File name:

WhiteSmoke_Enrichment_Full.exe

Full analysis: https://app.any.run/tasks/906086b5-46bd-49de-bca0-f666b6560622
Verdict: Malicious activity
Analysis date: October 18, 2018, 20:53:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

118DA020F80B3E71C94150D39490C6B1

SHA1:

E31E793779779EFA0A32E25A0A6275749E3ECC69

SHA256:

EB4B3F628CA13BACACA041D83586BC471A8835CC7130F93AB72A208FF9AFF25A

SSDEEP:

196608:mptmloewsPB519N4YL/n542i66nqUSxdvAHhyKmBgT0z56V:mqoewGBfnL/nDVUSxdq9mBdI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • CheckLockedWSFiles.exe (PID: 3656)
      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
      • CheckLockedWSFiles.exe (PID: 1840)
      • csrss.exe (PID: 344)
      • WSTray.exe (PID: 944)
      • WSRegistration.exe (PID: 2208)
      • csrss.exe (PID: 400)
      • WSTray.exe (PID: 2372)
      • WSRegistration.exe (PID: 2828)
    • Application was dropped or rewritten from another process

      • WSTray.exe (PID: 2372)
      • WSRegistration.exe (PID: 2208)
      • CheckLockedWSFiles.exe (PID: 1840)
      • WSTray.exe (PID: 944)
      • CheckLockedWSFiles.exe (PID: 3656)
      • WSRegistration.exe (PID: 2828)
    • Writes to a start menu file

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
  • SUSPICIOUS

    • Creates files in the user directory

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Reads internet explorer settings

      • WSRegistration.exe (PID: 2208)
      • WSRegistration.exe (PID: 2828)
    • Executable content was dropped or overwritten

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Creates COM task schedule object

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Starts Internet Explorer

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Creates a software uninstall entry

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Creates files in the program directory

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 3992)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1732)
    • Dropped object may contain Bitcoin addresses

      • WhiteSmoke_Enrichment_Full.exe (PID: 3128)
    • Creates files in the user directory

      • iexplore.exe (PID: 1732)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (91.9)
.exe | Win32 Executable MS Visual C++ (generic) (3.3)
.exe | Win64 Executable (generic) (3)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 20:21:56+01:00
PEType: PE32
LinkerVersion: 10
CodeSize: 27648
InitializedDataSize: 272896
UninitializedDataSize: 8704
EntryPoint: 0x3814
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.6034.13130
ProductVersionNumber: 1.0.6034.13130
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: ASCII
FileDescription: -
FileVersion: 1.00.6034.13130
LegalCopyright: -

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Feb-2012 19:21:56
Detected languages:
  • English - United States
FileDescription: -
FileVersion: 1.00.6034.13130
LegalCopyright: -

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 24-Feb-2012 19:21:56
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006B32
0x00006C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.47711
.rdata
0x00008000
0x00001EFE
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.35432
.data
0x0000A000
0x0003E95C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.44337
.ndata
0x00049000
0x0005D000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x000A6000
0x00003210
0x00003400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.38484
.reloc
0x000AA000
0x00000D92
0x00000E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
5.76775

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.22656
965
UNKNOWN
English - United States
RT_MANIFEST
103
1.91924
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.73893
514
UNKNOWN
English - United States
RT_DIALOG
106
2.91148
248
UNKNOWN
English - United States
RT_DIALOG
111
2.92787
238
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
12
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start whitesmoke_enrichment_full.exe checklockedwsfiles.exe no specs checklockedwsfiles.exe no specs wstray.exe no specs wsregistration.exe no specs csrss.exe no specs iexplore.exe iexplore.exe wstray.exe no specs csrss.exe no specs wsregistration.exe no specs whitesmoke_enrichment_full.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
344%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
400%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
944"C:\Program Files\WhiteSmoke\WSTray.exe" C:\Program Files\WhiteSmoke\WSTray.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\whitesmoke\wstray.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1732"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3992 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1840"C:\Users\admin\AppData\Local\Temp\WhiteSmoke\CheckLockedWSFiles.exe" targetdir="C:\Program Files\WhiteSmoke" silentC:\Users\admin\AppData\Local\Temp\WhiteSmoke\CheckLockedWSFiles.exeWhiteSmoke_Enrichment_Full.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\whitesmoke\checklockedwsfiles.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1872"C:\Users\admin\AppData\Local\Temp\WhiteSmoke_Enrichment_Full.exe" C:\Users\admin\AppData\Local\Temp\WhiteSmoke_Enrichment_Full.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.00.6034.13130
Modules
Images
c:\users\admin\appdata\local\temp\whitesmoke_enrichment_full.exe
c:\systemroot\system32\ntdll.dll
2208"C:\Program Files\WhiteSmoke\WSRegistration.exe" C:\Program Files\WhiteSmoke\WSRegistration.exeWSTray.exe
User:
admin
Company:
WhiteSmoke
Integrity Level:
HIGH
Description:
WhiteSmoke Registration App
Exit code:
0
Version:
1.0.6034.0
Modules
Images
c:\program files\whitesmoke\wsregistration.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2372"C:\Program Files\WhiteSmoke\WSTray.exe"C:\Program Files\WhiteSmoke\WSTray.exeWhiteSmoke_Enrichment_Full.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\whitesmoke\wstray.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2828"C:\Program Files\WhiteSmoke\WSRegistration.exe" C:\Program Files\WhiteSmoke\WSRegistration.exeWSTray.exe
User:
admin
Company:
WhiteSmoke
Integrity Level:
MEDIUM
Description:
WhiteSmoke Registration App
Exit code:
0
Version:
1.0.6034.0
Modules
Images
c:\program files\whitesmoke\wsregistration.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3128"C:\Users\admin\AppData\Local\Temp\WhiteSmoke_Enrichment_Full.exe" C:\Users\admin\AppData\Local\Temp\WhiteSmoke_Enrichment_Full.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00.6034.13130
Modules
Images
c:\users\admin\appdata\local\temp\whitesmoke_enrichment_full.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
1 050
Read events
775
Write events
273
Delete events
2

