File name:

iMyfone-unlock-iphone_setup.exe

Full analysis: https://app.any.run/tasks/8bb23d7b-ab77-4a36-8933-45ab4394d476
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 16, 2019, 18:21:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

95A0C9C6B1F2CE60C9A18B3C08FCA1E0

SHA1:

405BBCCA8EAA535BBC857DC0A99B69C579E78F0B

SHA256:

F56B517773751EBDFFE9B4EB50A4390F1637960DFB021E10772FE4772B13A4D1

SSDEEP:

24576:efENb1sNTJl3N0BTbnViw6B9poLuQAysjPG:vN1kPMQwyRQfeG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • imyfone-lockwiper.exe (PID: 3060)
      • LockWiper.exe (PID: 3408)
      • ProServers.exe (PID: 2608)
    • Downloads executable files from the Internet

      • iMyfone-unlock-iphone_setup.exe (PID: 3928)
    • Loads dropped or rewritten executable

      • LockWiper.exe (PID: 3408)
      • ProServers.exe (PID: 2608)
  • SUSPICIOUS

    • Creates files in the program directory

      • iMyfone-unlock-iphone_setup.exe (PID: 3928)
      • LockWiper.exe (PID: 3408)
    • Executable content was dropped or overwritten

      • imyfone-lockwiper.exe (PID: 3060)
      • imyfone-lockwiper.tmp (PID: 3728)
    • Starts Internet Explorer

      • imyfone-lockwiper.tmp (PID: 3728)
    • Creates files in the user directory

      • imyfone-lockwiper.tmp (PID: 3728)
      • LockWiper.exe (PID: 3408)
  • INFO

    • Application was dropped or rewritten from another process

      • imyfone-lockwiper.tmp (PID: 3728)
    • Dropped object may contain Bitcoin addresses

      • imyfone-lockwiper.tmp (PID: 3728)
    • Changes internet zones settings

      • iexplore.exe (PID: 3860)
    • Application launched itself

      • iexplore.exe (PID: 3860)
    • Creates a software uninstall entry

      • imyfone-lockwiper.tmp (PID: 3728)
    • Creates files in the program directory

      • imyfone-lockwiper.tmp (PID: 3728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:05:22 11:18:23+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 137728
InitializedDataSize: 1005056
UninitializedDataSize: -
EntryPoint: 0x1215a
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.6
ProductVersionNumber: 2.0.0.6
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: iMyFone LockWiper
FileVersion: 2.0.0.6
InternalName: LockWiper_Setup
LegalCopyright: Copyright © 2019 iMyFone Technology Co., Ltd. All Rights Reserved
OriginalFileName: LockWiper_Setup.exe
ProductName: iMyFone LockWiper
ProductVersion: 2.0.0.6

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 22-May-2019 09:18:23
Detected languages:
  • Chinese - PRC
  • English - United States
FileDescription: iMyFone LockWiper
FileVersion: 2.0.0.6
InternalName: LockWiper_Setup
LegalCopyright: Copyright © 2019 iMyFone Technology Co., Ltd. All Rights Reserved
OriginalFilename: LockWiper_Setup.exe
ProductName: iMyFone LockWiper
ProductVersion: 2.0.0.6

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 22-May-2019 09:18:23
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00021955
0x00021A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.57373
.rdata
0x00023000
0x00009752
0x00009800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.84631
.data
0x0002D000
0x000041A0
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.2312
.rsrc
0x00032000
0x000E5648
0x000E5800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.79306
.reloc
0x00118000
0x0000220C
0x00002400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.48532

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.06216
651
UNKNOWN
English - United States
RT_MANIFEST
2
4.10057
67624
UNKNOWN
English - United States
RT_ICON
3
4.48816
9640
UNKNOWN
English - United States
RT_ICON
4
4.7737
4264
UNKNOWN
English - United States
RT_ICON
5
5.35663
1128
UNKNOWN
English - United States
RT_ICON
9
1.56933
56
UNKNOWN
English - United States
RT_STRING
100
3.41656
266
UNKNOWN
English - United States
RT_DIALOG
128
2.65209
76
UNKNOWN
English - United States
RT_GROUP_ICON
129
3.18924
684
UNKNOWN
English - United States
RT_DIALOG
202
6.57758
199
UNKNOWN
Chinese - PRC
PNG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
WININET.dll
gdiplus.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
download and start start drop and start imyfone-unlock-iphone_setup.exe imyfone-lockwiper.exe imyfone-lockwiper.tmp iexplore.exe no specs iexplore.exe no specs lockwiper.exe proservers.exe no specs imyfone-unlock-iphone_setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2608"C:\Program Files\iMyFone\iMyFone LockWiper\ProServers.exe" LockWiper.exe support@imyfone.com "C:/Program Files/iMyFone/iMyFone LockWiper/LockWiper.exe" "" lockwiper@imyfone.com imyfone3hOuMrC:\Program Files\iMyFone\iMyFone LockWiper\ProServers.exeLockWiper.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
HIGH
Description:
iMyFone Daemons
Exit code:
0
Version:
2.0.0.5
Modules
Images
c:\program files\imyfone\imyfone lockwiper\proservers.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\imyfone\imyfone lockwiper\qt5core.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2744"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3860 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3060 /verysilent /LockWiper /path="C:\Program Files"C:\Users\Public\Documents\iMyFone\imyfone-lockwiper.exe
iMyfone-unlock-iphone_setup.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
HIGH
Description:
iMyFone LockWiper
Exit code:
0
Version:
5.1.0.4
Modules
Images
c:\users\public\documents\imyfone\imyfone-lockwiper.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3148"C:\Users\admin\AppData\Local\Temp\iMyfone-unlock-iphone_setup.exe" C:\Users\admin\AppData\Local\Temp\iMyfone-unlock-iphone_setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
iMyFone LockWiper
Exit code:
3221226540
Version:
2.0.0.6
Modules
Images
c:\users\admin\appdata\local\temp\imyfone-unlock-iphone_setup.exe
c:\systemroot\system32\ntdll.dll
3408"C:\Program Files\iMyFone\iMyFone LockWiper\LockWiper.exe" C:\Program Files\iMyFone\iMyFone LockWiper\LockWiper.exe
iMyfone-unlock-iphone_setup.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
HIGH
Description:
iMyFone LockWiper
Exit code:
0
Version:
5.1.0.4
Modules
Images
c:\program files\imyfone\imyfone lockwiper\lockwiper.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\imyfone\imyfone lockwiper\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3728"C:\Users\admin\AppData\Local\Temp\is-JGEGQ.tmp\imyfone-lockwiper.tmp" /SL5="$F01E8,42556991,62976,C:\Users\Public\Documents\iMyFone\imyfone-lockwiper.exe" /verysilent /LockWiper /path="C:\Program Files"C:\Users\admin\AppData\Local\Temp\is-JGEGQ.tmp\imyfone-lockwiper.tmp
imyfone-lockwiper.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-jgegq.tmp\imyfone-lockwiper.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3860"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exeimyfone-lockwiper.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3928"C:\Users\admin\AppData\Local\Temp\iMyfone-unlock-iphone_setup.exe" C:\Users\admin\AppData\Local\Temp\iMyfone-unlock-iphone_setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
iMyFone LockWiper
Exit code:
1000
Version:
2.0.0.6
Modules
Images
c:\users\admin\appdata\local\temp\imyfone-unlock-iphone_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
582
Read events
480
Write events
96
Delete events
6

Modification events

(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:C:\Users\admin\AppData\Local\Temp\iMyfone-unlock-iphone_setup.exe
Value:
1
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3928) iMyfone-unlock-iphone_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iMyfone-unlock-iphone_setup_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
142
Suspicious files
132
Text files
407
Unknown types
83

Dropped files

PID
Process
Filename
Type
3928iMyfone-unlock-iphone_setup.exeC:\Users\Public\Documents\iMyFone\imyfone-lockwiper.down
MD5:
SHA256:
3928iMyfone-unlock-iphone_setup.exeC:\Users\Public\Documents\iMyFone\imyfone-lockwiper.exe
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-TT5HI.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-07VMF.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-6DEI7.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-D0TD8.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-DJ65N.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-HSIM7.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-9FSO0.tmp
MD5:
SHA256:
3728imyfone-lockwiper.tmpC:\Program Files\iMyFone\iMyFone LockWiper\is-OTGD6.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
47
DNS requests
3
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3928
iMyfone-unlock-iphone_setup.exe
GET
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
executable
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
3928
iMyfone-unlock-iphone_setup.exe
GET
206
13.32.43.12:80
http://download.imyfone.com/lockwiper/imyfone-lockwiper.exe
US
binary
1.02 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3928
iMyfone-unlock-iphone_setup.exe
13.32.43.12:80
download.imyfone.com
US
suspicious
3408
LockWiper.exe
52.88.104.85:443
www.imyfone.de
Amazon.com, Inc.
US
suspicious
3928
iMyfone-unlock-iphone_setup.exe
13.32.43.15:80
download.imyfone.com
US
suspicious
3408
LockWiper.exe
13.32.43.122:443
www.imyfone.com
US
unknown

DNS requests

Domain
IP
Reputation
download.imyfone.com
  • 13.32.43.12
  • 13.32.43.15
  • 13.32.43.65
  • 13.32.43.24
whitelisted
www.imyfone.com
  • 13.32.43.122
  • 13.32.43.89
  • 13.32.43.76
  • 13.32.43.22
whitelisted
www.imyfone.de
  • 52.88.104.85
suspicious

Threats

PID
Process
Class
Message
3928
iMyfone-unlock-iphone_setup.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
3928
iMyfone-unlock-iphone_setup.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
3928
iMyfone-unlock-iphone_setup.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
LockWiper.exe
=======config======= "C:/Program Files/iMyFone/iMyFone LockWiper/RegisterRes/conf/Register.json"
LockWiper.exe
appPath=========================== "C:/Program Files/iMyFone/iMyFone LockWiper/RegisterRes/skin/"
LockWiper.exe
appPath=========================== "C:/Program Files/iMyFone/iMyFone LockWiper/RegisterRes/skin/"
LockWiper.exe
=== Not First Register!
LockWiper.exe
=== ""
LockWiper.exe
=== "Loading..."
LockWiper.exe
=== "Loading..."
LockWiper.exe
=== "Loading..."
LockWiper.exe
=== ""
LockWiper.exe
pid = "p91" type = 0