File name:

9ea5dad528a750951b8a5a7285e2b6a2.exe

Full analysis: https://app.any.run/tasks/a65ad7f2-e09f-402e-b8d4-35ae4c0a7ad5
Verdict: Malicious activity
Analysis date: February 25, 2021, 01:52:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9EA5DAD528A750951B8A5A7285E2B6A2

SHA1:

B30C80F5E75C28016F73772F8E22029A90F33698

SHA256:

FB4E564B52DDF0DBB652936EB0C4D23A49DCBB7C30238A85CD5D3164F7996DFB

SSDEEP:

49152:YOHOkWmTKvUyXqpgK4LB1sbAZ7Tx2fTZKGGICZpjCkcC6xz:XukxTKvUUggK4LnsbAZ7V0QvLCL7h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • DefaultPack.EXE (PID: 2256)
    • Actions looks like stealing of personal data

      • DefaultPack.EXE (PID: 2256)
      • DefaultSetup.exe (PID: 1676)
    • Steals credentials from Web Browsers

      • DefaultPack.EXE (PID: 2256)
      • DefaultSetup.exe (PID: 1676)
    • Application was dropped or rewritten from another process

      • BingSvc.exe (PID: 312)
      • DefaultPack.EXE (PID: 2256)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 9ea5dad528a750951b8a5a7285e2b6a2.exe (PID: 968)
      • DefaultPack.EXE (PID: 2256)
    • Drops a file that was compiled in debug mode

      • 9ea5dad528a750951b8a5a7285e2b6a2.exe (PID: 968)
      • DefaultPack.EXE (PID: 2256)
    • Creates files in the user directory

      • DefaultPack.EXE (PID: 2256)
      • DefaultSetup.exe (PID: 1676)
    • Reads the cookies of Google Chrome

      • DefaultSetup.exe (PID: 1676)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 MS Cabinet Self-Extractor (WExtract stub) (80.4)
.exe | Win32 Executable MS Visual C++ (generic) (8.2)
.exe | Win64 Executable (generic) (7.3)
.dll | Win32 Dynamic Link Library (generic) (1.7)
.exe | Win32 Executable (generic) (1.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:05:03 04:39:07+02:00
PEType: PE32
LinkerVersion: 10.1
CodeSize: 26112
InitializedDataSize: 2902016
UninitializedDataSize: -
EntryPoint: 0x6926
OSVersion: 6.2
ImageVersion: 6.2
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.7.63.1
ProductVersionNumber: 1.7.63.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: DefaultPack.EXE
FileVersion: 1.7.63.1
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: DefaultPack.EXE
ProductVersion: 1.7.63.1

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 03-May-2013 02:39:07
Detected languages:
  • English - United States
Debug artifacts:
  • wextract.pdb
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 10.00.9200.16384 (win8_rtm.120725-1247)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: WEXTRACT.EXE .MUI
ProductName: Windows® Internet Explorer
ProductVersion: 10.00.9200.16384

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 03-May-2013 02:39:07
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006424
0x00006600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.30899
.data
0x00008000
0x00001E6C
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.58712
.idata
0x0000A000
0x000010BC
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.71259
.rsrc
0x0000C000
0x002C1E58
0x002C2000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.99064
.reloc
0x002CE000
0x00000E0A
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
4.33412

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.05393
1511
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.15864
744
Latin 1 / Western European
English - United States
RT_ICON
3
3.07737
488
Latin 1 / Western European
English - United States
RT_ICON
4
3.50949
296
Latin 1 / Western European
English - United States
RT_ICON
5
5.56662
3752
Latin 1 / Western European
English - United States
RT_ICON
6
5.94251
2216
Latin 1 / Western European
English - United States
RT_ICON
7
5.99361
1736
Latin 1 / Western European
English - United States
RT_ICON
8
3.37828
1384
Latin 1 / Western European
English - United States
RT_ICON
9
7.98515
55762
Latin 1 / Western European
English - United States
RT_ICON
10
5.33023
9640
Latin 1 / Western European
English - United States
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
Cabinet.dll
GDI32.dll
KERNEL32.dll
USER32.dll
VERSION.dll
msvcrt.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start 9ea5dad528a750951b8a5a7285e2b6a2.exe defaultpack.exe defaultsetup.exe bingsvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
312"C:\Users\admin\AppData\Local\Microsoft\BingSvc\BingSvc.exe"C:\Users\admin\AppData\Local\Microsoft\BingSvc\BingSvc.exeDefaultPack.EXE
User:
admin
Company:
© 2015 Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Bing Service
Exit code:
0
Version:
1.0.6.0
Modules
Images
c:\users\admin\appdata\local\microsoft\bingsvc\bingsvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
968"C:\Users\admin\AppData\Local\Temp\9ea5dad528a750951b8a5a7285e2b6a2.exe" C:\Users\admin\AppData\Local\Temp\9ea5dad528a750951b8a5a7285e2b6a2.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DefaultPack.EXE
Exit code:
1
Version:
1.7.63.1
Modules
Images
c:\users\admin\appdata\local\temp\9ea5dad528a750951b8a5a7285e2b6a2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1676"C:\Users\admin\AppData\Local\Microsoft\DefaultSetup\DefaultSetup.exe"C:\Users\admin\AppData\Local\Microsoft\DefaultSetup\DefaultSetup.exe
DefaultPack.EXE
User:
admin
Company:
© 2013 Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DefaultSetup
Exit code:
0
Version:
1.7.63.0
Modules
Images
c:\users\admin\appdata\local\microsoft\defaultsetup\defaultsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2256C:\Users\admin\AppData\Local\Temp\IXP000.TMP\DefaultPack.EXE silent=trueC:\Users\admin\AppData\Local\Temp\IXP000.TMP\DefaultPack.EXE
9ea5dad528a750951b8a5a7285e2b6a2.exe
User:
admin
Company:
© 2013 Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DefaultPack
Exit code:
1
Version:
1.7.63.0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\defaultpack.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
Total events
66
Read events
37
Write events
28
Delete events
1

Modification events

(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:ExtensionType
Value:
MSN
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:GCEXTN_DHP_DSE
Value:
fcfenmboojpjinhpgggodefccipikbpd
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:GCEXTN_DHP
Value:
fkkcgfbgohboipdhliafmacjnhjbhmim
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:GCEXTN_DSE
Value:
bmkckgpgekmanipelfidlhmkfcjicion
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:!DefaultSetup
Value:
C:\Users\admin\AppData\Local\Microsoft\DefaultSetup\DefaultSetup.exe
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:MachineID
Value:
A3EC12514E314D87A76E28B6D74E4AE7
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:InstallDate
Value:
2021-02-25
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:InstallTime
Value:
01:52:36:926
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\DefaultPack
Operation:writeName:PartnerCode
Value:
SL5G
(PID) Process:(2256) DefaultPack.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\BingSvc
Operation:writeName:PartnerCode
Value:
SL5G
Executable files
3
Suspicious files
2
Text files
16
Unknown types
0

Dropped files

PID
Process
Filename
Type
9689ea5dad528a750951b8a5a7285e2b6a2.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\DefaultPack.EXEexecutable
MD5:
SHA256:
9689ea5dad528a750951b8a5a7285e2b6a2.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\InstallerConfig.xmlxml
MD5:
SHA256:
9689ea5dad528a750951b8a5a7285e2b6a2.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Logo_zh-cn.pngimage
MD5:7214EA91E5CD7B540910ADB606E556E1
SHA256:6568D7C59BBF58B9245F657B1CFCB5CACCA3BC8671FD7F58144421586B8C170B
9689ea5dad528a750951b8a5a7285e2b6a2.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Logo.pngimage
MD5:E91645A4224D56A7D4C0C8932F514347
SHA256:BBA7FDD9D7CD6715A1893D29ED63A20B9E20F5F73C4558A5AB28E252AE48D899
9689ea5dad528a750951b8a5a7285e2b6a2.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\SampleImage.pngimage
MD5:A3FD41E3A3B9B3D1E4650A964D5253C5
SHA256:419BF2FD29B3D55E4D9FD6FA8BC6955F570BF5CC995344675012CC13B6F9A9DC
1676DefaultSetup.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\searchplugins\bing-.xmlxml
MD5:
SHA256:
2256DefaultPack.EXEC:\Users\admin\AppData\Local\Microsoft\DefaultSetup\BrowserConfig.xmlxml
MD5:
SHA256:
1676DefaultSetup.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search-metadata.jsontext
MD5:
SHA256:
2256DefaultPack.EXEC:\Users\admin\AppData\Local\Microsoft\BingSvc\BingSvc.exeexecutable
MD5:
SHA256:
1676DefaultSetup.exeC:\Users\admin\AppData\Local\Microsoft\DefaultSetup\BrowserConfig.xmlxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2256
DefaultPack.EXE
GET
200
20.41.62.11:80
http://g.ceipmsn.com/8SE/44?MI=A3EC12514E314D87A76E28B6D74E4AE7&LV=1.7.63.0&OS=6.1.7601.1&TE=22&TV=isSL5G%7cpkDefaultPack%7crt2%7ctmen-us%7cdbIE%7chdMF68.0.1%20(x86%20en-US)%2c1*GC75.0.3770.100%2c1%7csdMF68.0.1%20(x86%20en-US)%2c1*GC75.0.3770.100%2c1%7cpo4%7cseMF68.0.1%20(x86%20en-US)%2c1*GC75.0.3770.100%2c1%7cbu1%7cfc4%7chpMF68.0.1%20(x86%20en-US)%2c1*GC75.0.3770.100%2c1%7cpf%7cdfDHP%2cMF68.0.1%20(x86%20en-US)%2c1*DSE%2cMF68.0.1%20(x86%20en-US)%2c1*DHP%2cGC75.0.3770.100%2c1*DSE%2cGC75.0.3770.100%2c1%7clc%7cld%7clt%7ccd2021-02-25%7cct01:52:36:926%7cabMF%2cGC%7csbIE%2cMF%2cGC%2cAS%7cio2%7cir%7cui0%7crc1%7cbs1
US
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2256
DefaultPack.EXE
20.41.62.11:80
g.ceipmsn.com
US
suspicious
1676
DefaultSetup.exe
20.41.62.11:80
g.ceipmsn.com
US
suspicious

DNS requests

Domain
IP
Reputation
g.ceipmsn.com
  • 20.41.62.11
suspicious

Threats

No threats detected
No debug info