| File name: | installer.exe |
| Full analysis: | https://app.any.run/tasks/45770fa7-b032-4749-932d-7f69c8670400 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | July 31, 2022, 01:18:39 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 93E23E5BED552C0500856641D19729A8 |
| SHA1: | 7E14CDF808DCD21D766A4054935C87C89C037445 |
| SHA256: | E4B23EBEB82594979325357CE20F14F70143D98FF49A9D5A2E6258FBFB33E555 |
| SSDEEP: | 196608:PBXWySxHnUIYfGp0N6k7jn3R655p0aRnk6bAEzV1d:pXc6rf6Q3ipdnkqAEzVf |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| Subsystem: | Windows GUI |
|---|---|
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x1ec40 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 143360 |
| CodeSize: | 201216 |
| LinkerVersion: | 14 |
| PEType: | PE32 |
| TimeStamp: | 2020:12:01 19:00:55+01:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 01-Dec-2020 18:00:55 |
| Detected languages: |
|
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000118 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 01-Dec-2020 18:00:55 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000310EA | 0x00031200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.70808 |
.rdata | 0x00033000 | 0x0000A612 | 0x0000A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.22174 |
.data | 0x0003E000 | 0x00023728 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.70882 |
.didat | 0x00062000 | 0x00000188 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.29825 |
.rsrc | 0x00063000 | 0x00015168 | 0x00015200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.24093 |
.reloc | 0x00079000 | 0x00002268 | 0x00002400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.55486 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.25329 | 1875 | Latin 1 / Western European | English - United States | RT_MANIFEST |
7 | 3.1586 | 482 | Latin 1 / Western European | English - United States | RT_STRING |
8 | 3.11685 | 460 | Latin 1 / Western European | English - United States | RT_STRING |
9 | 3.11236 | 440 | Latin 1 / Western European | English - United States | RT_STRING |
10 | 2.99727 | 326 | Latin 1 / Western European | English - United States | RT_STRING |
11 | 3.2036 | 1094 | Latin 1 / Western European | English - United States | RT_STRING |
12 | 3.12889 | 358 | Latin 1 / Western European | English - United States | RT_STRING |
13 | 3.01704 | 338 | Latin 1 / Western European | English - United States | RT_STRING |
14 | 2.94627 | 266 | Latin 1 / Western European | English - United States | RT_STRING |
15 | 2.83619 | 188 | Latin 1 / Western European | English - United States | RT_STRING |
KERNEL32.dll |
USER32.dll (delay-loaded) |
gdiplus.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 492 | "C:\Users\admin\Pictures\Adobe Films\a99OIJskZmR9o3UJFdTuxxni.exe" | C:\Users\admin\Pictures\Adobe Films\a99OIJskZmR9o3UJFdTuxxni.exe | — | File.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 756 | "C:\Users\admin\Pictures\Adobe Films\1Xpm9t8P6JvLmqAsGQ382Hq3.exe" | C:\Users\admin\Pictures\Adobe Films\1Xpm9t8P6JvLmqAsGQ382Hq3.exe | File.exe | ||||||||||||
User: admin Company: Cho-Chun Huang, CH Biotech R&D Co Ltd Integrity Level: HIGH Description: Sales Department Exit code: 0 Version: 6.2.6.0 Modules
RedLine(PID) Process(756) 1Xpm9t8P6JvLmqAsGQ382Hq3.exe C2 (1)89.39.104.85:24947 Botnet Err_msg Auth_value377805d7b8d0085bf33ea4323a33d720 US (162) LEnvironmentogiEnvironmentn DatEnvironmenta Environment WSystem.Texteb DatSystem.Texta System.Text CoCryptographyokieCryptographys Cryptography ExtGenericension CooGenerickies Generic OFileInfopeFileInfora GFileInfoX StabFileInfole FileInfo OpLinqera GLinqX Linq ApGenericpDaGenericta\RGenericoamiGenericng\ Network Extension UNKNOWN . 1 cFileStreamredFileStreamit_cFileStreamardFileStreams FileStream \ Network\ Pass Port User Host : cookies.sqlite String.Replace String.Remove net.tcp:// / localhost 377805d7b8d0085bf33ea4323a33d720 Authorization ns1 CSUCGwsbAhsLNSheCgsOXwkLIF4JNThd Fain FwwvByM1ClM= EnumerateFiles FullName Replace Directory ExpandEnvironmentVariables Id2 Id1 Id3 wa l et d a t *wallet* _ T e gr am ex \TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata \Discord\Local Storage\leveldb *.loSystem.Collections.Genericg System.Collections.Generic String string.Replace %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl serviceInterface.Extension ProldCharotonVoldCharPN oldChar nSystem.CollectionspvoSystem.Collections* System.Collections Microsoft\Windоws - ToString AddRange % UNIQUE ( " bcrFileStream.IOypt.dFileStream.IOll FileStream.IO BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder string.Empty BCruintyptCloseAlgorituinthmProvuintider uint BCrUnmanagedTypeyptDecrUnmanagedTypeypt UnmanagedType BCrbyte[]yptDesbyte[]troyKbyte[]ey byte[] BCpszPropertyryptGepszPropertytPropepszPropertyrty pszProperty BCEncodingryptSEncodingetPrEncodingoperEncodingty Encoding BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey bMasterKey windows-1251 AES Microsoft Primitive Provider ChainingModeGCM AuthTagLength ChainingMode ObjectLength KeyDataBlob {0} gasdl94ja;sdiasdl94ja;s32 asdl94ja;s Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds asdl94jlajsd CopyFromScreen Width Height | https://api.ip.sb/ip 81 80 0.0.0.0 SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor System.Windows.Forms Name NumberOfCores roSystem.Linqot\CISystem.LinqMV2 System.Linq SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller AdapterRAM SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente System.Management SerialNumber SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId=' System.Text.RegularExpressions ' FileSystem SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId=' System. ExecutablePath [ ] Concat0 MConcatb oConcatr Concat0 Concat SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem Memory {0}{1}{2} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion CSDVersion ProductName Unknown _[ (PID) Process(756) 1Xpm9t8P6JvLmqAsGQ382Hq3.exe C2 (1)89.39.104.85:24947 Botnet Err_msg Auth_value377805d7b8d0085bf33ea4323a33d720 US (162) LEnvironmentogiEnvironmentn DatEnvironmenta Environment WSystem.Texteb DatSystem.Texta System.Text CoCryptographyokieCryptographys Cryptography ExtGenericension CooGenerickies Generic OFileInfopeFileInfora GFileInfoX StabFileInfole FileInfo OpLinqera GLinqX Linq ApGenericpDaGenericta\RGenericoamiGenericng\ Network Extension UNKNOWN . 1 cFileStreamredFileStreamit_cFileStreamardFileStreams FileStream \ Network\ Pass Port User Host : cookies.sqlite String.Replace String.Remove net.tcp:// / localhost 377805d7b8d0085bf33ea4323a33d720 Authorization ns1 CSUCGwsbAhsLNSheCgsOXwkLIF4JNThd Fain FwwvByM1ClM= EnumerateFiles FullName Replace Directory ExpandEnvironmentVariables Id2 Id1 Id3 wa l et d a t *wallet* _ T e gr am ex \TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata \Discord\Local Storage\leveldb *.loSystem.Collections.Genericg System.Collections.Generic String string.Replace %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl serviceInterface.Extension ProldCharotonVoldCharPN oldChar nSystem.CollectionspvoSystem.Collections* System.Collections Microsoft\Windоws - ToString AddRange % UNIQUE ( " bcrFileStream.IOypt.dFileStream.IOll FileStream.IO BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder string.Empty BCruintyptCloseAlgorituinthmProvuintider uint BCrUnmanagedTypeyptDecrUnmanagedTypeypt UnmanagedType BCrbyte[]yptDesbyte[]troyKbyte[]ey byte[] BCpszPropertyryptGepszPropertytPropepszPropertyrty pszProperty BCEncodingryptSEncodingetPrEncodingoperEncodingty Encoding BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey