analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

start.exe

Full analysis: https://app.any.run/tasks/dccd35e0-3c9d-43fa-8261-1d298eb9eba4
Verdict: Malicious activity
Analysis date: November 29, 2020, 07:16:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F7F55D1C0BE669E47777BF3A3BF98E56

SHA1:

C2431C3DB0621C17BFE2FE0B0A0FBE3E7CE7C4C1

SHA256:

E965ECEB35FECFF0150EF3E951B2F8202642EBF0A545C517035B8DA70BEBBF6C

SSDEEP:

393216:rQlc/AV6uA82/Tp9+wbP5erBkup+1bPVX:EDVpA82bpsXjp+1V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates files in the user directory

      • start.exe (PID: 2836)
    • Drops a file that was compiled in debug mode

      • start.exe (PID: 2836)
    • Executable content was dropped or overwritten

      • start.exe (PID: 2836)
    • Drops a file with too old compile date

      • start.exe (PID: 2836)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ax | DirectShow filter (52.2)
.exe | Win32 Executable MS Visual C++ (generic) (8)
.exe | Win64 Executable (generic) (7.1)
.exe | Win32 Executable (generic) (1.1)

EXIF

EXE

ProductVersion: 1.0.0.
ProductName: BlackBerry User Tools
OriginalFileName: BlackBerry User Tools
LegalTrademarks: Copyright 2010 Research In Motion Li
LegalCopyright: Copyright 2010 Research In Motion Li
InternalName: BlackBerry User Tools
FileVersion: 3.0.0.0
FileDescription: BlackBerry User Tools
CompanyName: BlackBerry
CharacterSet: Unicode
LanguageCode: English (British)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0017
ProductVersionNumber: 1.0.0.1
FileVersionNumber: 3.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0xa95d5
UninitializedDataSize: -
InitializedDataSize: 4632576
CodeSize: 802816
LinkerVersion: 7.1
PEType: PE32
TimeStamp: 2010:03:03 21:18:07+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 03-Mar-2010 20:18:07
Detected languages:
  • English - United Kingdom
  • English - United States
Debug artifacts:
  • c:\MDM\Zinc3\WrapperPC\Release\WrapperPC.pdb
CompanyName: BlackBerry
FileDescription: BlackBerry User Tools
FileVersion: 3.0.0.0
InternalName: BlackBerry User Tools
LegalCopyright: Copyright 2010 Research In Motion Li
LegalTrademarks: Copyright 2010 Research In Motion Li
OriginalFilename: BlackBerry User Tools
ProductName: BlackBerry User Tools
ProductVersion: 1.0.0.

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 03-Mar-2010 20:18:07
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000C4000
0x000C4000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.55102
.rdata
0x000C5000
0x00032000
0x00032000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.82792
.data
0x000F7000
0x0001A000
0x00014000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.95801
.rsrc
0x00111000
0x0023E000
0x0023E000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.79959

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.03081
650
UNKNOWN
English - United Kingdom
RT_MANIFEST
2
5.68274
67624
UNKNOWN
English - United States
RT_ICON
3
5.72239
38056
UNKNOWN
English - United States
RT_ICON
4
0.974678
9640
UNKNOWN
English - United States
RT_ICON
5
1.12251
4264
UNKNOWN
English - United States
RT_ICON
6
1.4125
1128
UNKNOWN
English - United States
RT_ICON
107
2.76511
90
UNKNOWN
English - United States
RT_GROUP_ICON
135
6.84662
2156176
UNKNOWN
English - United Kingdom
BIN
137
4.97437
19076
UNKNOWN
English - United Kingdom
BIN
140
6.33431
39936
UNKNOWN
English - United Kingdom
BIN

Imports

ADVAPI32.dll
COMCTL32.dll
DDRAW.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
WINMM.dll
comdlg32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start start.exe

Process information

PID
CMD
Path
Indicators
Parent process
2836"C:\Users\admin\AppData\Local\Temp\start.exe" C:\Users\admin\AppData\Local\Temp\start.exe
explorer.exe
User:
admin
Company:
BlackBerry
Integrity Level:
MEDIUM
Description:
BlackBerry User Tools
Version:
3.0.0.0
Total events
105
Read events
99
Write events
6
Delete events
0

Modification events

(PID) Process:(2836) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2836) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2836) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
Operation:writeName:Name
Value:
start.exe
(PID) Process:(2836) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
Operation:writeName:ID
Value:
1267647487
Executable files
24
Suspicious files
0
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\5.mddexecutable
MD5:3D2DDB1B2EE26479599B97C1581036B6
SHA256:C42424DB96A42EA030E7B969A6187A7CF7CE92B33007C2BD8064AA4CE60DE22A
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\10.mddexecutable
MD5:1DC2E3BE73D1389D9A4BB635D8E1FDCB
SHA256:0788558CBB11FF134FFDA394DC887E17DB1FEF2EF326F9329ACD14942EC668C7
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\9.mddexecutable
MD5:8CB5063D0BF5DDA104A719C8B6919895
SHA256:80730DC0F3DFDC8867A916727C3071155B31B021C814BAD453990E86088C2811
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\12.mddexecutable
MD5:3A13F9D462B7D7E22E066AEFF29891E3
SHA256:36D9AB9C49ACFF43685878ABF4AD05938C1DEFBBCEA5E9640B97DD173A413D5B
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\17.mddexecutable
MD5:8AF19686EFD48A5E10598DA769A75337
SHA256:7ED2DEDBAB30DF40E051734AC87ABE1692134A3E5CEACB20588FC17729E7FE2D
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\13.mddexecutable
MD5:1AD46A5E041907AEEDE0B9499320AA10
SHA256:5B998CDE94164C6DA69A6B22C53EA043AF51E701D2918F5034A4206F44B2F47C
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\2.mddexecutable
MD5:70B7439E106650FB59BC209F39DA740A
SHA256:FB7B5AE846175A50210B10E1C02276E64E8C47C0F304A4088B2CEBB18F65C8F2
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\3.mddexecutable
MD5:8D0966F1D2BC58A89CB38513614906A5
SHA256:37A5F72636BEBBAF11B6A9DEC77D3ACB32E2D01E9753B056FB5CDDF299CB3BA0
2836start.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
MD5:
SHA256:
2836start.exeC:\Users\admin\AppData\Local\Temp\wrd120180.~lk\4.mddexecutable
MD5:1C086E0277F566C8066589BFB9CAEA70
SHA256:032990A22727638C0BCD9D562F07F6521A7DE728C629822F7AE5578AC701AC37
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
start.exe
wm_setfocus
start.exe
setfocus main form 0
start.exe
WM_PAINT
start.exe
wm_killfocus
start.exe
killfocus main form 0
start.exe
setfocus flash
start.exe
setfocus child form 0
start.exe
mdm.hasEI
start.exe
start.exe