analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

trojan3.exe

Full analysis: https://app.any.run/tasks/ce74d18d-e042-45c1-af64-c4270c075a04
Verdict: Malicious activity
Threats:

Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.

Analysis date: January 22, 2019, 23:59:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
miner
loader
xmrig
trojan
stealer
arkei
vidar
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

A0D69C1B3F868D7030231D564E059FB1

SHA1:

9090167034C7CE3D61F6E73401C48CCD78F85351

SHA256:

FBE0A158C362405D480D40676E5BDA3A9B97047F61661B9F72FF7AFA30F1697D

SSDEEP:

49152:PoMUcFI5eqRRDVsv4HHB150jqVg7HkpHMse9aglouPDAIRdPsP+fL9LQhq6/wvo/:PTUaI9OMzejqikpYbAI7XLyhq6IvorA+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • DOC001.exe (PID: 2612)
      • DOC001.exe (PID: 4044)
    • Loads dropped or rewritten executable

      • DOC001.exe (PID: 2612)
      • DOC001.exe (PID: 4044)
      • jar2.exe (PID: 2684)
      • jar2.exe (PID: 2680)
    • Writes to a start menu file

      • DOC001.exe (PID: 2612)
      • DOC001.exe (PID: 4044)
    • Application was dropped or rewritten from another process

      • java.exe (PID: 2864)
      • java1.exe (PID: 3712)
      • jar2.exe (PID: 2684)
      • nsB502.tmp (PID: 4092)
      • nsB3A9.tmp (PID: 2812)
      • DOC001.exe (PID: 4044)
      • nsB65B.tmp (PID: 3444)
      • dhelper.exe (PID: 2560)
      • java.exe (PID: 3552)
      • java12.exe (PID: 2172)
      • nsC7CD.tmp (PID: 2920)
      • nsC8C8.tmp (PID: 2400)
      • jar2.exe (PID: 2680)
      • nsCA31.tmp (PID: 2760)
      • lsm.exe (PID: 3656)
      • dhelper.exe (PID: 2356)
    • Downloads executable files from the Internet

      • DOC001.exe (PID: 2612)
      • DOC001.exe (PID: 4044)
    • Changes the login/logoff helper path in the registry

      • jar2.exe (PID: 2684)
      • jar2.exe (PID: 2680)
    • Uses Task Scheduler to run other applications

      • java12.exe (PID: 2172)
    • ARKEI was detected

      • java12.exe (PID: 2172)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2340)
  • SUSPICIOUS

    • Creates files in the user directory

      • DOC001.exe (PID: 2612)
      • trojan3.exe (PID: 3056)
      • java1.exe (PID: 3712)
      • cmd.exe (PID: 3512)
      • cmd.exe (PID: 2892)
      • DOC001.exe (PID: 4044)
    • Executable content was dropped or overwritten

      • trojan3.exe (PID: 3056)
      • java.exe (PID: 2864)
      • DOC001.exe (PID: 2612)
      • java1.exe (PID: 3712)
      • jar2.exe (PID: 2684)
      • cmd.exe (PID: 2892)
      • DOC001.exe (PID: 4044)
      • java12.exe (PID: 2172)
      • jar2.exe (PID: 2680)
    • Dropped object may contain URLs of mainers pools

      • DOC001.exe (PID: 2612)
      • DOC001.exe (PID: 4044)
    • Starts itself from another location

      • trojan3.exe (PID: 3056)
      • java1.exe (PID: 3712)
    • Starts application with an unusual extension

      • jar2.exe (PID: 2684)
      • jar2.exe (PID: 2680)
    • Starts CMD.EXE for commands execution

      • nsB3A9.tmp (PID: 2812)
      • nsB65B.tmp (PID: 3444)
      • nsB502.tmp (PID: 4092)
      • nsC8C8.tmp (PID: 2400)
      • nsC7CD.tmp (PID: 2920)
      • java12.exe (PID: 2172)
      • nsCA31.tmp (PID: 2760)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 684)
      • cmd.exe (PID: 296)
    • Creates files in the program directory

      • java12.exe (PID: 2172)
    • Executes application which crashes

      • cmd.exe (PID: 3508)
  • INFO

    • Drop XMRig executable file

      • DOC001.exe (PID: 4044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 23:52:12+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 308224
UninitializedDataSize: 8192
EntryPoint: 0x30fa
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 05-Dec-2009 22:52:12
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 05-Dec-2009 22:52:12
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005C4C
0x00005E00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.4388
.rdata
0x00007000
0x0000129C
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04684
.data
0x00009000
0x00048C58
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.79628
.ndata
0x00052000
0x00040000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00092000
0x0000F160
0x0000F200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.88476

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.20956
716
UNKNOWN
English - United States
RT_MANIFEST
2
3.95465
9640
UNKNOWN
English - United States
RT_ICON
3
4.44806
4264
UNKNOWN
English - United States
RT_ICON
4
4.74717
3752
UNKNOWN
English - United States
RT_ICON
5
5.41664
2216
UNKNOWN
English - United States
RT_ICON
6
2.9738
1640
UNKNOWN
English - United States
RT_ICON
7
3.83015
1384
UNKNOWN
English - United States
RT_ICON
8
5.32149
1128
UNKNOWN
English - United States
RT_ICON
9
3.26704
744
UNKNOWN
English - United States
RT_ICON
10
3.05995
296
UNKNOWN
English - United States
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
29
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start trojan3.exe doc001.exe java.exe java1.exe jar2.exe nsb3a9.tmp no specs cmd.exe no specs nsb502.tmp no specs cmd.exe nsb65b.tmp no specs cmd.exe no specs taskkill.exe no specs dhelper.exe doc001.exe java.exe no specs #ARKEI java12.exe schtasks.exe no specs jar2.exe nsc7cd.tmp no specs cmd.exe no specs nsc8c8.tmp no specs cmd.exe no specs cmd.exe no specs ntvdm.exe no specs nsca31.tmp no specs cmd.exe no specs taskkill.exe no specs dhelper.exe lsm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3056"C:\Users\admin\AppData\Local\Temp\trojan3.exe" C:\Users\admin\AppData\Local\Temp\trojan3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
2612"C:\Users\admin\AppData\Roaming\Temp\DOC001.exe" C:\Users\admin\AppData\Roaming\Temp\DOC001.exe
trojan3.exe
User:
admin
Integrity Level:
MEDIUM
2864"C:\Users\admin\AppData\Local\Temp\java.exe" -pJavajre_set7zC:\Users\admin\AppData\Local\Temp\java.exe
DOC001.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3712"C:\Users\admin\AppData\Local\Temp\java1.exe" -pJavajre_set8zC:\Users\admin\AppData\Local\Temp\java1.exe
DOC001.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
2684"C:\Users\admin\AppData\Local\Temp\Javatemp\jar2.exe" C:\Users\admin\AppData\Local\Temp\Javatemp\jar2.exe
java.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2812"C:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB3A9.tmp" cmd /C copy /b %temp%\Javatemp\ini.jwd C:\Users\admin\AppData\Roaming\cppredistx86.exeC:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB3A9.tmpjar2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3512cmd /C copy /b %temp%\Javatemp\ini.jwd C:\Users\admin\AppData\Roaming\cppredistx86.exeC:\Windows\system32\cmd.exensB3A9.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4092"C:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB502.tmp" cmd /C copy /b %temp%\Javatemp\jare.7z1 + %temp%\Javatemp\temps.7z1 C:\Users\admin\AppData\Roaming\dhelper.exeC:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB502.tmpjar2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2892cmd /C copy /b %temp%\Javatemp\jare.7z1 + %temp%\Javatemp\temps.7z1 C:\Users\admin\AppData\Roaming\dhelper.exeC:\Windows\system32\cmd.exe
nsB502.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3444"C:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB65B.tmp" cmd /C taskkill /f /im dhelper.exe & start C:\Users\admin\AppData\Roaming\dhelper.exeC:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB65B.tmpjar2.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
3 017
Read events
2 921
Write events
96
Delete events
0

Modification events

(PID) Process:(3056) trojan3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3056) trojan3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2612) DOC001.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:
Value:
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2612) DOC001.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOC001_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
25
Suspicious files
1
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
2864java.exeC:\Users\admin\AppData\Local\Temp\Javatemp\ini.jwd
MD5:
SHA256:
2684jar2.exeC:\Users\admin\AppData\Local\Temp\nsrB398.tmp
MD5:
SHA256:
2612DOC001.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\java[1].datexecutable
MD5:C5535409ED97CB0C483CD7C31CDF973D
SHA256:59044DDB0176647230470A213AD97F4385AE92D527D7A12F2F107BDC74C6BA06
2864java.exeC:\Users\admin\AppData\Local\Temp\Javatemp\temps.7z1binary
MD5:72AB701A0C7EDF6A4BD655637CF12561
SHA256:D0EE586A802B7906796C71C37076760796E7E36F30E6424674FF14E2554ABD1A
2684jar2.exeC:\Users\admin\AppData\Local\Temp\nsgB3A8.tmp\nsB65B.tmpexecutable
MD5:37707A29BD8EFBEB912019737BB2B584
SHA256:4751809EF6FD3CED738392E7C5DF6D4E3938D85711DAA0B52B045B5092913C27
3056trojan3.exeC:\Users\admin\AppData\Roaming\Temp\DOC001.exeexecutable
MD5:A0D69C1B3F868D7030231D564E059FB1
SHA256:FBE0A158C362405D480D40676E5BDA3A9B97047F61661B9F72FF7AFA30F1697D
2612DOC001.exeC:\Users\admin\AppData\Local\Temp\java.exeexecutable
MD5:C5535409ED97CB0C483CD7C31CDF973D
SHA256:59044DDB0176647230470A213AD97F4385AE92D527D7A12F2F107BDC74C6BA06
2612DOC001.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnklnk
MD5:E68CA068A5BF82AB641313ECA8C1FAA9
SHA256:296AEDBE8D4DF35D9CE10315D07D475B6D37848D38F34F9F11EED3E76378212D
2864java.exeC:\Users\admin\AppData\Local\Temp\Javatemp\jare.7z1executable
MD5:14EC03D49A0457377CD2B4F3A707D6EB
SHA256:353B4F2D3680385C364B5B7777704DDC2A126653D34BC1FCD52884F9F49A79F7
2864java.exeC:\Users\admin\AppData\Local\Temp\Javatemp\jar2.exeexecutable
MD5:E6C0BBD63D7A40F9548AA4CF00F04AE7
SHA256:C0540983C65310C18C1070E9BA1B874307AA667147F382BF047A1E810E840CC3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
9
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2560
dhelper.exe
GET
208.100.26.251:80
http://ce893c41a8.pw/index.php?a=1&h=0b76&b=1&p=d1&i=0401758B8503A6D9AF73594421B467F7
US
malicious
4044
DOC001.exe
GET
200
195.208.1.107:80
http://kriso.ru/java12.dat
RU
executable
200 Kb
malicious
2356
dhelper.exe
GET
208.100.26.251:80
http://6ae79845b2.pw/index.php?a=1&h=4f2f&b=1&p=d1&i=8ECE0ECD731C0F598247F2D34163159D
US
malicious
2612
DOC001.exe
GET
200
195.208.1.107:80
http://rucop.ru/java.dat
RU
executable
2.04 Mb
malicious
2356
dhelper.exe
GET
208.100.26.251:80
http://ce893c41a8.pw/index.php?a=1&h=0b76&b=1&p=d1&i=8ECE0ECD731C0F598247F2D34163159D
US
malicious
2612
DOC001.exe
GET
200
195.208.1.107:80
http://kriso.ru/java1.dat
RU
executable
1009 Kb
malicious
2172
java12.exe
POST
301
88.99.66.31:80
http://2no.co/1ajz97
DE
html
178 b
whitelisted
2172
java12.exe
POST
405
195.208.1.107:80
http://ioad.pw/ioad.exe
RU
html
182 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2172
java12.exe
88.99.66.31:443
2no.co
Hetzner Online GmbH
DE
malicious
2172
java12.exe
88.99.66.31:80
2no.co
Hetzner Online GmbH
DE
malicious
2560
dhelper.exe
208.100.26.251:80
ce893c41a8.pw
Steadfast
US
suspicious
4044
DOC001.exe
195.208.1.107:80
rucop.ru
Autonomous Non-commercial Organization Regional Network Information Center
RU
suspicious
2172
java12.exe
195.208.1.107:80
rucop.ru
Autonomous Non-commercial Organization Regional Network Information Center
RU
suspicious
2612
DOC001.exe
195.208.1.107:80
rucop.ru
Autonomous Non-commercial Organization Regional Network Information Center
RU
suspicious
2356
dhelper.exe
208.100.26.251:80
ce893c41a8.pw
Steadfast
US
suspicious

DNS requests

Domain
IP
Reputation
rucop.ru
  • 195.208.1.107
malicious
kriso.ru
  • 195.208.1.107
malicious
ce893c41a8.pw
  • 208.100.26.251
malicious
2no.co
  • 88.99.66.31
whitelisted
ioad.pw
  • 195.208.1.107
malicious
6ae79845b2.pw
  • 208.100.26.251
malicious
fa41b00ded.pw
unknown
cfa7fed9a2.pw
unknown
7bedab72f1.pw
unknown
fe32f3c117.pw
unknown

Threats

PID
Process
Class
Message
2612
DOC001.exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
2612
DOC001.exe
Misc activity
SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer
2612
DOC001.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2612
DOC001.exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
2612
DOC001.exe
Misc activity
SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer
2612
DOC001.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4044
DOC001.exe
A Network Trojan was detected
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
4044
DOC001.exe
Misc activity
SUSPICIOUS [PTsecurity] Suspicious HTTP header - Sometimes used by hostile installer
4044
DOC001.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2 ETPRO signatures available at the full report
No debug info