File name:

Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe

Full analysis: https://app.any.run/tasks/46bc6db7-07ee-43e9-b318-9c0233b859f8
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 25, 2024, 07:54:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
hiloti
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

55677D2F4F251B558660652002933369

SHA1:

804357ACD8E75F6A8DB9B907A8DF882E8588B6BD

SHA256:

F714FB12A601649F1E0840A75265337C77683EC64A599F0631D2BA512BCEE5F5

SSDEEP:

98304:eccmNKIst9tag47F1TC9IZPtxYJH0/edeH1:D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • javawvd.exe (PID: 1828)
    • HILOTI has been detected (SURICATA)

      • javawvd.exe (PID: 1828)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1916)
    • Executable content was dropped or overwritten

      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1916)
      • ~De7B4C.tmp (PID: 1404)
    • Reads security settings of Internet Explorer

      • javawvd.exe (PID: 1828)
    • Contacting a server suspected of hosting an CnC

      • javawvd.exe (PID: 1828)
    • Reads the Internet Settings

      • javawvd.exe (PID: 1828)
  • INFO

    • Create files in a temporary directory

      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1916)
      • ~De7B4C.tmp (PID: 1404)
    • Checks supported languages

      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1916)
      • ~De7B4C.tmp (PID: 1404)
      • wmpnscfg.exe (PID: 1784)
      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1832)
      • javawvd.exe (PID: 1828)
      • wmpnscfg.exe (PID: 856)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1784)
      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1832)
      • javawvd.exe (PID: 1828)
      • wmpnscfg.exe (PID: 856)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1784)
      • wmpnscfg.exe (PID: 856)
    • Reads CPU info

      • Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe (PID: 1832)
      • javawvd.exe (PID: 1828)
    • Reads product name

      • javawvd.exe (PID: 1828)
    • Reads the machine GUID from the registry

      • javawvd.exe (PID: 1828)
    • Creates files or folders in the user directory

      • javawvd.exe (PID: 1828)
    • Checks proxy server information

      • javawvd.exe (PID: 1828)
    • Reads Environment values

      • javawvd.exe (PID: 1828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:01:17 01:49:56+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24576
InitializedDataSize: 1904640
UninitializedDataSize: -
EntryPoint: 0x1b50
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.0.22.0
ProductVersionNumber: 8.0.22.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Macromedia, Inc.
FileDescription: Macromedia Flash Player 8.0 r22
FileVersion: 8,0,22,0
InternalName: Macromedia Flash Player 8.0
LegalCopyright: Copyright © 1996-2005 Macromedia, Inc.
LegalTrademarks: Macromedia Flash Player
OriginalFileName: SAFlashPlayer.exe
ProductName: Shockwave Flash
ProductVersion: 8,0,22,0
Debugger: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start backdoor.win32.bredolab.oxm.55677d2f4f251b558660652002933369.exe ~de7b4c.tmp wmpnscfg.exe no specs backdoor.win32.bredolab.oxm.55677d2f4f251b558660652002933369.exe no specs #HILOTI javawvd.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1404C:\Users\admin\AppData\Local\Temp\~De7B4C.tmp _$PID:76 _$EXE:C:\Users\admin\Desktop\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe _$CMDLINE:C:\Users\admin\AppData\Local\Temp\~De7B4C.tmp
Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe
User:
admin
Company:
Macromedia, Inc.
Integrity Level:
MEDIUM
Description:
Macromedia Flash Player 8.0 r22
Exit code:
0
Version:
8,0,22,0
Modules
Images
c:\users\admin\appdata\local\temp\~de7b4c.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
1784"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1828C:\Users\admin\AppData\Local\Temp\javawvd.exeC:\Users\admin\AppData\Local\Temp\javawvd.exe
~De7B4C.tmp
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\javawvd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1832C:\Users\admin\AppData\Local\Temp\\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe C:\Users\admin\AppData\Local\Temp\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe~De7B4C.tmp
User:
admin
Company:
Macromedia, Inc.
Integrity Level:
MEDIUM
Description:
Macromedia Flash Player 8.0 r22
Version:
8,0,22,0
Modules
Images
c:\users\admin\appdata\local\temp\backdoor.win32.bredolab.oxm.55677d2f4f251b558660652002933369.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wininet.dll
1916"C:\Users\admin\Desktop\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe" C:\Users\admin\Desktop\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exe
explorer.exe
User:
admin
Company:
Macromedia, Inc.
Integrity Level:
MEDIUM
Description:
Macromedia Flash Player 8.0 r22
Exit code:
0
Version:
8,0,22,0
Modules
Images
c:\users\admin\desktop\backdoor.win32.bredolab.oxm.55677d2f4f251b558660652002933369.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
1 027
Read events
1 001
Write events
20
Delete events
6

Modification events

(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005F010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1828) javawvd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
3
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1916Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exeC:\Users\admin\AppData\Local\Temp\~De7B4C.tmpexecutable
MD5:55677D2F4F251B558660652002933369
SHA256:F714FB12A601649F1E0840A75265337C77683EC64A599F0631D2BA512BCEE5F5
1404~De7B4C.tmpC:\Users\admin\AppData\Local\Temp\javawvd.exeexecutable
MD5:BB13E4EBDCB3E7D6BCD78601FD01B654
SHA256:55385F8BE83A7E193390AA5C3A9A9934E603D6D3D164E5F496ECE0AD553E9027
1404~De7B4C.tmpC:\Users\admin\AppData\Local\Temp\Backdoor.Win32.Bredolab.oxm.55677d2f4f251b558660652002933369.exeexecutable
MD5:A42D640EB78C5D5B867ABEF05E5231D6
SHA256:73D8301C93C887EEDD6777610A37A2B7484AB6B2555B19D241480483324B1952
1828javawvd.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\LJ1H4ME2.txttext
MD5:392BBDC74ACE44C73C43E01E2E1EBBD4
SHA256:025FC45F0ADE71CE27C126F5A0917DA215E942B1335E892D62DDCC57870C29A4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
9
DNS requests
4
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1828
javawvd.exe
GET
302
95.211.219.65:80
http://automobile.200gigs.com/patch/chkupdate.php?a1=SElgOzwiN3pQLzoMFA==&a2=392415e94632ed091b6b4c928cc40769&a3=RBsidmgUPjtdGzwdCWpybBkaORljGQQMHR4XIiNrZX1MSWlhdCU1dl0Nb1gramgZbGlGawcnMykQUihibQgiPx1RBAVhZy59UHh7SEtqCxwZaTxrfGdwfDsyAHcvOXNtKwAjPC0qZwcudG8vEiQsIzs6XHxuGTUjGh8JOCQkIywUWXgbLTUxIR4rbygaKSNsfWBAKTx3ZwIZDlooLDkpbUJZYXF6aXZ+RWB+SEtken96aVxje3tyeExKPg0LD3l5UUUyOnY=
unknown
malicious
1828
javawvd.exe
GET
200
95.211.219.65:80
http://automobile.200gigs.com/patch/chkupdate.php?a1=SElgOzwiN3pQLzoMFA==&a2=392415e94632ed091b6b4c928cc40769&a3=RBsidmgUPjtdGzwdCWpybBkaORljGQQMHR4XIiNrZX1MSWlhdCU1dl0Nb1gramgZbGlGawcnMykQUihibQgiPx1RBAVhZy59UHh7SEtqCxwZaTxrfGdwfDsyAHcvOXNtKwAjPC0qZwcudG8vEiQsIzs6XHxuGTUjGh8JOCQkIywUWXgbLTUxIR4rbygaKSNsfWBAKTx3ZwIZDlooLDkpbUJZYXF6aXZ+RWB+SEtken96aVxje3tyeExKPg0LD3l5UUUyOnY=
unknown
malicious
1828
javawvd.exe
GET
200
95.211.219.65:80
http://automobile.200gigs.com/patch/chkupdate.php?a1=SElgOzwiN3pQLzoMFA==&a2=392415e94632ed091b6b4c928cc40769&a3=RBsidmgUPjtdGzwdCWpybBkaORljGQQMHR4XIiNrZX1MSWlhdCU1dl0Nb1gramgZbGlGawcnMykQUihibQgiPx1RBAVhZy59UHh7SEtqCxwZaTxrfGdwfDsyAHcvOXNtKwAjPC0qZwcudG8vEiQsIzs6XHxuGTUjGh8JOCQkIywUWXgbLTUxIR4rbygaKSNsfWBAKTx3ZwIZDlooLDkpbUJZYXF6aXZ+RWB+SEtken96aVxje3tyeExKPg0LD3l5UUUyOnY=
unknown
malicious
GET
200
15.197.204.56:80
http://ww1.200gigs.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
1828
javawvd.exe
95.211.219.65:80
automobile.200gigs.com
LeaseWeb Netherlands B.V.
NL
malicious
1828
javawvd.exe
15.197.204.56:80
ww1.200gigs.com
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
automobile.200gigs.com
  • 95.211.219.65
malicious
ww1.200gigs.com
  • 15.197.204.56
unknown
autocheck.000page.com
unknown

Threats

PID
Process
Class
Message
1828
javawvd.exe
Malware Command and Control Activity Detected
ET MALWARE W32.Nemim Checkin
1828
javawvd.exe
Potentially Bad Traffic
ET HUNTING Suspicious Purported MSIE 7 with terse HTTP Headers GET to PHP
1828
javawvd.exe
Potentially Bad Traffic
ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers
1828
javawvd.exe
Potentially Bad Traffic
ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers
1828
javawvd.exe
Malware Command and Control Activity Detected
ET MALWARE W32.Nemim Checkin
1828
javawvd.exe
Malware Command and Control Activity Detected
ET MALWARE W32.Nemim Checkin
1828
javawvd.exe
Potentially Bad Traffic
ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers
No debug info