| File name: | appFile.exe |
| Full analysis: | https://app.any.run/tasks/bdc63106-0032-49f0-9059-b32863d71d52 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | August 08, 2024, 15:05:51 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 24E36F44FEC4755F66C5F852FEB45B92 |
| SHA1: | 8C84E207DB3C3285E2E545E42543251ABAE411B0 |
| SHA256: | FE89D20B6821C597A077DFEF6CDE510EABC11E2CEEFEF2795C7474160D05C5AD |
| SSDEEP: | 98304:JlLgStou+raAejpn3ZVvR97QAZP69EV1b2vs5DDDLnSgBDBW7PoV4M+NYC9eiIiv:CuUw1eQtisE |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:08:08 12:23:14+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.39 |
| CodeSize: | 1167872 |
| InitializedDataSize: | 1047040 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x7bd885 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2024.2.2.25170 |
| ProductVersionNumber: | 2024.2.2.25170 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | Foxit Software Inc. |
| FileDescription: | Foxit PDF Reader Setup |
| FileVersion: | 2024.2.2.25170 |
| LegalCopyright: | Copyright © 2004-2024 Foxit Software Inc. All Rights Reserved. |
| ProductName: | Foxit PDF Reader Setup |
| ProductVersion: | 2024.2.2.25170 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6304 | "C:\Users\admin\AppData\Local\Temp\appFile.exe" | C:\Users\admin\AppData\Local\Temp\appFile.exe | — | explorer.exe | |||||||||||
User: admin Company: Foxit Software Inc. Integrity Level: MEDIUM Description: Foxit PDF Reader Setup Exit code: 3221226540 Version: 2024.2.2.25170 Modules
| |||||||||||||||
| 6356 | "C:\Users\admin\AppData\Local\Temp\appFile.exe" | C:\Users\admin\AppData\Local\Temp\appFile.exe | explorer.exe | ||||||||||||
User: admin Company: Foxit Software Inc. Integrity Level: HIGH Description: Foxit PDF Reader Setup Version: 2024.2.2.25170 Modules
| |||||||||||||||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6356) appFile.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:790CECCFA139D7B4BBFA4B5D1E2F40E6 | SHA256:A9FFE906F5EB6AFE3851406750764C445E35FAA41DDCBA5554E2B60B792C20D9 | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8 | der | |
MD5:971C514F84BBA0785F80AA1C23EDFD79 | SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895 | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | der | |
MD5:7FB5FA1534DCF77F2125B2403B30A0EE | SHA256:33A39E9EC2133230533A686EC43760026E014A3828C703707ACBC150FE40FD6F | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:B0A1D2697300326A1040FA75217ECA41 | SHA256:E4CE34D746678B1E6C0315796499141248D428F6A70C4278A355BE9AF160DCA9 | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:9D97F747F5E598E7C2A0C5177BAAF6D8 | SHA256:0E071CE8A703F0957FE0591EFB1CB8360D031D2824A843726280A66B243C6BE1 | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:3DFCA46E00FFA4795C72A41375F159D3 | SHA256:DCBA1A505396539BAC40A7253C9F5DCCF06CBB79957E21D56305E1FC3AF5F40E | |||
| 6356 | appFile.exe | C:\Users\admin\Documents\piratemamm\McD5YdM4gVbxz_4gzh3nNu2A.exe | executable | |
MD5:9B43256A33142E469ADBE046A1552781 | SHA256:ECE19F874768EA52EBE95047C61508402DEC21104CA6A5857C09C1F990EC983E | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\66b4b10e9ef0b_stealc_default[1].exe | executable | |
MD5:9B43256A33142E469ADBE046A1552781 | SHA256:ECE19F874768EA52EBE95047C61508402DEC21104CA6A5857C09C1F990EC983E | |||
| 6356 | appFile.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\file[1].exe | executable | |
MD5:F3F3BDFD954D90F103C1325AE009D815 | SHA256:BD535CD18038CAE0BE82E74E3541AA05249B50D1CD4D60B6B13C84568BD82DB0 | |||
| 6356 | appFile.exe | C:\Users\admin\Documents\piratemamm\bdUrVoLTXdBMOFLE6ZI9iEZm.exe | executable | |
MD5:F3F3BDFD954D90F103C1325AE009D815 | SHA256:BD535CD18038CAE0BE82E74E3541AA05249B50D1CD4D60B6B13C84568BD82DB0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2608 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6356 | appFile.exe | POST | 200 | 147.45.47.57:80 | http://147.45.47.57/api/twofish.php | unknown | — | — | unknown |
6356 | appFile.exe | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/prog/66b382f122c02_stk.exe | unknown | — | — | unknown |
6776 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6356 | appFile.exe | HEAD | 200 | 185.215.113.16:80 | http://185.215.113.16/games/nino.exe | unknown | — | — | suspicious |
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6356 | appFile.exe | GET | 200 | 147.45.47.57:80 | http://147.45.47.57/api/crazyfish.php | unknown | — | — | suspicious |
6356 | appFile.exe | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/prog/66b4b10e9ef0b_stealc_default.exe | unknown | — | — | malicious |
6356 | appFile.exe | HEAD | 302 | 194.58.114.223:80 | http://194.58.114.223/d/525403 | unknown | — | — | unknown |
6356 | appFile.exe | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/prog/66b45c742e0a1_123p.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4080 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5408 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6356 | appFile.exe | 147.45.47.57:80 | — | OOO FREEnet Group | RU | unknown |
6356 | appFile.exe | 104.26.9.59:443 | api.myip.com | CLOUDFLARENET | US | unknown |
6356 | appFile.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5336 | SearchApp.exe | 104.126.37.155:443 | www.bing.com | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
api.myip.com |
| whitelisted |
ipinfo.io |
| shared |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6356 | appFile.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 23 |
6356 | appFile.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
6356 | appFile.exe | A Network Trojan was detected | ET MALWARE PrivateLoader CnC Activity (GET) |
6356 | appFile.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) |
6356 | appFile.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
6356 | appFile.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
6356 | appFile.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6356 | appFile.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6356 | appFile.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |