| File name: | 8.exe |
| Full analysis: | https://app.any.run/tasks/7bd1c379-c66f-45f2-83d2-ff574dc896e3 |
| Verdict: | Malicious activity |
| Analysis date: | March 04, 2022, 12:56:55 |
| OS: | Windows 10 Professional (build: 16299, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 69BA88DE5E68683BED26E78693F03FB7 |
| SHA1: | EAFD5FCCF9F3C67D68D4217BA9FBADD2DFE96948 |
| SHA256: | FD860586369A9F082F023A05A34C4CF54B9B3A017B123E34FDC1AE138A919034 |
| SSDEEP: | 3072:QTpfE220vyTdHGM/pvANOhY97Aekz08wqxRFcaHxE:QtpimM/hMIY97ATz08bzrG |
| .exe | | | DOS Executable Generic (100) |
|---|
| Subsystem: | Windows GUI |
|---|---|
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x1d450 |
| UninitializedDataSize: | - |
| InitializedDataSize: | - |
| CodeSize: | 162816 |
| LinkerVersion: | 10 |
| PEType: | PE32 |
| TimeStamp: | 2011:09:29 06:27:29+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 29-Sep-2011 04:27:29 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x5245 |
| Pages in file: | 0x00E8 |
| Relocations: | 0x0000 |
| Size of header: | 0x5800 |
| Min extra paragraphs: | 0xE883 |
| Max extra paragraphs: | 0x8B09 |
| Initial SS value: | 0x83C8 |
| Initial SP value: | 0x3CC0 |
| Checksum: | 0x008B |
| Initial IP value: | 0xC103 |
| Initial CS value: | 0xC083 |
| Overlay number: | 0xFF08 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000B8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 1 |
| Time date stamp: | 29-Sep-2011 04:27:29 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00027B6C | 0x00027C00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.32503 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 900 | /c del "C:\Users\admin\Desktop\8.exe" | C:\Windows\SysWOW64\cmd.exe | — | raserver.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 996 | C:\WINDOWS\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09} | C:\WINDOWS\system32\DllHost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2720 | "C:\Program Files\Mozilla Firefox\Firefox.exe" | C:\Program Files\Mozilla Firefox\Firefox.exe | — | raserver.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 84.0 Modules
| |||||||||||||||
| 2860 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | \??\C:\WINDOWS\system32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3112 | "C:\Windows\SysWOW64\raserver.exe" | C:\Windows\SysWOW64\raserver.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3436 | C:\WINDOWS\Explorer.EXE | C:\WINDOWS\Explorer.EXE | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4512 | "C:\Users\admin\Desktop\8.exe" | C:\Users\admin\Desktop\8.exe | — | Explorer.EXE | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 4540 | "C:\Program Files (x86)\Hdxj8y\winyvg4cvfp.exe" | C:\Program Files (x86)\Hdxj8y\winyvg4cvfp.exe | — | Explorer.EXE | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3436) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (3436) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: 9B0C226200000000 | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3112) raserver.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\61\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E | binary | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E | der | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D | der | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7A2566B0F62A979AF1A98E46C5B275CF | binary | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7A2566B0F62A979AF1A98E46C5B275CF | der | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\S1SUK09Q\euv4[1].htm | html | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\G91AFSNL\euv4[1].htm | html | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:— | SHA256:— | |||
| 3112 | raserver.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\0R23F2I3\euv4[1].htm | html | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3112 | raserver.exe | GET | 302 | 164.155.212.158:80 | http://www.turkcuyuz.com/euv4/?rtxXt=3OQtiNXh+wtFz8SCz/eMPGMDt0zVl+r60W+m0NU9E763oXZXwvDQkSXGmk8=&3flpdZ=XN9pmdeXgT4P5p0p | ZA | — | — | malicious |
3112 | raserver.exe | GET | 301 | 167.86.90.254:80 | http://www.alifdanismanlik.com/euv4/?rtxXt=TRVfPiqkTC84tdYg/KiHpdfMWo5oXu88iiOypom329GZBOB1ixIt/ccz2Tw=&3flpdZ=XN9pmdeXgT4P5p0p | US | — | — | malicious |
3112 | raserver.exe | GET | 200 | 104.18.30.182:80 | http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQDl%2BKawXnSxln5J5gCs%2Byta | US | der | 472 b | whitelisted |
3112 | raserver.exe | GET | 404 | 3.33.152.147:80 | http://www.nathanmartinez.digital/euv4/?rtxXt=mGXTyzJialrGJ6ePw2OLDmnY/3pKgDV4z5J4hNo/NMrjj/f7OqxMvsPq+Zk=&3flpdZ=XN9pmdeXgT4P5p0p | US | html | 48 b | malicious |
3112 | raserver.exe | GET | 200 | 104.18.31.182:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D | US | der | 727 b | whitelisted |
3112 | raserver.exe | GET | 200 | 3.223.162.31:80 | http://www.teamidc.com/euv4/?rtxXt=hsP8jj2A4+3bkioolzk9x22j/b9mKfqd/wTwKW7IEmrhPiD8gI7OcIa2j1U=&3flpdZ=XN9pmdeXgT4P5p0p | US | html | 5.19 Kb | malicious |
3112 | raserver.exe | GET | 200 | 104.18.30.182:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | US | der | 471 b | whitelisted |
3112 | raserver.exe | GET | 404 | 52.20.218.92:80 | http://www.1207rossmoyne.com/euv4/?rtxXt=TT1JpN8L+7jajMh2m+yzKcbRRK1qHB2HVZAqXaTI7ZSCN6N8dyHZSsJ8Vek=&3flpdZ=XN9pmdeXgT4P5p0p | US | text | 55 b | malicious |
3112 | raserver.exe | GET | 404 | 167.86.90.254:80 | http://alifdanismanlik.com/euv4/?rtxXt=TRVfPiqkTC84tdYg/KiHpdfMWo5oXu88iiOypom329GZBOB1ixIt/ccz2Tw=&3flpdZ=XN9pmdeXgT4P5p0p | US | html | 175 Kb | malicious |
3112 | raserver.exe | GET | 403 | 103.120.80.144:8181 | http://www.77777.store:8181/euv4/?rtxXt=sV2k1WKFW/h3tnt1SxvAMNLfS+Ge3XGMDmXR9Q72EWiP35CH9Wik44u4CjM=&Zjh=VXRlp0oP5 | unknown | html | 23 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3112 | raserver.exe | 3.33.152.147:80 | www.nathanmartinez.digital | — | US | malicious |
3112 | raserver.exe | 164.155.212.158:80 | www.turkcuyuz.com | IS | ZA | malicious |
3112 | raserver.exe | 162.0.232.72:80 | www.jasabacklinkweb20.com | AirComPlus Inc. | CA | malicious |
3112 | raserver.exe | 162.0.232.72:443 | www.jasabacklinkweb20.com | AirComPlus Inc. | CA | malicious |
3112 | raserver.exe | 104.18.30.182:80 | ocsp.comodoca.com | Cloudflare Inc | US | suspicious |
3112 | raserver.exe | 206.188.193.217:80 | www.launchclik.com | Defense.Net, Inc | US | malicious |
3112 | raserver.exe | 52.20.218.92:80 | www.1207rossmoyne.com | Amazon.com, Inc. | US | malicious |
3112 | raserver.exe | 167.86.90.254:80 | www.alifdanismanlik.com | Arapahoe School District #6 | US | malicious |
3112 | raserver.exe | 3.223.162.31:80 | www.teamidc.com | — | US | malicious |
3112 | raserver.exe | 103.120.80.144:80 | www.77777.store | — | — | malicious |
Domain | IP | Reputation |
|---|---|---|
www.nathanmartinez.digital |
| malicious |
www.turkcuyuz.com |
| malicious |
www.jasabacklinkweb20.com |
| malicious |
ocsp.comodoca.com |
| whitelisted |
ocsp.usertrust.com |
| whitelisted |
ocsp.sectigo.com |
| whitelisted |
www.thecuratedpour.com |
| malicious |
www.rematedeldia.com |
| malicious |
rematedeldia.com |
| malicious |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
3112 | raserver.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |