File name:

mmsolution.exe

Full analysis: https://app.any.run/tasks/15ad0ca5-9726-4955-aadc-76824a8c0299
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 07, 2019, 21:36:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

3C1EA5669E00629D9A1BCA15920BC26C

SHA1:

E295C31F925775B50DFE8F96986DEB708AE92538

SHA256:

EB5A486BC29C41F8A5F2263533737AAB3CECF19E49D6F540219FB226FA3BD00D

SSDEEP:

49152:8x7A7r7Njj46QKA13p7317N7NBm7FDVIOx2bsZP9JF7:8ZePm63ENlQZP2AZ5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • mmsolution.exe (PID: 3544)
    • Downloads executable files from the Internet

      • mmsolution.exe (PID: 3544)
  • SUSPICIOUS

    • Reads Environment values

      • mmsolution.exe (PID: 3544)
    • Executable content was dropped or overwritten

      • mmsolution.exe (PID: 3544)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:07 18:57:40+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 3398656
InitializedDataSize: 3470336
UninitializedDataSize: -
EntryPoint: 0x33fa9a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.3.2.209
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription:
FileVersion: 0.0.0.0
InternalName: mmsolution.exe
LegalCopyright: Copyright © Microsoft 2011
LegalTrademarks: -
OriginalFileName: mmsolution.exe
ProductVersion: 0.3.2.209
AssemblyVersion: 0.0.0.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 07-Jul-2019 16:57:40
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 0.0.0.0
InternalName: mmsolution.exe
LegalCopyright: Copyright © Microsoft 2011
LegalTrademarks: -
OriginalFilename: mmsolution.exe
ProductVersion: 0.3.2.209
Assembly Version: 0.0.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 07-Jul-2019 16:57:40
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x0033DAA0
0x0033DC00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.20603
.reloc
0x00340000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191
.rsrc
0x00342000
0x0001171C
0x00011800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.50072

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.669
2742
UNKNOWN
UNKNOWN
RT_MANIFEST
32512
1.98048
20
UNKNOWN
UNKNOWN
RT_GROUP_ICON

Imports

mscoree.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mmsolution.exe mmsolution.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3316"C:\Users\admin\AppData\Local\Temp\mmsolution.exe" C:\Users\admin\AppData\Local\Temp\mmsolution.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3221226540
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\mmsolution.exe
c:\systemroot\system32\ntdll.dll
3544"C:\Users\admin\AppData\Local\Temp\mmsolution.exe" C:\Users\admin\AppData\Local\Temp\mmsolution.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\mmsolution.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
76
Read events
46
Write events
26
Delete events
4

Modification events

(PID) Process:(3544) mmsolution.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3544) mmsolution.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3544) mmsolution.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3544) mmsolution.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent
Operation:writeName:
Value:
(PID) Process:(3544) mmsolution.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent
Operation:writeName:
Value:
(PID) Process:(3544) mmsolution.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent
Operation:writeName:
Value:
(PID) Process:(3544) mmsolution.exeKey:HKEY_CURRENT_USER\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent
Operation:writeName:
Value:
(PID) Process:(3544) mmsolution.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mmsolution_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3544) mmsolution.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mmsolution_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3544) mmsolution.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mmsolution_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
3
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\ph_on.battext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\start.initext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\update.initext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\ph_off2.battext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\UserInfo.initext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\privatemode.battext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\ph_on2.battext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\ph_off.battext
MD5:
SHA256:
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\AdbWinUsbApi.dllexecutable
MD5:5F23F2F936BDFAC90BB0A4970AD365CF
SHA256:041C6859BB4FC78D3A903DD901298CD1ECFB75B6BE0646B74954CD722280A407
3544mmsolution.exeC:\Users\admin\AppData\Local\Temp\AdbWinApi.dllexecutable
MD5:47A6EE3F186B2C2F5057028906BAC0C6
SHA256:14A51482AA003DB79A400F4B15C158397FE6D57EE6606B3D633FA431A7BFDF4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
4
DNS requests
3
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3544
mmsolution.exe
GET
200
183.111.163.211:80
http://marketingmaster.net/myhtml/mmsolution_2.html
KR
html
7.97 Kb
unknown
3544
mmsolution.exe
GET
200
183.111.163.211:80
http://marketingmaster.net/myhtml/mmsolution_2.html
KR
html
7.97 Kb
unknown
3544
mmsolution.exe
GET
200
220.126.115.237:80
http://www.crbay.com/AutoUpdate/Mm_Solution/AdbWinApi.dll
KR
executable
94.0 Kb
suspicious
3544
mmsolution.exe
GET
200
220.126.115.237:80
http://www.crbay.com/AutoUpdate/Mm_Solution/adb.exe
KR
executable
800 Kb
suspicious
3544
mmsolution.exe
GET
200
220.126.115.237:80
http://www.crbay.com/AutoUpdate/Mm_Solution/AdbWinUsbApi.dll
KR
executable
59.5 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3544
mmsolution.exe
222.122.213.225:1433
pssoft.co.kr
Korea Telecom
KR
suspicious
3544
mmsolution.exe
183.111.163.211:80
marketingmaster.net
Korea Telecom
KR
unknown
3544
mmsolution.exe
220.126.115.237:80
www.crbay.com
Korea Telecom
KR
suspicious

DNS requests

Domain
IP
Reputation
pssoft.co.kr
  • 222.122.213.225
suspicious
marketingmaster.net
  • 183.111.163.211
unknown
www.crbay.com
  • 220.126.115.237
suspicious

Threats

PID
Process
Class
Message
3544
mmsolution.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
3544
mmsolution.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3544
mmsolution.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3544
mmsolution.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3544
mmsolution.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3544
mmsolution.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
No debug info