bMasterKey windows-1251 AES Microsoft Primitive Provider ChainingModeGCM AuthTagLength ChainingMode ObjectLength KeyDataBlob {0} gasdl94ja;sdiasdl94ja;s32 asdl94ja;s Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds asdl94jlajsd CopyFromScreen Width Height | https://api.ip.sb/ip 81 80 0.0.0.0 SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor System.Windows.Forms Name NumberOfCores roSystem.Linqot\CISystem.LinqMV2 System.Linq SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller AdapterRAM SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente System.Management SerialNumber SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId=' System.Text.RegularExpressions ' FileSystem SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId=' System. ExecutablePath [ ] Concat0 MConcatb oConcatr Concat0 Concat SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem Memory {0}{1}{2} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion CSDVersion ProductName Unknown _[ (PID) Process(756) 1Xpm9t8P6JvLmqAsGQ382Hq3.exe C2 (1)89.39.104.85:24947 Botnet Err_msg Auth_value377805d7b8d0085bf33ea4323a33d720 US (162) LEnvironmentogiEnvironmentn DatEnvironmenta Environment WSystem.Texteb DatSystem.Texta System.Text CoCryptographyokieCryptographys Cryptography ExtGenericension CooGenerickies Generic OFileInfopeFileInfora GFileInfoX StabFileInfole FileInfo OpLinqera GLinqX Linq ApGenericpDaGenericta\RGenericoamiGenericng\ Network Extension UNKNOWN . 1 cFileStreamredFileStreamit_cFileStreamardFileStreams FileStream \ Network\ Pass Port User Host : cookies.sqlite String.Replace String.Remove net.tcp:// / localhost 377805d7b8d0085bf33ea4323a33d720 Authorization ns1 CSUCGwsbAhsLNSheCgsOXwkLIF4JNThd Fain FwwvByM1ClM= EnumerateFiles FullName Replace Directory ExpandEnvironmentVariables Id2 Id1 Id3 wa l et d a t *wallet* _ T e gr am ex \TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata \Discord\Local Storage\leveldb *.loSystem.Collections.Genericg System.Collections.Generic String string.Replace %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl serviceInterface.Extension ProldCharotonVoldCharPN oldChar nSystem.CollectionspvoSystem.Collections* System.Collections Microsoft\Windоws - ToString AddRange % UNIQUE ( " bcrFileStream.IOypt.dFileStream.IOll FileStream.IO BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder string.Empty BCruintyptCloseAlgorituinthmProvuintider uint BCrUnmanagedTypeyptDecrUnmanagedTypeypt UnmanagedType BCrbyte[]yptDesbyte[]troyKbyte[]ey byte[] BCpszPropertyryptGepszPropertytPropepszPropertyrty pszProperty BCEncodingryptSEncodingetPrEncodingoperEncodingty Encoding BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey bMasterKey windows-1251 AES Microsoft Primitive Provider ChainingModeGCM AuthTagLength ChainingMode ObjectLength KeyDataBlob {0} gasdl94ja;sdiasdl94ja;s32 asdl94ja;s Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds asdl94jlajsd CopyFromScreen Width Height | https://api.ip.sb/ip 81 80 0.0.0.0 SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor System.Windows.Forms Name NumberOfCores roSystem.Linqot\CISystem.LinqMV2 System.Linq SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller AdapterRAM SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente System.Management SerialNumber SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId=' System.Text.RegularExpressions ' FileSystem SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId=' System. ExecutablePath [ ] Concat0 MConcatb oConcatr Concat0 Concat SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem Memory {0}{1}{2} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion CSDVersion ProductName Unknown _[ (PID) Process(756) 1Xpm9t8P6JvLmqAsGQ382Hq3.exe C2 (1)89.39.104.85:24947 Botnet Err_msg Auth_value377805d7b8d0085bf33ea4323a33d720 US (162) LEnvironmentogiEnvironmentn DatEnvironmenta Environment WSystem.Texteb DatSystem.Texta System.Text CoCryptographyokieCryptographys Cryptography ExtGenericension CooGenerickies Generic OFileInfopeFileInfora GFileInfoX StabFileInfole FileInfo OpLinqera GLinqX Linq ApGenericpDaGenericta\RGenericoamiGenericng\ Network Extension UNKNOWN . 1 cFileStreamredFileStreamit_cFileStreamardFileStreams FileStream \ Network\ Pass Port User Host : cookies.sqlite String.Replace String.Remove net.tcp:// / localhost 377805d7b8d0085bf33ea4323a33d720 Authorization ns1 CSUCGwsbAhsLNSheCgsOXwkLIF4JNThd Fain FwwvByM1ClM= EnumerateFiles FullName Replace Directory ExpandEnvironmentVariables Id2 Id1 Id3 wa l et d a t *wallet* _ T e gr am ex \TeEnvironmentlegraEnvironmentm DEnvironmentesktoEnvironmentp\tdEnvironmentata \Discord\Local Storage\leveldb *.loSystem.Collections.Genericg System.Collections.Generic String string.Replace %USERPFile.WriteROFILE%\AppFile.WriteData\RoamiFile.Writeng File.Write Handler npvo* %USERPserviceInterface.ExtensionROFILE%\ApserviceInterface.ExtensionpData\LocaserviceInterface.Extensionl serviceInterface.Extension ProldCharotonVoldCharPN oldChar nSystem.CollectionspvoSystem.Collections* System.Collections Microsoft\Windоws - ToString AddRange % UNIQUE ( " bcrFileStream.IOypt.dFileStream.IOll FileStream.IO BCrstring.EmptyyptOpestring.EmptynAlgorithmProvistring.Emptyder string.Empty BCruintyptCloseAlgorituinthmProvuintider uint BCrUnmanagedTypeyptDecrUnmanagedTypeypt UnmanagedType BCrbyte[]yptDesbyte[]troyKbyte[]ey byte[] BCpszPropertyryptGepszPropertytPropepszPropertyrty pszProperty BCEncodingryptSEncodingetPrEncodingoperEncodingty Encoding BCrbMasterKeyyptImbMasterKeyportKbMasterKeyey bMasterKey windows-1251 AES Microsoft Primitive Provider ChainingModeGCM AuthTagLength ChainingMode ObjectLength KeyDataBlob {0} gasdl94ja;sdiasdl94ja;s32 asdl94ja;s Gasdl94jlajsdetDevasdl94jlajsdiceCapasdl94jlajsds asdl94jlajsd CopyFromScreen Width Height | https://api.ip.sb/ip 81 80 0.0.0.0 SELSystem.Windows.FormsECT * FRSystem.Windows.FormsOM WinSystem.Windows.Forms32_ProcSystem.Windows.Formsessor System.Windows.Forms Name NumberOfCores roSystem.Linqot\CISystem.LinqMV2 System.Linq SELSystem.LinqECT * FRSystem.LinqOM WinSystem.Linq32_VideoCoSystem.Linqntroller AdapterRAM SOFTWARE\WOW6432Node\Clients\StartMenuInternet SOFTWARE\Clients\StartMenuInternet shell\open\command Unknown Version SELESystem.ManagementCT * FRSystem.ManagementOM WiSystem.Managementn32_DisSystem.ManagementkDrivSystem.Managemente System.Management SerialNumber SELSystem.Text.RegularExpressionsECT * FRSystem.Text.RegularExpressionsOM Win32_PSystem.Text.RegularExpressionsrocess WSystem.Text.RegularExpressionshere SessSystem.Text.RegularExpressionsionId=' System.Text.RegularExpressions ' FileSystem SSystem.ELECT * FRSystem.OM WiSystem.n32_ProcSystem.ess WherSystem.e SessiSystem.onId=' System. ExecutablePath [ ] Concat0 MConcatb oConcatr Concat0 Concat SELEMemoryCT * FMemoryROM WiMemoryn32_OperMemoryatingSMemoryystem Memory {0}{1}{2} x32 x64 x86 SOFTWARE\Microsoft\Windows NT\CurrentVersion CSDVersion ProductName Unknown _[ | |||||||||||||||
| 852 | "C:\Users\admin\Pictures\Adobe Films\DmVSlYn0aw_CbcfEfk4qMN6G.exe" | C:\Users\admin\Pictures\Adobe Films\DmVSlYn0aw_CbcfEfk4qMN6G.exe | File.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 912 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\system32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 988 | "C:\Users\admin\Desktop\Install.exe" | C:\Users\admin\Desktop\Install.exe | DllHost.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
| 1032 | "C:\Users\admin\Pictures\Adobe Films\rqOgUmjwFJDpji5Z0QKNBJlS.exe" | C:\Users\admin\Pictures\Adobe Films\rqOgUmjwFJDpji5Z0QKNBJlS.exe | File.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1480 | "C:\Users\admin\Pictures\Adobe Films\ZuM5UAa6rTuGUK5xwdmcwVWS.exe" | C:\Users\admin\Pictures\Adobe Films\ZuM5UAa6rTuGUK5xwdmcwVWS.exe | File.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1868 | rUNdlL32.eXe "C:\Users\admin\AppData\Local\Temp\axhub.dll",main | C:\Windows\system32\rUNdlL32.eXe | — | wmiprvse.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1980 | "C:\Users\admin\Desktop\installer.exe" | C:\Users\admin\Desktop\installer.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2084 | "C:\Users\admin\Desktop\File.exe" | C:\Users\admin\Desktop\File.exe | — | installer.exe | |||||||||||
User: admin Company: Yoko Integrity Level: MEDIUM Description: Yoko Exit code: 3221226540 Version: 35.205.10001.50000 Modules
| |||||||||||||||
| (PID) Process: | (1980) installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1980) installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1980) installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1980) installer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2204) Folder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2204) Folder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2204) Folder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2204) Folder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3564) FoxSBrowser.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FoxSBrowser_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3564) FoxSBrowser.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FoxSBrowser_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1980 | installer.exe | C:\Users\admin\Desktop\md9_1sjm.exe | executable | |
MD5:3B3D48102A0D45A941F98D8AABE2DC43 | SHA256:F4FDF9842D2221EB8910E6829B8467D867E346B7F73E2C3040F16EB77630B8F0 | |||
| 912 | svchost.exe | C:\Windows\appcompat\programs\RecentFileCache.bcf | txt | |
MD5:— | SHA256:— | |||
| 3320 | md9_1sjm.exe | C:\Users\admin\Desktop\tmp.edb | — | |
MD5:— | SHA256:— | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\File.exe | executable | |
MD5:ECE476206E52016ED4E0553D05B05160 | SHA256:EBC2784E2648E4FF72F48A6251FF28EEE69003C8BD4AB604F5B43553A4140F4B | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\Updbdate.exe | executable | |
MD5:3D09B651BAA310515BB5DF3C04506961 | SHA256:2599FED90469C6C2250883F90D1C9D20FE41755B9DA670A306A884797DBD7DF6 | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\Details.exe | executable | |
MD5:913FCCA8AA37351D548FCB1EF3AF9F10 | SHA256:2F59E661904F9A4C62123F024EB7968CDC234F826BAB077914AD8896EBF001C9 | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\Folder.exe | executable | |
MD5:B89068659CA07AB9B39F1C580A6F9D39 | SHA256:9D225182E9A8F073E8CF1D60A8258369A394BCAE5FBC52D845D71A0FA440539C | |||
| 2436 | Folder.exe | C:\Users\admin\AppData\Local\Temp\api-ms-win-core-namedpipe-l1-1-0.dll | executable | |
MD5:87B1814412CDAC3D08FAD8DD3A79EBAD | SHA256:2F4690B3C2587C0BFB81AB701D50E497406994613151FAF007423C59CA5E2281 | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\Files.exe | executable | |
MD5:37DB6DB82813DDC8EEB42C58553DA2DE | SHA256:65302460BBDCCB8268BC6C23434BCD7D710D0E800FE11D87A1597FDEDFC2A9C7 | |||
| 1980 | installer.exe | C:\Users\admin\Desktop\pub2.exe | executable | |
MD5:F9D940AB072678A0226EA5E6BD98EBFA | SHA256:0BE77F05A9C4D30F2EC4F5636179F0E2F85E3F5441F5854A0872DE4F63ACEFFD | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2408 | File.exe | GET | — | 45.133.1.107:80 | http://45.133.1.107/server.txt | unknown | — | — | malicious |
2408 | File.exe | HEAD | 200 | 212.193.0.28:80 | http://212.193.0.28/load.php?pub=mixruzki | RU | — | — | suspicious |
2408 | File.exe | HEAD | 200 | 62.204.41.178:80 | http://62.204.41.178/newfile.exe | GB | — | — | suspicious |
2408 | File.exe | GET | 200 | 184.24.77.48:80 | http://e1.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTvkAFw3ViPKmUeIVEf3NC7b1ErqwQUWvPtK%2Fw2wjd5uVIw6lRvz1XLLqwCEgQZzECiQMadRuHjMEX0wLNLEg%3D%3D | US | der | 344 b | whitelisted |
2408 | File.exe | POST | 200 | 212.193.30.115:80 | http://212.193.30.115/base/api/getData.php | RU | text | 108 b | malicious |
2408 | File.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEANU1M2ZQDK8u8QlB3wxsb0%3D | US | der | 279 b | whitelisted |
2408 | File.exe | GET | 200 | 193.106.191.165:80 | http://193.106.191.165/SetupMX.exe | RU | executable | 281 Kb | malicious |
2408 | File.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
2408 | File.exe | POST | 200 | 212.193.30.115:80 | http://212.193.30.115/base/api/getData.php | RU | text | 2.67 Kb | malicious |
2408 | File.exe | GET | 200 | 212.193.0.28:80 | http://212.193.0.28/load.php?pub=mixruzki | RU | executable | 262 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2408 | File.exe | 45.133.1.182:80 | — | — | — | suspicious |
988 | Install.exe | 67.27.157.126:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | suspicious |
3320 | md9_1sjm.exe | 67.27.157.126:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | suspicious |
988 | Install.exe | 103.224.182.208:443 | www.listincode.com | Trellian Pty. Limited | AU | suspicious |
3564 | FoxSBrowser.exe | 35.205.61.67:443 | premium-s0ftwar3875.bar | Google Inc. | US | malicious |
3848 | Updbdate.exe | 45.9.20.20:13441 | — | — | — | malicious |
988 | Install.exe | 148.251.234.83:443 | iplogger.org | Hetzner Online GmbH | DE | malicious |
988 | Install.exe | 184.24.77.48:80 | r3.o.lencr.org | Time Warner Cable Internet LLC | US | unknown |
2408 | File.exe | 104.20.68.143:443 | pastebin.com | Cloudflare Inc | US | malicious |
2408 | File.exe | 45.133.1.107:80 | — | — | — | malicious |
Domain | IP | Reputation |
|---|---|---|
guidereviews.bar |
| malicious |
auto-repair-solutions.bar |
| whitelisted |
onepremiumstore.bar |
| malicious |
premium-s0ftwar3875.bar |
| malicious |
ctldl.windowsupdate.com |
| whitelisted |
www.listincode.com |
| whitelisted |
google.vrthcobj.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
iplogger.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
3320 | md9_1sjm.exe | A Network Trojan was detected | ET TROJAN Win32/FFDroider CnC Activity M2 |
3320 | md9_1sjm.exe | A Network Trojan was detected | AV TROJAN Win32/Masson CnC Activity |
— | — | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (iplogger .org in DNS Lookup) |
988 | Install.exe | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (iplogger .org in TLS SNI) |
2408 | File.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2408 | File.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
— | — | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) |
2408 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2408 | File.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
2408 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
Process | Message |
|---|---|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] Chrome path = C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] Chrome bExit = 0
|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] Chrome hash = 27C382525716EC9BAD21C34AF3E41CE3C92B7CFAF9B90258BC6F84C05B622BFE
|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] write json ok
|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] un7zfile pluginpath = C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfelcnpnijonhoildblmakjglenlmcic\3.21.4_0
|
H4ndGP3BO7bJ3KovOe3qi5q1.exe | [DEBUGINFO][SETCRX] write file ok
|
mmc.exe | Constructor: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | OnInitialize: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|
mmc.exe | ProcessCommandLineArguments: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
|