| URL: | http://web.shgjj.com/jstzweb/10.1.0.2918/setup.exe |
| Full analysis: | https://app.any.run/tasks/ac36090c-8563-4435-8612-541389378a35 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | October 13, 2020, 07:50:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 92C2A1738F2D6D03ED82746ABC6B14A8 |
| SHA1: | 3BA8272DDF19A1E386FC67B3318CEE0E0B878127 |
| SHA256: | E426AD5A4436FB1D05D1A4EA5C733158E342D7FBD513DBFC167576925F11E8DA |
| SSDEEP: | 3:N1KJACQPx3efeKLUdNP4A:COCQ3efiNP4A |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "C:\Users\admin\AppData\Local\Temp\is-T0S18.tmp\setup.tmp" /SL5="$17014A,4713842,140800,C:\Users\admin\Downloads\setup.exe" | C:\Users\admin\AppData\Local\Temp\is-T0S18.tmp\setup.tmp | — | setup.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 348 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 392 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | — | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1073807364 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1376 | "C:\Users\admin\AppData\Local\Temp\is-RNQH0.tmp\setup.tmp" /SL5="$701A8,4713842,140800,C:\Users\admin\Downloads\setup.exe" /SPAWNWND=$5017E /NOTIFYWND=$17014A | C:\Users\admin\AppData\Local\Temp\is-RNQH0.tmp\setup.tmp | setup.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 1532 | "C:\Users\admin\Downloads\setup.exe" /SPAWNWND=$5017E /NOTIFYWND=$17014A | C:\Users\admin\Downloads\setup.exe | setup.tmp | ||||||||||||
User: admin Company: 上海承大网络科技服务有限公司 Integrity Level: HIGH Description: 单位公积金网上业务办理系统 Setup Exit code: 0 Version: 10.1.0.2918 Modules
| |||||||||||||||
| 1652 | C:\Windows\system32\rundll32.exe C:\Windows\system32\EPASSA~2.DLL,eb_service | C:\Windows\system32\rundll32.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1732 | "C:\Users\admin\AppData\Local\Temp\is-ORM09.tmp\eP2Kauto.exe" | C:\Users\admin\AppData\Local\Temp\is-ORM09.tmp\eP2Kauto.exe | setup.tmp | ||||||||||||
User: admin Company: EnterSafe Integrity Level: HIGH Description: EnterSafe Middleware (For ePass2000Auto_SHGJJ) Exit code: 0 Version: 1.2.13.0423 Modules
| |||||||||||||||
| 2312 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://web.shgjj.com/jstzweb/10.1.0.2918/setup.exe" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1073807364 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 2748 | "C:\Users\admin\Downloads\setup.exe" | C:\Users\admin\Downloads\setup.exe | iexplore.exe | ||||||||||||
User: admin Company: 上海承大网络科技服务有限公司 Integrity Level: MEDIUM Description: 单位公积金网上业务办理系统 Setup Exit code: 0 Version: 10.1.0.2918 Modules
| |||||||||||||||
| 3208 | "C:\Windows\system32\BootPro.exe" FirstCheck | C:\Windows\system32\BootPro.exe | eP2Kauto.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1073807364 Modules
| |||||||||||||||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 2989248056 | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30843189 | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2312) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4076 | iexplore.exe | C:\Users\admin\Downloads\setup.exe.gvaookq.partial | — | |
MD5:— | SHA256:— | |||
| 2312 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF00D83DEBEA5D38DE.TMP | — | |
MD5:— | SHA256:— | |||
| 2312 | iexplore.exe | C:\Users\admin\Downloads\setup.exe.gvaookq.partial:Zone.Identifier | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\is-6P2DA.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-NIM6Q.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-LKDVG.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-06KP4.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-CNEGI.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-4NDQ2.tmp | — | |
MD5:— | SHA256:— | |||
| 1376 | setup.tmp | C:\Users\admin\Downloads\Reports\is-IFBEQ.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4076 | iexplore.exe | GET | 200 | 163.171.132.220:80 | http://web.shgjj.com/jstzweb/10.1.0.2918/setup.exe | US | executable | 4.93 Mb | suspicious |
2312 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4076 | iexplore.exe | 163.171.132.220:80 | web.shgjj.com | — | US | malicious |
2312 | iexplore.exe | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2312 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
web.shgjj.com |
| suspicious |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4076 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
eP2Kauto.exe | RunNoElevated_5 |
eP2Kauto.exe | RunNoElevated_3 |
eP2Kauto.exe | RunNoElevated_3 |
eP2Kauto.exe | RunNoElevated_4 |