM
Description:
TODO: <ファイルの説明>
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\program files\brother\firmware\testdriver.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
2412"C:\Program Files\Brother\Firmware\FirmwareUpdater.exe" C:\Program Files\Brother\Firmware\FirmwareUpdater.exePack.exe
User:
admin
Company:
Brother Industries, Ltd.
Integrity Level:
MEDIUM
Description:
Brother Firmware Update Tool
Exit code:
0
Version:
4.9.0.0
Modules
Images
c:\program files\brother\firmware\firmwareupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
2780"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3084"BrPdr\BrPdrMai.exe"C:\Program Files\Brother\Firmware\res\BrPdr\BrPdrMai.exeFirmwareUpdater.exe
User:
admin
Company:
Brother Industries, Ltd.
Integrity Level:
HIGH
Description:
Brother PrinterDataRoute Main ( Java APLI I/F )
Exit code:
0
Version:
1, 0, 2, 0
Modules
Images
c:\program files\brother\firmware\res\brpdr\brpdrmai.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3112"C:\Program Files\Brother\Firmware\FirmwareUpdater.exe" C:\Program Files\Brother\Firmware\FirmwareUpdater.exeexplorer.exe
User:
admin
Company:
Brother Industries, Ltd.
Integrity Level:
MEDIUM
Description:
Brother Firmware Update Tool
Exit code:
0
Version:
4.9.0.0
Modules
Images
c:\program files\brother\firmware\firmwareupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
3228"C:\Users\admin\Downloads\BrMain4810.exe" C:\Users\admin\Downloads\BrMain4810.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\downloads\brmain4810.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
3232"C:\Program Files\Brother\Firmware\Pack.exe" C:\Program Files\Brother\Firmware\Pack.exeexplorer.exe
User:
admin
Company:
Brother Industries, Ltd.
Integrity Level:
MEDIUM
Description:
Brother Firmware Update Tool
Exit code:
0
Version:
4.8.0.0
Modules
Images
c:\program files\brother\firmware\pack.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
Total events
6 029
Read events
1 206
Write events
3 633
Delete events
1 190

Modification events

(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
2535789826
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30791194
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
19
Suspicious files
11
Text files
48
Unknown types
3

Dropped files

PID
Process
Filename
Type
3892iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2F16CBD30B7377F1.TMP
MD5:
SHA256:
3892iexplore.exeC:\Users\admin\Downloads\BrMain4810.exe.qcw5v5x.partial:Zone.Identifier
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\BrMain4810[1].exeexecutable
MD5:
SHA256:
3892iexplore.exeC:\Users\admin\Downloads\BrMain4810.exeexecutable
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\Downloads\BrMain4810.exe.qcw5v5x.partialexecutable
MD5:
SHA256:
3892iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{C2E4121D-420D-11EA-972D-5254004A04AF}.datbinary
MD5:
SHA256:
3892iexplore.exeC:\Users\admin\Downloads\BrMain4810.exe:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
1504BrMain4810.exeC:\Program Files\Brother\Firmware\res\BrPdr\brcrypt.dllexecutable
MD5:E1929A30D094E07B58943B608D05C3FA
SHA256:4F1819F993599E5CAD455CF9354A15A3BB9EB076ABE27787E0DDFBDCEDF9DBF1
1504BrMain4810.exeC:\Program Files\Brother\Firmware\res\BrPdr\brlmw03a.dllexecutable
MD5:822B31A9FC679366560BC4D416BBBB0E
SHA256:97E60F2C427FBDCDC4D5BD3A029B989D0B79FEBD868E6A63251C6CDD2357DC91
1504BrMain4810.exeC:\Program Files\Brother\Firmware\res\BrPdr\BrDbgOut.initext
MD5:12A8AA74C13BC74D215C807C71F436BB
SHA256:6ED165BF8DB9E499313EAC74C3F24E8DE09A094F01602C06FE9C54BED04ECCFC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
10
DNS requests
6
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3252
iexplore.exe
GET
200
104.108.77.216:80
http://update-akamai.brother.co.jp/CS/BrMain4810.exe
NL
executable
3.97 Mb
suspicious
3892
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3252
iexplore.exe
104.108.77.216:80
update-akamai.brother.co.jp
Akamai Technologies, Inc.
NL
suspicious
1008
FirmwareUpdater.exe
52.19.228.5:443
firmverup.brother.co.jp
Amazon.com, Inc.
IE
unknown
1008
FirmwareUpdater.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3892
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3892
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3892
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
update-akamai.brother.co.jp
  • 104.108.77.216
suspicious
firmverup.brother.co.jp
  • 52.19.228.5
  • 34.242.66.126
  • 18.203.15.219
unknown
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

PID
Process
Class
Message
3252
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3252
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info