Modification events

(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_CURRENT_USER\Software\WhiteSmoke
Operation:writeName:Promotion
Value:
1
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_CURRENT_USER\Software\WhiteSmoke
Operation:writeName:ShowRegistration
Value:
1
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{5C731C2A-6ADF-487E-99A2-7291BF794A14}
Operation:writeName:
Value:
osmax
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\osmax.ocx
Operation:writeName:AppID
Value:
{5C731C2A-6ADF-487E-99A2-7291BF794A14}
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AddInExpress.OutlookSecurityManager.1
Operation:writeName:
Value:
OutlookSecMan Control
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AddInExpress.OutlookSecurityManager.1\CLSID
Operation:writeName:
Value:
{20E1481B-E285-4ABC-ADC7-AE24842B81CD}
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AddInExpress.OutlookSecurityManager
Operation:writeName:
Value:
OutlookSecMan Control
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AddInExpress.OutlookSecurityManager\CLSID
Operation:writeName:
Value:
{20E1481B-E285-4ABC-ADC7-AE24842B81CD}
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AddInExpress.OutlookSecurityManager\CurVer
Operation:writeName:
Value:
AddInExpress.OutlookSecurityManager.1
(PID) Process:(3128) WhiteSmoke_Enrichment_Full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20E1481B-E285-4ABC-ADC7-AE24842B81CD}
Operation:writeName:
Value:
Add-in Express Outlook Security Manager
Executable files
42
Suspicious files
5
Text files
874
Unknown types
10

Dropped files

PID
Process
Filename
Type
3128WhiteSmoke_Enrichment_Full.exeC:\Program Files\WhiteSmoke\WSKeyboardHook.dllexecutable
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Users\admin\AppData\Local\Temp\WhiteSmoke\CheckLockedWsFiles.exeexecutable
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Users\admin\AppData\Local\Temp\WhiteSmoke\Microsoft.VC80.CRT.manifestxml
MD5:188E68005ED62F32248032C65CB4DE96
SHA256:AA8E944ADFEED4B29CC9262C63F43ED752F8EF44D52FD868E41BDF1EA974D1B0
3128WhiteSmoke_Enrichment_Full.exeC:\Program Files\WhiteSmoke\WSTray.exeexecutable
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Users\admin\AppData\Local\Temp\nse3B94.tmp\Whitesmoke_EULA.txttext
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Program Files\WhiteSmoke\WSEngine.dllexecutable
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Program Files\WhiteSmoke\atl80.dllexecutable
MD5:D5E459BED3DB9CF7FC6CC1455F177D2D
SHA256:FCAB2130FAB57B6728C50D5B9E9924F001C43538DE4F675DE03537FF0D9B84BD
3128WhiteSmoke_Enrichment_Full.exeC:\Users\admin\AppData\Local\Temp\nse3B94.tmp\ioSpecial.initext
MD5:
SHA256:
3128WhiteSmoke_Enrichment_Full.exeC:\Users\admin\AppData\Local\Temp\nse3B94.tmp\System.dllexecutable
MD5:A78507EA1078CADAA8B2EC1A2E1D874F
SHA256:93D1E681DAEBFD24FF9FAB3952E8AE94EDDBDFB3650937988C1FD8085991610E
3128WhiteSmoke_Enrichment_Full.exeC:\Program Files\WhiteSmoke\ComVistaElevator.dllexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
7
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1732
iexplore.exe
GET
301
54.149.187.185:80
http://www.whitesmoke.com/promotions/popups/popup_writer_funnel_external.php?user_id=&dist_id=0&installOption=0&offer=0&
US
malicious
1732
iexplore.exe
GET
200
54.149.187.185:80
http://www.whitesmoke.com/postInstallation/?user_id=&dist_id=0&installOption=0&offer=0&
US
html
15.1 Kb
malicious
1732
iexplore.exe
GET
200
172.217.23.170:80
http://fonts.googleapis.com/css?family=Open+Sans
US
text
167 b
whitelisted
1732
iexplore.exe
GET
200
54.149.187.185:80
http://www.whitesmoke.com/website2016/css/bxslider/jquery.bxslider.css
US
text
3.75 Kb
malicious
3992
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1732
iexplore.exe
GET
200
172.217.23.170:80
http://fonts.googleapis.com/css?family=Scada:400,700,400italic
US
text
156 b
whitelisted
1732
iexplore.exe
GET
301
54.149.187.185:80
http://www.whitesmoke.com/promotions/popups/directpostinstallation.php?user_id=&dist_id=0&installOption=0&offer=0
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1732
iexplore.exe
54.149.187.185:80
www.whitesmoke.com
Amazon.com, Inc.
US
unknown
1732
iexplore.exe
172.217.23.170:80
fonts.googleapis.com
Google Inc.
US
whitelisted
3992
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
www.whitesmoke.com
  • 54.149.187.185
  • 52.42.28.31
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
fonts.googleapis.com
  • 172.217.23.170
whitelisted

Threats

No threats detected
No debug info