File name: | kazaa_lite_202_english.exe |
Full analysis: | https://app.any.run/tasks/07658bb5-42a2-4b4f-91b9-9143990d9fc8 |
Verdict: | Malicious activity |
Analysis date: | July 29, 2019, 18:45:50 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive |
MD5: | 66E2A4990A6B6B4DB996F42EE53EB452 |
SHA1: | 54B2A7B4778128FC7B4AEF67F2B2660680512FE6 |
SHA256: | F98C8B4C8589F8A88E1A008DAD57A9DE050EAA2009E63D21D0E9C2A59072EC06 |
SSDEEP: | 49152:8VtPQr8xu2TehhNalwqu5avpX+ggCOZQT3znj7YhyBUfZyMbHn:8VtYOu2QXaC5cNgW3nUyKRy2 |
.exe | | | Inno Setup installer (82.8) |
---|---|---|
.exe | | | Win32 Executable Delphi generic (10.7) |
.exe | | | Win32 Executable (generic) (3.4) |
.exe | | | Generic Win/DOS Executable (1.5) |
.exe | | | DOS Executable Generic (1.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 1992:06:20 00:22:17+02:00 |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 47104 |
InitializedDataSize: | 16384 |
UninitializedDataSize: | - |
EntryPoint: | 0xbf98 |
OSVersion: | 1 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 19-Jun-1992 22:22:17 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0050 |
Pages in file: | 0x0002 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x000F |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x001A |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 19-Jun-1992 22:22:17 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 0x00001000 | 0x0000B650 | 0x0000B800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.475 |
DATA | 0x0000D000 | 0x000017E0 | 0x00001800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.25618 |
BSS | 0x0000F000 | 0x00001190 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00011000 | 0x0000075E | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.52711 |
.tls | 0x00012000 | 0x00000008 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x00013000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0.210826 |
.reloc | 0x00014000 | 0x00000854 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0 |
.rsrc | 0x00015000 | 0x00001400 | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 4.17005 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.86458 | 649 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.17623 | 296 | UNKNOWN | UNKNOWN | RT_ICON |
4089 | 3.21823 | 754 | UNKNOWN | UNKNOWN | RT_STRING |
4090 | 3.31515 | 780 | UNKNOWN | UNKNOWN | RT_STRING |
4091 | 3.25024 | 718 | UNKNOWN | UNKNOWN | RT_STRING |
4093 | 2.86149 | 104 | UNKNOWN | UNKNOWN | RT_STRING |
4094 | 3.20731 | 180 | UNKNOWN | UNKNOWN | RT_STRING |
4095 | 3.04592 | 174 | UNKNOWN | UNKNOWN | RT_STRING |
MAINICON | 2.42968 | 34 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
advapi32.dll |
comctl32.dll |
kernel32.dll |
oleaut32.dll |
user32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1144 | C:\Users\admin\AppData\Local\Temp\INSD447.tmp /SL3 $80152 C:\Users\admin\AppData\Local\Temp\kazaa_lite_202_english.exe 2202225 2205669 61952 | C:\Users\admin\AppData\Local\Temp\INSD447.tmp | kazaa_lite_202_english.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
2820 | "C:\Program Files\KaZaA Lite\Kazaa.exe" | C:\Program Files\KaZaA Lite\Kazaa.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Kazaa Lite Exit code: 0 Version: 2, 0, 2, 0 Modules
| |||||||||||||||
2844 | "C:\Users\admin\AppData\Local\Temp\kazaa_lite_202_english.exe" | C:\Users\admin\AppData\Local\Temp\kazaa_lite_202_english.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3756 | "C:\Users\admin\AppData\Local\Temp\kazaa_lite_202_english.exe" | C:\Users\admin\AppData\Local\Temp\kazaa_lite_202_english.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
|
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa |
Operation: | write | Name: | LimitBitrate |
Value: 0 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa |
Operation: | write | Name: | LastSearchHash |
Value: 7BF1E7629B1CD3AA121F1A6A0C172BFF8881986D13106712 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\Advanced |
Operation: | write | Name: | MaxSearchResult |
Value: 600 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\Advanced |
Operation: | write | Name: | SuperNode |
Value: 1 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\Advanced |
Operation: | write | Name: | ScanFolder |
Value: 0 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\Skins |
Operation: | write | Name: | SkinsDir |
Value: C:\Program Files\KaZaA Lite\Skins | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\InstantMessaging |
Operation: | write | Name: | IgnoreAll |
Value: 0 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\InstantMessaging |
Operation: | write | Name: | IgnoredUsers |
Value: | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\LocalContent |
Operation: | write | Name: | DisableSharing |
Value: 0 | |||
(PID) Process: | (1144) INSD447.tmp | Key: | HKEY_CURRENT_USER\Software\Kazaa\LocalContent |
Operation: | write | Name: | DownloadDir |
Value: C:\Program Files\KaZaA Lite\My Shared Folder |
PID | Process | Filename | Type | |
---|---|---|---|---|
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-K8FNH.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-HJM0P.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-T3V4B.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-5C50D.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-UP401.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-N9EUC.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-5GTNA.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-SC7Q8.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-7H384.tmp | — | |
MD5:— | SHA256:— | |||
1144 | INSD447.tmp | C:\Program Files\KaZaA Lite\is-NU19R.tmp | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2820 | Kazaa.exe | GET | — | 217.116.227.249:80 | http://217.116.227.249/topsearch/tsi2.cab | DK | — | — | unknown |
2820 | Kazaa.exe | GET | 200 | 188.166.71.81:80 | http://arthygeo.info/?src=83+ex+casino+ms+x33+cas+clssc&dom=altnetp2p.com | NL | html | 472 b | whitelisted |
2820 | Kazaa.exe | GET | 301 | 104.27.143.106:80 | http://www.altnetp2p.com/topsearch/tsi2.cab | US | html | 178 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 68.11.180.219:1214 | — | Cox Communications Inc. | US | unknown |
— | — | 128.101.112.173:1214 | — | University of Minnesota | US | unknown |
— | — | 24.47.112.127:1214 | — | Cablevision Systems Corp. | US | unknown |
— | — | 24.192.78.69:1214 | — | WideOpenWest Finance LLC | US | unknown |
— | — | 24.53.63.21:1214 | — | Videotron Telecom Ltee | CA | unknown |
— | — | 24.52.117.124:1214 | — | Buckeye Cablevision, Inc. | US | unknown |
2820 | Kazaa.exe | 188.166.71.81:80 | arthygeo.info | Digital Ocean, Inc. | NL | unknown |
2820 | Kazaa.exe | 217.116.227.249:80 | — | Netgroup A/S | DK | unknown |
— | — | 12.253.238.10:1214 | — | AT&T Services, Inc. | US | unknown |
— | — | 61.96.135.103:1214 | — | DREAMLINE CO. | KR | unknown |
Domain | IP | Reputation |
---|---|---|
www.altnetp2p.com |
| suspicious |
altnetp2p.com |
| suspicious |
arthygeo.info |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Potential Corporate Privacy Violation | ET P2P Kazaa over UDP |
— | — | Generic Protocol Command Decode | SURICATA STREAM CLOSEWAIT FIN out of window |
Process | Message |
---|---|
Kazaa.exe |
CTopSearch::IndexUpdateProc(invalid main index on thread startup)
|
Kazaa.exe |
CTopSearch::IndexUpdateProc(invalid backup index on thread startup)
|
Kazaa.exe |
CTopSearch::IndexUpdateProc(invalid backup index)
|