analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

JANUARY PAYMENT.exe

Full analysis: https://app.any.run/tasks/422acd08-5e00-4ab0-8346-ab686d1d0f28
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: January 18, 2020, 06:15:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
netwire
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2E0064CEC10C3189B3E5E49697088618

SHA1:

E83E08C485F7C9EEA7B4675E9C57F79FD9A808FB

SHA256:

F376D69768F83043F12CFBE38AF2AC0871573AFC321BBB9A7915D86F9A9D6EC6

SSDEEP:

1536:aOLYjPYl7bRQGO4pXbvGjPYl7bRQGOqLO:/LY0i4pvG0iqC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Host.exe (PID: 4048)
    • NETWIRE was detected

      • Host.exe (PID: 4048)
  • SUSPICIOUS

    • Starts itself from another location

      • JANUARY PAYMENT.exe (PID: 2888)
    • Executable content was dropped or overwritten

      • JANUARY PAYMENT.exe (PID: 2888)
    • Application launched itself

      • Host.exe (PID: 2284)
      • JANUARY PAYMENT.exe (PID: 2816)
    • Creates files in the user directory

      • JANUARY PAYMENT.exe (PID: 2888)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2008:07:07 11:56:25+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 65536
InitializedDataSize: 53248
UninitializedDataSize: -
EntryPoint: 0x129c
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Process default
CharacterSet: Unicode
CompanyName: ment
ProductName: STRS
FileVersion: 1
ProductVersion: 1
InternalName: Unnetth
OriginalFileName: Unnetth.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 07-Jul-2008 09:56:25
Detected languages:
  • Process Default Language
CompanyName: ment
ProductName: STRS
FileVersion: 1.00
ProductVersion: 1.00
InternalName: Unnetth
OriginalFilename: Unnetth.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 07-Jul-2008 09:56:25
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000F720
0x00010000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.18542
.data
0x00011000
0x000009EC
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00012000
0x0000BAA4
0x0000C000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.21112

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.07167
512
Unicode (UTF 16LE)
Process Default Language
RT_VERSION
30001
3.63046
488
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
5.82556
2216
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
6.00666
1736
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30004
6.38193
38056
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30005
6.37242
4264
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start january payment.exe no specs january payment.exe host.exe no specs #NETWIRE host.exe

Process information

PID
CMD
Path
Indicators
Parent process
2816"C:\Users\admin\AppData\Local\Temp\JANUARY PAYMENT.exe" C:\Users\admin\AppData\Local\Temp\JANUARY PAYMENT.exeexplorer.exe
User:
admin
Company:
ment
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2888"C:\Users\admin\AppData\Local\Temp\JANUARY PAYMENT.exe" C:\Users\admin\AppData\Local\Temp\JANUARY PAYMENT.exe
JANUARY PAYMENT.exe
User:
admin
Company:
ment
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2284"C:\Users\admin\AppData\Roaming\Install\Host.exe" C:\Users\admin\AppData\Roaming\Install\Host.exeJANUARY PAYMENT.exe
User:
admin
Company:
ment
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
4048"C:\Users\admin\AppData\Roaming\Install\Host.exe" C:\Users\admin\AppData\Roaming\Install\Host.exe
Host.exe
User:
admin
Company:
ment
Integrity Level:
MEDIUM
Version:
1.00
Total events
482
Read events
417
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4048Host.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\fuck_encrypted_9FA9C6F[1].binbinary
MD5:763F5EFC4E57C1767134F840EF29D638
SHA256:2955E26E99E5A82C488D0D5AB1B272802F3ACEACF1D839888C46429D17A852C2
2888JANUARY PAYMENT.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\fuck_encrypted_9FA9C6F[1].binbinary
MD5:763F5EFC4E57C1767134F840EF29D638
SHA256:2955E26E99E5A82C488D0D5AB1B272802F3ACEACF1D839888C46429D17A852C2
2816JANUARY PAYMENT.exeC:\Users\admin\AppData\Local\Temp\~DFA054629BF2EC0968.TMPbinary
MD5:4C54E4C126DB50070DD82D17A40859BC
SHA256:3E5D7480AA98C8494C23F919BB25BC1F1DAA63B56B1AAE4B7964AF6E4E37954E
2888JANUARY PAYMENT.exeC:\Users\admin\AppData\Roaming\Install\Host.exeexecutable
MD5:2E0064CEC10C3189B3E5E49697088618
SHA256:F376D69768F83043F12CFBE38AF2AC0871573AFC321BBB9A7915D86F9A9D6EC6
2888JANUARY PAYMENT.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txttext
MD5:D318A4343C8DAE5CB2A9DCA3D090DC60
SHA256:6BBBF0340E6A4415D0A5ACE0652A9E2F446877091B2DB87F8399083D50A688EF
2284Host.exeC:\Users\admin\AppData\Local\Temp\~DF9A5DB4CB35F79860.TMPbinary
MD5:4C54E4C126DB50070DD82D17A40859BC
SHA256:3E5D7480AA98C8494C23F919BB25BC1F1DAA63B56B1AAE4B7964AF6E4E37954E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4048
Host.exe
172.217.23.142:443
drive.google.com
Google Inc.
US
whitelisted
2888
JANUARY PAYMENT.exe
172.217.23.142:443
drive.google.com
Google Inc.
US
whitelisted
2888
JANUARY PAYMENT.exe
216.58.205.225:443
doc-0k-a0-docs.googleusercontent.com
Google Inc.
US
whitelisted
4048
Host.exe
216.58.205.225:443
doc-0k-a0-docs.googleusercontent.com
Google Inc.
US
whitelisted
4048
Host.exe
185.244.30.244:32141
siri1234.duckdns.org
malicious

DNS requests

Domain
IP
Reputation
drive.google.com
  • 172.217.23.142
shared
doc-0k-a0-docs.googleusercontent.com
  • 216.58.205.225
shared
siri1234.duckdns.org
  • 185.244.30.244
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info