| File name: | 12f4b96090bb7a1aa45768f68870ef90.exe |
| Full analysis: | https://app.any.run/tasks/8cad344e-7329-4c3d-842b-b59623d939d1 |
| Verdict: | Malicious activity |
| Threats: | A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet. |
| Analysis date: | November 08, 2023, 07:56:10 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 12F4B96090BB7A1AA45768F68870EF90 |
| SHA1: | 54ADFCC0E9DA25AEA9966EA76DDFC7E4940AF1A3 |
| SHA256: | FF63976D5CC3F2965EF707E4073440CA0FD9D976A02CCC766BF7A4D9AF9144E9 |
| SSDEEP: | 98304:fu+9nQV5NO8k40RX3Cy1OujjcntpHfkqAsxNprhuXlmx0ab3KeXKvan7OpcZ8G4I:wFJCu502D |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2023:10:14 10:37:34+02:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.29 |
| CodeSize: | 3204096 |
| InitializedDataSize: | 849920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8fcb6a |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.1.0 |
| ProductVersionNumber: | 1.0.1.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | StatusMessageResourceLib |
| FileVersion: | 1.0.1.0 |
| InternalName: | StatusMessageResourceLib.dll |
| LegalCopyright: | - |
| LegalTrademarks: | - |
| OriginalFileName: | StatusMessageResourceLib.dll |
| ProductName: | StatusMessageResourceLib |
| ProductVersion: | 1.0.1.0 |
| AssemblyVersion: | 1.0.1.35400 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 312 | C:\Windows\system32\RAServer.exe /offerraupdate | C:\Windows\System32\raserver.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 572 | icacls "C:\Users\admin\AppData\Local\2c7e2ed0-3c61-4fce-bd2b-765607c97484" /deny *S-1-1-0:(OI)(CI)(DE,DC) | C:\Windows\SysWOW64\icacls.exe | — | zHvlrAJQeeEdK27dnryLm2Ul.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 640 | "C:\Users\admin\Pictures\Minor Policy\4LERtRDy5nQC4vHgdNIFAGWN.exe" | C:\Users\admin\Pictures\Minor Policy\4LERtRDy5nQC4vHgdNIFAGWN.exe | 12f4b96090bb7a1aa45768f68870ef90.exe | ||||||||||||
User: admin Company: Biohazard Integrity Level: HIGH Description: METRO 2022 Dev Exit code: 0 Version: 5.1.1 Modules
| |||||||||||||||
| 648 | "C:\Users\admin\Pictures\Minor Policy\fYRN_UdFpiYX4FSO4lIlU29q.exe" | C:\Users\admin\Pictures\Minor Policy\fYRN_UdFpiYX4FSO4lIlU29q.exe | 12f4b96090bb7a1aa45768f68870ef90.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
Tofsee(PID) Process(648) fYRN_UdFpiYX4FSO4lIlU29q.exe C2 (2)vanaheim.cn jotunheim.name Encrypted Strings (59)c:\Windows \system32\ ImagePath .exe SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run MSConfig /r .exe cmd /C move /Y "%s" %s
sc config %s binPath= "%s%s /d\"%s\""
sc start %s svchost.exe SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ConsentPromptBehaviorAdmin PromptOnSecureDesktop MSConfig :.repos USERPROFILE \Local Settings:.repos USERPROFILE \Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos USERPROFILE \wincookie.repos TMP Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses SYSTEM\CurrentControlSet\services ImagePath SYSTEM\CurrentControlSet\services SYSTEM\CurrentControlSet\services SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run .exe qazwsxed %s%i%i%i%i.bat @echo off
:next_try
del "%s">nul
if exist "%s" (
ping 127.0.0.1 >nul
goto next_try
)
del %%0 svchost.exe .exe /u USERPROFILE SOFTWARE\Microsoft\Windows\CurrentVersion\Run /d /e /d /e .exe "%s" /u"%s" USERPROFILE .exe USERPROFILE USERPROFILE ver=%d lid=%d
win=%X/%d sid=%s
rep=%s | |||||||||||||||
| 712 | svchost.exe | C:\Windows\SysWOW64\svchost.exe | zognsqvn.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 988 | "C:\Windows\System32\sc.exe" description vqnmshau "wifi internet conection" | C:\Windows\SysWOW64\sc.exe | — | fYRN_UdFpiYX4FSO4lIlU29q.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1012 | sc stop bits | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 1062 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1036 | C:\Windows\explorer.exe | C:\Windows\explorer.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1088 | sc stop wuauserv | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 1062 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1088 | "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'" | C:\Windows\System32\schtasks.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}User |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE\Policies |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE\Policies\Microsoft |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE\Policies\Microsoft\Windows Defender |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2732) 12f4b96090bb7a1aa45768f68870ef90.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{7D75E352-3229-4636-BB94-68E568FD9B65}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Windows\System32\GroupPolicy\gpt.ini | text | |
MD5:39DFFC602ED934569F26BE44EC645814 | SHA256:B57A88E5B1ACF3A784BE88B87FA3EE1F0991CB7C1C66DA423F3595FFC6E0C5C2 | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\Pictures\Minor Policy\v5P2RTIxxy6uw58KNWERLcJN.exe | executable | |
MD5:7444AF0A8014D31AC37C73FFEC6518E0 | SHA256:899CB0AFF59FDBD1A1EDF8D7C42180D38ADB3B3849668BD0C469D1AFC65464E5 | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\timeSync[1].exe | executable | |
MD5:7444AF0A8014D31AC37C73FFEC6518E0 | SHA256:899CB0AFF59FDBD1A1EDF8D7C42180D38ADB3B3849668BD0C469D1AFC65464E5 | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\Pictures\Minor Policy\ykr8m_oOps7zmszbWkHF3o0r.exe | executable | |
MD5:6615DEC0E862CA80005072E4936A0DC0 | SHA256:D934F3BB89201A0FFC2FE21E8C1A4B75BA2640B98AF6E483EA3FE80BFFAA9320 | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\SXAE7XLE.txt | text | |
MD5:E7A96168CA5F3DD04DDF5201C2AF1CAD | SHA256:AC8F5557538AF6696F48CD22D6585B7BD01720831AD66C5FF59AAA6C1952E13A | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\Local\Temp\CabDCAA.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Windows\System32\GroupPolicy\Machine\Registry.pol | binary | |
MD5:CDFD60E717A44C2349B553E011958B85 | SHA256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQYU0XHJ\build[1].exe | executable | |
MD5:6615DEC0E862CA80005072E4936A0DC0 | SHA256:D934F3BB89201A0FFC2FE21E8C1A4B75BA2640B98AF6E483EA3FE80BFFAA9320 | |||
| 2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\DJ761XOJ.txt | text | |
MD5:5C09566B7B413C050C7D12E0919BFD8F | SHA256:15A086C40268C3364E857F95C66702576AEFFF90B7AB960EB5C5F43C974FDE4A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | HEAD | 200 | 194.49.94.48:80 | http://194.49.94.48/timeSync.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | HEAD | 200 | 194.169.175.118:80 | http://194.169.175.118/xinchao.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | HEAD | 200 | 194.49.94.97:80 | http://194.49.94.97/download/Services.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | GET | — | 194.49.94.97:80 | http://194.49.94.97/download/Services.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | GET | — | 194.169.175.118:80 | http://194.169.175.118/xinchao.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | GET | — | 194.49.94.48:80 | http://194.49.94.48/timeSync.exe | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | HEAD | 200 | 89.191.234.21:80 | http://gons11fc.top/build.exe | unknown | — | — | unknown |
1980 | vNB5B9j4yHYEAB2b9WHarHmW.exe | GET | 302 | 91.92.243.151:80 | http://91.92.243.151/api/tracemap.php | unknown | — | — | unknown |
2728 | ykr8m_oOps7zmszbWkHF3o0r.exe | GET | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | — | — | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | POST | 200 | 94.142.138.131:80 | http://94.142.138.131/api/firegate.php | unknown | text | 108 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 94.142.138.131:80 | — | Network Management Ltd | RU | malicious |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 104.26.8.59:443 | api.myip.com | CLOUDFLARENET | US | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 87.240.129.133:80 | vk.com | VKontakte Ltd | RU | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 87.240.129.133:443 | vk.com | VKontakte Ltd | RU | unknown |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | 89.191.234.21:80 | gons11fc.top | MIRholding B.V. | US | unknown |
Domain | IP | Reputation |
|---|---|---|
api.myip.com |
| malicious |
ipinfo.io |
| shared |
vk.com |
| whitelisted |
teredo.ipv6.microsoft.com |
| unknown |
fdjbgkhjrpfvsdf.online |
| malicious |
medfioytrkdkcodlskeej.net |
| malicious |
gons11fc.top |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
sun6-22.userapi.com |
| unknown |
sun6-21.userapi.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET HUNTING Suspicious services.exe in URI |
2732 | 12f4b96090bb7a1aa45768f68870ef90.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |