| URL: | http://www.saturnpcb.com/?download=&kccpid=590&kcccount=http://www.saturnpcb.com/wp-content/themes/saturnpcb/images/Saturn_PCB_Toolkit_V7.08_Setup.exe |
| Full analysis: | https://app.any.run/tasks/41086bbe-0cf8-4ae4-b39f-df2bd90f427d |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 14, 2019, 00:04:27 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | F651C9DAA2E1815A029ED64590C3BE06 |
| SHA1: | 02FBAF854DAE1F5E6EB4E400CF1A1E7E24B38383 |
| SHA256: | F28025DF0FC711B8AD4D34C0CDEAA8DA22F4F53D7536D326FAF7E45D0D7CAB39 |
| SSDEEP: | 3:N1KJS4CXQSTVEFDoVPVSWgaS4CXQSTJVOlAQrFW2AJCBdb6b9L36nvA:Cc4CAWXtSr4CAWJVOlAkFXAMTb6bpKvA |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 636 | "C:\Program Files\Mozilla Firefox\firefox.exe" http://www.saturnpcb.com/?download=&kccpid=590&kcccount=http://www.saturnpcb.com/wp-content/themes/saturnpcb/images/Saturn_PCB_Toolkit_V7.08_Setup.exe | C:\Program Files\Mozilla Firefox\firefox.exe | explorer.exe | ||||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 65.0.2 Modules
| |||||||||||||||
| 828 | C:\Windows\system32\MsiExec.exe -Embedding A1A3855C9FF15EC1B77D6300D0B21B15 C | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 948 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1296 | "C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe" | C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe | — | AdobeARM.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe Acrobat SpeedLauncher Exit code: 0 Version: 15.23.20053.211670 Modules
| |||||||||||||||
| 1336 | "C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe" | C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe | firefox.exe | ||||||||||||
User: admin Company: Saturn PCB Design, Inc. Integrity Level: HIGH Description: Saturn PCB Toolkit V7.08 Installer Exit code: 0 Version: 7.08 Modules
| |||||||||||||||
| 2116 | "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2596.0.1167238780\634064676" --allow-no-sandbox-job /prefetch:673131151 | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | — | RdrCEF.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: LOW Description: Adobe RdrCEF Exit code: 0 Version: 15.23.20053.211670 Modules
| |||||||||||||||
| 2188 | "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Saturn PCB Design\PCB Toolkit V7\EULA.pdf" | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | — | AcroRd32.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: LOW Description: Adobe Acrobat Reader DC Exit code: 0 Version: 15.23.20070.215641 Modules
| |||||||||||||||
| 2240 | "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Saturn PCB Design\PCB Toolkit V7\EULA.pdf" | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | explorer.exe | ||||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe Acrobat Reader DC Exit code: 0 Version: 15.23.20070.215641 Modules
| |||||||||||||||
| 2524 | "C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe" /i "C:\Users\admin\AppData\Roaming\Saturn PCB Design, Inc\Saturn PCB Toolkit V7.08 7.08\install\Saturn PCB Design, Inc. - PCB Toolkit.msi" AI_EUIMSI=1 SHORTCUTDIR="C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Saturn PCB Toolkit" APPDIR="C:\Saturn PCB Design\PCB Toolkit V7" CLIENTPROCESSID="1336" SECONDSEQUENCE="1" CHAINERUIPROCESSID="1336Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="MainFeature" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" AI_SETUPEXEPATH="C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe" SETUPEXEDIR="C:\Users\admin\Downloads\" EXE_CMD_LINE="/exenoupdates " AI_SETUPEXEPATH_ORIGINAL="C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe" TARGETDIR="C:\" AI_INSTALL="1" | C:\Users\admin\Downloads\Saturn_PCB_Toolkit_V7.08_Setup.exe | — | Saturn_PCB_Toolkit_V7.08_Setup.exe | |||||||||||
User: admin Company: Saturn PCB Design, Inc. Integrity Level: HIGH Description: Saturn PCB Toolkit V7.08 Installer Exit code: 0 Version: 7.08 Modules
| |||||||||||||||
| 2596 | "C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250 | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe | — | AcroRd32.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe RdrCEF Exit code: 0 Version: 15.23.20053.211670 Modules
| |||||||||||||||
| (PID) Process: | (636) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (636) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 4600000071000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000 | |||
| (PID) Process: | (636) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (636) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1336) Saturn_PCB_Toolkit_V7.08_Setup.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1336) Saturn_PCB_Toolkit_V7.08_Setup.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (948) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 4000000000000000C82DC7BCE809D501B4030000440D0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (948) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 40000000000000002290C9BCE809D501B4030000440D0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (948) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 20 | |||
| (PID) Process: | (948) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGatherWriterMetadata (Enter) |
Value: 4000000000000000F4D934BDE809D501B4030000440D0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin | — | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\trash5207 | — | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js | — | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp | — | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm | — | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.bin | binary | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\F5745764BFBA102F98F868988599AA9E37B92AB4 | der | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.js | text | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.bin | binary | |
MD5:— | SHA256:— | |||
| 636 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstore | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
636 | firefox.exe | GET | 303 | 107.154.148.114:80 | http://www.saturnpcb.com/?download=&kccpid=590&kcccount=http://www.saturnpcb.com/wp-content/themes/saturnpcb/images/Saturn_PCB_Toolkit_V7.08_Setup.exe | US | — | — | malicious |
2240 | AcroRd32.exe | GET | 304 | 2.16.186.32:80 | http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip | unknown | — | — | whitelisted |
2240 | AcroRd32.exe | GET | 304 | 2.16.186.32:80 | http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip | unknown | — | — | whitelisted |
2240 | AcroRd32.exe | GET | 304 | 2.16.186.32:80 | http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip | unknown | — | — | whitelisted |
636 | firefox.exe | POST | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
636 | firefox.exe | GET | 200 | 107.154.148.114:80 | http://www.saturnpcb.com/wp-content/themes/saturnpcb/images/Saturn_PCB_Toolkit_V7.08_Setup.exe | US | executable | 12.2 Mb | malicious |
636 | firefox.exe | POST | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
636 | firefox.exe | POST | 200 | 172.217.22.67:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
2240 | AcroRd32.exe | GET | 304 | 2.16.186.32:80 | http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip | unknown | — | — | whitelisted |
636 | firefox.exe | POST | 200 | 172.217.22.67:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
636 | firefox.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
636 | firefox.exe | 172.217.22.67:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
636 | firefox.exe | 143.204.99.61:443 | snippets.cdn.mozilla.net | — | US | unknown |
636 | firefox.exe | 172.217.22.106:443 | safebrowsing.googleapis.com | Google Inc. | US | whitelisted |
636 | firefox.exe | 34.212.119.231:443 | shavar.services.mozilla.com | Amazon.com, Inc. | US | unknown |
636 | firefox.exe | 216.58.210.14:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
— | — | 143.204.101.56:443 | tracking-protection.cdn.mozilla.net | — | US | suspicious |
636 | firefox.exe | 143.204.101.10:443 | content-signature.cdn.mozilla.net | — | US | suspicious |
2240 | AcroRd32.exe | 2.16.186.32:80 | acroipm2.adobe.com | Akamai International B.V. | — | whitelisted |
— | — | 2.18.233.74:443 | armmf.adobe.com | Akamai International B.V. | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
detectportal.firefox.com |
| whitelisted |
aus5.mozilla.org |
| whitelisted |
www.saturnpcb.com |
| malicious |
balrog-aus5.r53-2.services.mozilla.com |
| whitelisted |
a1089.dscd.akamai.net |
| whitelisted |
qfqgicg.sitelockcdn.net |
| malicious |
ocsp.digicert.com |
| whitelisted |
search.services.mozilla.com |
| whitelisted |
cs9.wac.phicdn.net |
| whitelisted |
search.r53-2.services.mozilla.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
636 | firefox.exe | A Network Trojan was detected | ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious |
636 | firefox.exe | A Network Trojan was detected | ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious |
636 | firefox.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |