download:

1.exe

Full analysis: https://app.any.run/tasks/b17652aa-0599-46c7-bdb3-267e9eda031a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 06, 2019, 19:09:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
trojan
stealer
vidar
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

220C4C45EA065B2206DF70B22EF8F487

SHA1:

4007448FADB8CFC29A21C81920BBB0FB36ACEBE6

SHA256:

EE0A4E00992382159296EE165789910FC41B1BFEBD702A724E783300E72BA027

SSDEEP:

24576:YllR7+Gp0ZQV6oRH4C9z7hpeOV9Cy4DnXRKENC:ilR7+Gp0Zw6Ct7hIOrCF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • 1.exe (PID: 1972)
    • Actions looks like stealing of personal data

      • 1.exe (PID: 1972)
    • Stealing of credential data

      • 1.exe (PID: 1972)
    • Loads dropped or rewritten executable

      • 1.exe (PID: 1972)
      • MBAMInstallerService.exe (PID: 2604)
      • mbam.exe (PID: 460)
      • mbamtray.exe (PID: 2692)
      • MBAMService.exe (PID: 932)
    • VIDAR was detected

      • 1.exe (PID: 1972)
    • Application was dropped or rewritten from another process

      • MBSetup-009996.009996.exe (PID: 2980)
      • MBSetup-009996.009996.exe (PID: 3396)
      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 1648)
      • MBAMService.exe (PID: 932)
      • mbam.exe (PID: 460)
      • mbamtray.exe (PID: 2692)
    • Changes settings of System certificates

      • MBSetup-009996.009996.exe (PID: 3396)
      • certutil.exe (PID: 3100)
      • certutil.exe (PID: 2976)
  • SUSPICIOUS

    • Creates files in the program directory

      • 1.exe (PID: 1972)
      • MBSetup-009996.009996.exe (PID: 3396)
      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 932)
    • Executable content was dropped or overwritten

      • 1.exe (PID: 1972)
      • chrome.exe (PID: 2140)
      • chrome.exe (PID: 3972)
      • MBSetup-009996.009996.exe (PID: 3396)
      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 932)
    • Application launched itself

      • 1.exe (PID: 2580)
      • taskmgr.exe (PID: 3876)
    • Creates files in the user directory

      • 1.exe (PID: 1972)
      • mbam.exe (PID: 460)
    • Starts CMD.EXE for commands execution

      • 1.exe (PID: 1972)
      • MBAMInstallerService.exe (PID: 2604)
    • Checks for external IP

      • 1.exe (PID: 1972)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2776)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2140)
    • Adds / modifies Windows certificates

      • MBSetup-009996.009996.exe (PID: 3396)
    • Executed as Windows Service

      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 932)
    • Creates files in the driver directory

      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 932)
    • Creates files in the Windows directory

      • certutil.exe (PID: 3100)
      • certutil.exe (PID: 2976)
      • MBAMService.exe (PID: 1648)
      • MBAMService.exe (PID: 932)
      • MBAMInstallerService.exe (PID: 2604)
    • Removes files from Windows directory

      • certutil.exe (PID: 2976)
      • certutil.exe (PID: 3100)
      • MBAMService.exe (PID: 932)
      • MBAMInstallerService.exe (PID: 2604)
    • Modifies the open verb of a shell class

      • MBAMInstallerService.exe (PID: 2604)
    • Changes IE settings (feature browser emulation)

      • MBAMInstallerService.exe (PID: 2604)
    • Creates COM task schedule object

      • MBAMService.exe (PID: 932)
    • Creates or modifies windows services

      • MBAMService.exe (PID: 932)
    • Reads Internet Cache Settings

      • rundll32.exe (PID: 2976)
      • rundll32.exe (PID: 1904)
    • Creates a software uninstall entry

      • MBAMInstallerService.exe (PID: 2604)
    • Uses RUNDLL32.EXE to load library

      • mbamtray.exe (PID: 2692)
      • mbam.exe (PID: 460)
  • INFO

    • Manual execution by user

      • taskmgr.exe (PID: 2536)
      • taskmgr.exe (PID: 3876)
      • chrome.exe (PID: 2140)
      • taskmgr.exe (PID: 3788)
    • Reads the hosts file

      • chrome.exe (PID: 2140)
      • chrome.exe (PID: 3972)
    • Application launched itself

      • chrome.exe (PID: 2140)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2140)
    • Dropped object may contain Bitcoin addresses

      • chrome.exe (PID: 2140)
      • chrome.exe (PID: 3972)
      • MBAMInstallerService.exe (PID: 2604)
      • MBAMService.exe (PID: 932)
    • Reads settings of System Certificates

      • MBAMService.exe (PID: 932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:09:16 04:31:47+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 1081344
InitializedDataSize: 45056
UninitializedDataSize: -
EntryPoint: 0x1234
OSVersion: 4
ImageVersion: 9
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 9.0.0.0
ProductVersionNumber: 9.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Norwegian (Bokml)
CharacterSet: Unicode
CompanyName: ASus
ProductName: KIROeffect8
FileVersion: 9
ProductVersion: 9
InternalName: GRUCiolata
OriginalFileName: GRUCiolata.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Sep-2009 02:31:47
Detected languages:
  • Norwegian - Norway (Bokmal)
CompanyName: ASus
ProductName: KIROeffect8
FileVersion: 9.00
ProductVersion: 9.00
InternalName: GRUCiolata
OriginalFilename: GRUCiolata.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 16-Sep-2009 02:31:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x001072C0
0x00108000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.09377
.data
0x00109000
0x00000A08
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0010A000
0x000093AA
0x0000A000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.67412

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.20399
540
Unicode (UTF 16LE)
Norwegian - Norway (Bokmal)
RT_VERSION
30001
6.02608
11320
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
5.11042
7336
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
5.93262
3240
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30004
6.26208
14920
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
118
Monitored processes
66
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start 1.exe no specs #VIDAR 1.exe taskmgr.exe no specs cmd.exe no specs taskkill.exe no specs taskmgr.exe no specs taskmgr.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs taskmgr.exe no specs chrome.exe no specs chrome.exe no specs mbsetup-009996.009996.exe no specs mbsetup-009996.009996.exe mbaminstallerservice.exe cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs mbamservice.exe no specs mbamservice.exe mbamtray.exe rundll32.exe no specs mbam.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
408"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=1973049597897780369 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
460"C:\Program Files\Malwarebytes\Anti-Malware\mbam.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbam.exe
MBSetup-009996.009996.exe
User:
admin
Company:
Malwarebytes
Integrity Level:
MEDIUM
Description:
Malwarebytes
Exit code:
0
Version:
4.0.0.455
Modules
Images
c:\program files\malwarebytes\anti-malware\mbam.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\malwarebytes\anti-malware\qt5quick.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
820"C:\Windows\system32\taskmgr.exe" /1C:\Windows\system32\taskmgr.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=13589008253984193922 --mojo-platform-channel-handle=4144 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
932"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe
services.exe
User:
SYSTEM
Company:
Malwarebytes
Integrity Level:
SYSTEM
Description:
Malwarebytes Service
Exit code:
0
Version:
3.2.0.874
Modules
Images
c:\program files\malwarebytes\anti-malware\mbamservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
1212"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2705636030162534390 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3052 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1244"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6847141348190121102 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1404"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=9550212229417179643 --mojo-platform-channel-handle=4172 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1472"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,8826371295229617056,13353385286482737667,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10870306180369687491 --mojo-platform-channel-handle=3620 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1488C:\Windows\system32\cmd.exe /c certutil.exe -f -addstore root "C:\Windows\TEMP\InstallTemp\servicepkg\BaltimoreCyberTrustRoot.crt"C:\Windows\system32\cmd.exeMBAMInstallerService.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
3 232
Read events
1 679
Write events
1 541
Delete events
12

Modification events

(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1972) 1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
167
Suspicious files
345
Text files
874
Unknown types
59

Dropped files

PID
Process
Filename
Type
19721.exeC:\ProgramData\W5WKRWKFH02WDXTT23XIZ7T97\files\outlook.txt
MD5:
SHA256:
19721.exeC:\ProgramData\W5WKRWKFH02WDXTT23XIZ7T97\files\information.txt
MD5:
SHA256:
19721.exeC:\ProgramData\W5WKRWKFH02WDXTT23XIZ7T97\files\passwords.txttext
MD5:
SHA256:
19721.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\ybookfli_net[1].txttext
MD5:
SHA256:
19721.exeC:\ProgramData\W5WKRWKFH02WDXTT23XIZ7T97\AT_90059c37-1320-41a4-b58d-2b75a9850d2f3919598672.zipcompressed
MD5:
SHA256:
19721.exeC:\ProgramData\W5WKRWKFH02WDXTT23XIZ7T97\ldsqlite
MD5:
SHA256:
25801.exeC:\Users\admin\AppData\Local\Temp\~DF24D21399E8237AE8.TMPbinary
MD5:
SHA256:
19721.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\line[1].txttext
MD5:
SHA256:
19721.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\freebl3[1].dllexecutable
MD5:EF2834AC4EE7D6724F255BEAF527E635
SHA256:A770ECBA3B08BBABD0A567FC978E50615F8B346709F8EB3CFACF3FAAB24090BA
19721.exeC:\ProgramData\nss3.dllexecutable
MD5:BFAC4E3C5908856BA17D41EDCD455A51
SHA256:E2935B5B28550D47DC971F456D6961F20D1633B4892998750140E0EAA9AE9D78
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
204
DNS requests
130
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1972
1.exe
GET
301
18.205.93.1:80
http://bitbucket.org/miceants/files/downloads/setup_c.exe
US
shared
1972
1.exe
GET
301
18.205.93.1:80
http://bitbucket.org/presscircle/cloud/downloads/setup_c.exe
US
shared
3972
chrome.exe
GET
302
172.217.18.174:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
534 b
whitelisted
1972
1.exe
GET
200
185.244.149.55:80
http://ybookfli.net/freebl3.dll
unknown
executable
326 Kb
malicious
1972
1.exe
GET
200
185.244.149.55:80
http://ybookfli.net/mozglue.dll
unknown
executable
133 Kb
malicious
1972
1.exe
GET
200
185.244.149.55:80
http://ybookfli.net/nss3.dll
unknown
executable
1.19 Mb
malicious
3972
chrome.exe
GET
200
185.180.12.141:80
http://r2---sn-n02xgoxufvg3-8pxe.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=185.183.107.227&mm=28&mn=sn-n02xgoxufvg3-8pxe&ms=nvh&mt=1575659002&mv=u&mvi=1&pl=24&shardbypass=yes
AT
crx
293 Kb
whitelisted
1972
1.exe
GET
200
185.244.149.55:80
http://ybookfli.net/msvcp140.dll
unknown
executable
429 Kb
malicious
1972
1.exe
GET
200
185.244.149.55:80
http://ybookfli.net/softokn3.dll
unknown
executable
141 Kb
malicious
3972
chrome.exe
GET
200
92.122.213.201:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
57.4 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1972
1.exe
208.95.112.1:80
ip-api.com
IBURST
malicious
1972
1.exe
185.244.149.55:80
ybookfli.net
malicious
1972
1.exe
18.205.93.1:80
bitbucket.org
US
malicious
18.205.93.1:443
bitbucket.org
US
malicious
1972
1.exe
18.205.93.1:443
bitbucket.org
US
malicious
3972
chrome.exe
172.217.18.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3972
chrome.exe
172.217.23.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3972
chrome.exe
172.217.22.99:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3972
chrome.exe
172.217.16.206:443
apis.google.com
Google Inc.
US
whitelisted
3972
chrome.exe
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
ybookfli.net
  • 185.244.149.55
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
ip-api.com
  • 208.95.112.1
malicious
bitbucket.org
  • 18.205.93.1
  • 18.205.93.2
  • 18.205.93.0
shared
clientservices.googleapis.com
  • 172.217.18.3
whitelisted
accounts.google.com
  • 172.217.16.141
shared
www.google.com.ua
  • 172.217.22.35
whitelisted
fonts.googleapis.com
  • 172.217.23.106
whitelisted
www.gstatic.com
  • 216.58.210.3
whitelisted
fonts.gstatic.com
  • 172.217.22.99
whitelisted

Threats

PID
Process
Class
Message
1972
1.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1972
1.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] Possible Generic.Trojan Boundary
1972
1.exe
A Network Trojan was detected
STEALER [PTsecurity] Arkei/Vidar Stealer
1972
1.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
1972
1.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] Possible Generic.Trojan Boundary
1972
1.exe
A Network Trojan was detected
STEALER [PTsecurity] Arkei/Vidar Stealer
1972
1.exe
A Network Trojan was detected
ET TROJAN Vidar/Arkei Stealer Client Data Upload
1972
1.exe
A Network Trojan was detected
STEALER [PTsecurity] Generic Stealers activity (Nocturnal/Vidar)
1972
1.exe
A Network Trojan was detected
STEALER [PTsecurity] Stealer.Vidar
2 ETPRO signatures available at the full report
Process
Message
mbamtray.exe
QAxBase::setControl: requested control {F36AD0D0-B5F0-4C69-AF08-603D177FEF0E} could not be instantiated
mbamtray.exe
Connect to the exception(int,QString,QString,QString) signal to catch this exception
mbamtray.exe
Help :
mbamtray.exe
Code : -2147467259
mbamtray.exe
Description:
mbamtray.exe
Code : -2147467259
mbamtray.exe
Description:
mbamtray.exe
qt.scenegraph.general: Loading backend software
mbamtray.exe
void __thiscall PageStatusMonitor::OnRequestFinished(class QNetworkReply *) " Attempting redirect to: https://cleo.mb-internal.com/?x-source=trial-avail&ADDITIONAL_x-source=inproduct&ADDITIONAL_machineid=81e0cbe954fffb2dd4e10325decf35d73a7107c5&x-action=comparison_chart&ADDITIONAL_x-token_secret=jgQTeomKKCX-ohzCvjCx3kBoFTSELqVEnjpdujhGKxAWwRzt4h-KGvWhgzcBqySel1QrviDIFDE68IPKpbLb7if2I0YMo3J_PD-7EdccuYqkjk_QCd6_-9JbDSRzNvaS&x-token_secret=jgQTeomKKCX-ohzCvjCx3kBoFTSELqVEnjpdujhGKxAWwRzt4h-KGvWhgzcBqySel1QrviDIFDE68IPKpbLb7if2I0YMo3J_PD-7EdccuYqkjk_QCd6_-9JbDSRzNvaS&x-prodcode=MBAM-C&LANG=en&AFFILIATE=009996"
mbamtray.exe
void __thiscall PageStatusMonitor::OnRequestFinished(class QNetworkReply *) "Page: https://links.malwarebytes.com/link/3x_cart?affiliate=009996&uuid=81e0cbe954fffb2dd4e10325decf35d73a7107c5&x-source=trial-avail&x-action=comparison_chart&x-token_secret=jgQTeomKKCX-ohzCvjCx3kBoFTSELqVEnjpdujhGKxAWwRzt4h-KGvWhgzcBqySel1QrviDIFDE68IPKpbLb7if2I0YMo3J_PD-7EdccuYqkjk_QCd6_-9JbDSRzNvaS&ADDITIONAL_x-token_secret=jgQTeomKKCX-ohzCvjCx3kBoFTSELqVEnjpdujhGKxAWwRzt4h-KGvWhgzcBqySel1QrviDIFDE68IPKpbLb7if2I0YMo3J_PD-7EdccuYqkjk_QCd6_-9JbDSRzNvaS&x-prodcode=MBAM-C&lang=en&version=4.0.4.49 received code: 307"