| download: | download.php |
| Full analysis: | https://app.any.run/tasks/c2a0bacc-eaac-4bb9-93bb-9a45b2825cef |
| Verdict: | Malicious activity |
| Analysis date: | September 24, 2020, 00:56:47 |
| OS: | Windows 10 Professional (build: 16299, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | MS-DOS executable, MZ for MS-DOS |
| MD5: | 2CDCCCBFF7ADA18B899262ECCDF4AC86 |
| SHA1: | 432ECCB40199C4F19FCD28C0A75AE21688E0D05E |
| SHA256: | FD26C3E64876FFCE56D11C776CB021901256DA127A90383A0BD340CFBC0A361B |
| SSDEEP: | 12288:R3EG38OCsRBwJp6vi7gTJ1U0zvW41cGBdKuK73SLFQ7+zG:pDK7/Eo0qkndKuAonz |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:09:23 15:46:26+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 14.16 |
| CodeSize: | 1070080 |
| InitializedDataSize: | 209920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x13b131 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 23-Sep-2020 13:46:26 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0040 |
| Pages in file: | 0x0001 |
| Relocations: | 0x0000 |
| Size of header: | 0x0002 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0xB400 |
| OEM information: | 0xCD09 |
| Address of NE header: | 0x00000040 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 2 |
| Time date stamp: | 23-Sep-2020 13:46:26 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.MPRESS1 | 0x00001000 | 0x0013A000 | 0x0007C600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.9996 |
.MPRESS2\xc0\x0c | 0x0013B000 | 0x00000CC0 | 0x00000E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.70192 |
ESENT.dll |
KERNEL32.DLL |
USER32.dll |
WINHTTP.dll |
WS2_32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 652 | "C:\Users\admin\AppData\Local\Temp\download.php.exe" | C:\Users\admin\AppData\Local\Temp\download.php.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2068 | "C:\Program Files (x86)\Internet Explorer\IELowutil.exe" -PID:123 | C:\Program Files (x86)\Internet Explorer\IELowutil.exe | — | download.php.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Low-Mic Utility Tool Exit code: 2147942487 Version: 11.00.16299.371 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (652) download.php.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (652) download.php.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (652) download.php.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (652) download.php.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (652) download.php.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 652 | download.php.exe | C:\Users\admin\AppData\Local\Temp\d | — | |
MD5:— | SHA256:— | |||
| 652 | download.php.exe | C:\Users\admin\AppData\Local\Temp\tmp.edb | — | |
MD5:— | SHA256:— | |||
| 652 | download.php.exe | C:\Users\admin\AppData\Local\Temp\d-shm | — | |
MD5:— | SHA256:— | |||
| 652 | download.php.exe | C:\Users\admin\AppData\Local\Temp\d.INTEG.RAW | text | |
MD5:— | SHA256:— | |||
| 652 | download.php.exe | C:\Users\admin\AppData\Local\Temp\d.jfm | pcx | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
652 | download.php.exe | GET | 302 | 157.240.20.35:443 | https://www.facebook.com/ads/manager/accounts | US | — | — | whitelisted |
652 | download.php.exe | GET | 200 | 101.36.107.74:80 | http://md.9awi.pw/seemorebty/il.php?e=download.php | CN | — | — | malicious |
652 | download.php.exe | GET | 302 | 157.240.20.35:443 | https://www.facebook.com/recover/initiate/?ars=facebook_login%22%3EForgot%20Password?%3C/a%3E%0A%3C/div%3E%0A%3Cdiv%20class=%22_8icz%22%3E%0A%3C/div%3E%0A%3Cdiv%20class=%22_6ltg%22%3E%0A%3Ca%20role=%22button%22%20class=%22_42ft%20_4jy0%20_6lti%20_4jy6%20_4jy2%20selected%20_51sy%22%20href=%22%23%22%20ajaxify=%22/reg/spotlight/%22%20id=%22u_0_2%22%20data-testid=%22open-registration-form-button%22%20rel=%22async%22%3ECreate%20New%20Account%3C/a%3E%0A%3C/div%3E%0A%3C/form%3E%0A%3C/div%3E%0A%3Cdiv%20id=%22reg_pages_msg%22%20class=%22_58mk%22%3E%0A%3Ca%20href=%22/pages/create/?ref_type=registration_form%22%20class=%22_8esh%22%3ECreate%20a%20Page%3C/a%3E%20for%20a%20celebrity,%20band%20or%20business.%3C/div%3E%0A%3C/div%3E%0A%3C/div%3E%0A%3C/div%3E%0A%3C/div%3E%0A%3C/div%3E%0A%3C/div%3E%0A%3Cdiv%20class=%22%22%3E%0A%3Cdiv%20class=%22_8opy%20_95ke%22%3E%0A%3Cdiv%20id=%22pageFooter%22%20data-referrer=%22page_footer%22%20data-testid=%22page_footer%22%3E%0A%3Cul%20class=%22uiList%20localeSelectorList%20_2pid%20_509-%20_4ki%20_6-h%20_6-j%20_6-i%22%20data-nocookies=%221%22%3E%0A%3Cli%3EEnglish%20(US)%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://de-de.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("de_DE",%20"en_US",%20"https:%5C/%5C/de-de.facebook.com%5C/",%20"www_list_selector",%200);%20return%20false;%22%20title=%22German%22%3EDeutsch%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://tr-tr.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("tr_TR",%20"en_US",%20"https:%5C/%5C/tr-tr.facebook.com%5C/",%20"www_list_selector",%201);%20return%20false;%22%20title=%22Turkish%22%3ETürkçe%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://pl-pl.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("pl_PL",%20"en_US",%20"https:%5C/%5C/pl-pl.facebook.com%5C/",%20"www_list_selector",%202);%20return%20false;%22%20title=%22Polish%22%3EPolski%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://it-it.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("it_IT",%20"en_US",%20"https:%5C/%5C/it-it.facebook.com%5C/",%20"www_list_selector",%203);%20return%20false;%22%20title=%22Italian%22%3EItaliano%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://fr-fr.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("fr_FR",%20"en_US",%20"https:%5C/%5C/fr-fr.facebook.com%5C/",%20"www_list_selector",%204);%20return%20false;%22%20title=%22French%20(France)%22%3EFrançais%20(France)%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://ro-ro.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("ro_RO",%20"en_US",%20"https:%5C/%5C/ro-ro.facebook.com%5C/",%20"www_list_selector",%205);%20return%20false;%22%20title=%22Romanian%22%3ERomână%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://ru-ru.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("ru_RU",%20"en_US",%20"https:%5C/%5C/ru-ru.facebook.com%5C/",%20"www_list_selector",%206);%20return%20false;%22%20title=%22Russian%22%3EРусский%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22rtl%22%20href=%22https://ar-ar.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("ar_AR",%20"en_US",%20"https:%5C/%5C/ar-ar.facebook.com%5C/",%20"www_list_selector",%207);%20return%20false;%22%20title=%22Arabic%22%3Eالعربية%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://es-la.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("es_LA",%20"en_US",%20"https:%5C/%5C/es-la.facebook.com%5C/",%20"www_list_selector",%208);%20return%20false;%22%20title=%22Spanish%22%3EEspañol%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20class=%22_sv4%22%20dir=%22ltr%22%20href=%22https://pt-br.facebook.com/%22%20onclick=%22require("IntlUtils").setCookieLocale("pt_BR",%20"en_US",%20"https:%5C/%5C/pt-br.facebook.com%5C/",%20"www_list_selector",%209);%20return%20false;%22%20title=%22Portuguese%20(Brazil)%22%3EPortuguês%20(Brasil)%3C/a%3E%0A%3C/li%3E%0A%3Cli%3E%0A%3Ca%20role=%22button%22%20class=%22_42ft%20_4jy0%20_517i%20_517h%20_51sy%22%20rel=%22dialog%22%20ajaxify=%22/settings/language/language/?uri=https%3A%2F%2Fpt-br.facebook.com%2F&source=www_list_selector_more%22%20href=%22%23%22%20title=%22Show%20more%20languages%22%3E%0A%3Ci%20class=%22img%20sp_jtfWiJhxe2I%20sx_cf1145%22%3E%0A%3C/i%3E%0A%3C/a%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cdiv%20id=%22contentCurve%22%3E%0A%3C/div%3E%0A%3Cdiv%20id=%22pageFooterChildren | US | — | — | whitelisted |
652 | download.php.exe | GET | — | 157.240.20.35:443 | https://www.facebook.com/settings | US | — | — | whitelisted |
652 | download.php.exe | GET | 200 | 157.240.20.35:443 | https://www.facebook.com/ | US | html | 187 Kb | whitelisted |
652 | download.php.exe | GET | 200 | 157.240.20.35:443 | https://www.facebook.com/login/identify/?ctx=recover&ars=facebook_login%22%3EForgot+Password%3F%3C%2Fa%3E%0A%3C%2Fdiv%3E%0A%3Cdiv+class%3D%22_8icz%22%3E%0A%3C%2Fdiv%3E%0A%3Cdiv+class%3D%22_6ltg%22%3E%0A%3Ca+role%3D%22button%22+class%3D%22_42ft+_4jy0+_6lti+_4jy6+_4jy2+selected+_51sy%22+href%3D%22%23%22+ajaxify%3D%22%2Freg%2Fspotlight%2F%22+id%3D%22u_0_2%22+data-testid%3D%22open-registration-form-button%22+rel%3D%22async%22%3ECreate+New+Account%3C%2Fa%3E%0A%3C%2Fdiv%3E%0A%3C%2Fform%3E%0A%3C%2Fdiv%3E%0A%3Cdiv+id%3D%22reg_pages_msg%22+class%3D%22_58mk%22%3E%0A%3Ca+href%3D%22%2Fpages%2Fcreate%2F%3Fref_type%3Dregistration_form%22+class%3D%22_8esh%22%3ECreate+a+Page%3C%2Fa%3E+for+a+celebrity%2C+band+or+business.%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3C%2Fdiv%3E%0A%3Cdiv+class%3D%22%22%3E%0A%3Cdiv+class%3D%22_8opy+_95ke%22%3E%0A%3Cdiv+id%3D%22pageFooter%22+data-referrer%3D%22page_footer%22+data-testid%3D%22page_footer%22%3E%0A%3Cul+class%3D%22uiList+localeSelectorList+_2pid+_509-+_4ki+_6-h+_6-j+_6-i%22+data-nocookies%3D%221%22%3E%0A%3Cli%3EEnglish+%28US%29%3C%2Fli%3E%0A%3Cli%3E%0A%3Ca+class%3D%22_sv4%22+dir%3D%22ltr%22+href%3D%22https%3A%2F%2Fde-de.facebook.com%2F%22+onclick%3D%22require%28 | US | html | 217 Kb | whitelisted |
652 | download.php.exe | GET | 200 | 157.240.20.35:443 | https://www.facebook.com/index.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccounts | US | html | 190 Kb | whitelisted |
652 | download.php.exe | POST | 200 | 101.36.107.74:80 | http://md.9awi.pw/seemorebty/ | CN | text | 3 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
652 | download.php.exe | 157.240.20.35:443 | www.facebook.com | Facebook, Inc. | US | whitelisted |
652 | download.php.exe | 101.36.107.74:80 | md.9awi.pw | — | CN | malicious |
Domain | IP | Reputation |
|---|---|---|
md.9awi.pw |
| malicious |
www.facebook.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1940 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
652 | download.php.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
652 | download.php.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
Process | Message |
|---|---|
download.php.exe | |
download.php.exe | |
download.php.exe | |
download.php.exe | NtQuerySystemInformation |
download.php.exe | |
download.php.exe | |
download.php.exe | |
download.php.exe | DuplicateHandle |
download.php.exe | OpenProcess |
download.php.exe | |