| File name: | Secret.exe |
| Full analysis: | https://app.any.run/tasks/3fb89503-e190-417f-972e-4086eeae45c4 |
| Verdict: | Malicious activity |
| Analysis date: | November 06, 2023, 07:41:53 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 15980FF9A916EB48EC5B1B3DE01078E2 |
| SHA1: | CBE322E90588BF65AF4D2B0A9FC46FC5526617DD |
| SHA256: | F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D |
| SSDEEP: | 6144:HgiATx6jIfIvKS9hQC7sQOBhgEa8h6dr9AJDAB4vuxmVvTTntKapeTeUpG0uTPMD:Aix6xhu |
| .exe | | | Win32 Executable Microsoft Visual Basic 6 (84.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (6.7) |
| .exe | | | Win32 Executable (generic) (4.6) |
| .exe | | | Generic Win/DOS Executable (2) |
| .exe | | | DOS Executable Generic (2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2013:01:14 19:24:19+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 221184 |
| InitializedDataSize: | 24576 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3cf8 |
| OSVersion: | 4 |
| ImageVersion: | 8.88 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 8.88.0.0 |
| ProductVersionNumber: | 8.88.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | ktsqhix |
| LegalCopyright: | ktsqhix |
| ProductName: | eznkqzm |
| FileVersion: | 8.88 |
| ProductVersion: | 8.88 |
| InternalName: | cjrllp |
| OriginalFileName: | cjrllp.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3164 | "C:\Users\admin\seukui.exe" | C:\Users\admin\seukui.exe | Secret.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3372 | "C:\Users\admin\AppData\Local\Temp\Secret.exe" | C:\Users\admin\AppData\Local\Temp\Secret.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225547 Modules
| |||||||||||||||
| (PID) Process: | (3372) Secret.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3372) Secret.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3372) Secret.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3372) Secret.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3164) seukui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | seukui |
Value: C:\Users\admin\seukui.exe /o | |||
| (PID) Process: | (3164) seukui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced |
| Operation: | write | Name: | ShowSuperHidden |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3164 | seukui.exe | C:\Users\admin\RCXAD9C.tmp | executable | |
MD5:86293047233BCD557D85A50D46E0E1D7 | SHA256:239D07DD7BD1A8DCE5720B72B4534D8C1CCD3459C849D0D8E964589657A1E512 | |||
| 3164 | seukui.exe | C:\Users\admin\Porn.exe | executable | |
MD5:15980FF9A916EB48EC5B1B3DE01078E2 | SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D | |||
| 3164 | seukui.exe | C:\Users\admin\RCXAD7B.tmp | executable | |
MD5:4AF475E5C61A2A6A01C4D959693ABB5B | SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5 | |||
| 3164 | seukui.exe | C:\Users\admin\RCXADDD.tmp | executable | |
MD5:C2DD36CC1E651BBFDE6F6B3167604D0B | SHA256:7CD38B537FF639C2E0B95C8D40A92E2C607E7C35C8D5B5D040D1ED05C526A117 | |||
| 3164 | seukui.exe | C:\Users\admin\Secret.exe | executable | |
MD5:15980FF9A916EB48EC5B1B3DE01078E2 | SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D | |||
| 3164 | seukui.exe | C:\Users\admin\Sexy.exe | executable | |
MD5:15980FF9A916EB48EC5B1B3DE01078E2 | SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D | |||
| 3164 | seukui.exe | C:\Users\admin\RCXAD8B.tmp | executable | |
MD5:4AF475E5C61A2A6A01C4D959693ABB5B | SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5 | |||
| 3372 | Secret.exe | C:\Users\admin\seukui.exe | executable | |
MD5:15980FF9A916EB48EC5B1B3DE01078E2 | SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D | |||
| 3164 | seukui.exe | C:\Users\admin\Passwords.exe | executable | |
MD5:15980FF9A916EB48EC5B1B3DE01078E2 | SHA256:F2A73195FE0B209D15F4CF1B3DD80F2382DAF4B963E14A1B53BAE307B8906E7D | |||
| 3164 | seukui.exe | C:\Users\admin\RCXADBC.tmp | executable | |
MD5:4AF475E5C61A2A6A01C4D959693ABB5B | SHA256:5D3480BD57C5441BCCEBB3948589923A44F374D36BE1E23F37784B1F5C5D10D5 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
868 | svchost.exe | 95.101.148.135:80 | — | Akamai International B.V. | NL | unknown |
3372 | Secret.exe | 13.248.169.48:9004 | ns1.helpchecks.com | AMAZON-02 | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
868 | svchost.exe | 184.30.20.134:80 | armmf.adobe.com | AKAMAI-AS | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
ns1.helpchecks.com |
| malicious |
armmf.adobe.com |
| whitelisted |