uTorrent.exe
This report is generated from a file or URL submitted to this webservice on January 7th 2018 06:50:03 (UTC)
Guest System: Windows 7 32 bit, Home Premium, 6.1 (build 7601), Service Pack 1
Report generated by Falcon Sandbox v7.21 © Hybrid Analysis
Incident Response
- Remote Access
- Reads terminal service related keys (often RDP related)
- Spyware
- Accesses potentially sensitive information from local browsers
POSTs files to a webserver - Persistence
- Interacts with the primary disk partition (DR0)
Modifies auto-execute functionality by setting/creating a value in the registry
Spawns a lot of processes
Writes data to a remote process - Fingerprint
- Found a dropped file containing the Windows username (possible fingerprint attempt)
Queries firmware table information (may be used to fingerprint/evade)
Reads the active computer name
Reads the cryptographic machine GUID - Evasive
- Executes WMI queries known to be used for VM detection
Possibly checks for the presence of an Antivirus engine - Spreading
- Opens the MountPointManager (often used to detect additional infection locations)
- Network Behavior
- Contacts 26 domains and 23 hosts. View all details
Additional Context
Related Sandbox Artifacts
- Associated URLs
- download.ap.bittorrent.com/track/stable/endpoint/utorrent/os/windows
hxxp://download.ap.bittorrent.com/track/stable/endpoint/utorrent/os/windows
hxxp://download-hr.utorrent.com/track/stable/endpoint/utorrent/os/windows
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
Malicious Indicators 17
- Anti-Detection/Stealthyness
- Queries firmware table information (may be used to fingerprint/evade)
- details
- "avast_free_antivirus_setup_online.exe" at 00040387-00003252-00000105-95367568
"avast_free_antivirus_setup_online.exe" at 00040387-00003252-00000105-95367661
"Instup.exe" at 00043587-00004012-00000105-99646572
"Instup.exe" at 00043587-00004012-00000105-99646661
"instup.exe" at 00047308-00004044-00000105-108487048
"instup.exe" at 00047308-00004044-00000105-108487144 - source
- API Call
- relevance
- 10/10
- Queries firmware table information (may be used to fingerprint/evade)
- Environment Awareness
- The input sample contains a known anti-VM trick
- details
- Found VM detection artifact "CPUID trick" in "866a8fb02c387b7160d43fb72cc5cfbc5acbb0df825be2f359727bafedc56d3a.exe.bin" (Offset: 125188)
- source
- Extracted File
- relevance
- 5/10
- The input sample contains a known anti-VM trick
- External Systems
- Detected Emerging Threats Alert
- details
- Detected alert "ET POLICY PE EXE or DLL Windows file download HTTP" (SID: 2018959, Rev: 3, Severity: 1) categorized as "Potential Corporate Privacy Violation"
Detected alert "ET P2P BTWebClient UA uTorrent in use" (SID: 2012247, Rev: 3, Severity: 1) categorized as "Potential Corporate Privacy Violation"
Detected alert "ET P2P Bittorrent P2P Client User-Agent (uTorrent)" (SID: 2011706, Rev: 6, Severity: 1) categorized as "Potential Corporate Privacy Violation" - source
- Suricata Alerts
- relevance
- 10/10
- Sample was identified as malicious by at least one Antivirus engine
- details
- 2/67 Antivirus vendors marked sample as malicious (2% detection rate)
- source
- External System
- relevance
- 8/10
- Detected Emerging Threats Alert
- General
- The analysis extracted a file that was identified as malicious
- details
- 1/73 Antivirus vendors marked dropped file "DevLib.dll" as malicious (classified as "WebCompanion.A potentially unwanted" with 1% detection rate)
1/66 Antivirus vendors marked dropped file "uat_4012.dll" as malicious (classified as "Trojan.WisdomEyes.16070401.9500" with 1% detection rate)
1/73 Antivirus vendors marked dropped file "WizardPages.dll" as malicious (classified as "WebCompanion.A potentially unwanted" with 1% detection rate)
1/68 Antivirus vendors marked dropped file "21l0dsf1.yzl.exe" as malicious (classified as "WebCompanion.C potentially unwanted" with 1% detection rate)
1/63 Antivirus vendors marked dropped file "WebCompanionInstaller.exe" as malicious (classified as "WebCompanion.C potentially unwanted" with 1% detection rate)
1/66 Antivirus vendors marked dropped file "uat_4044.dll" as malicious (classified as "Trojan.WisdomEyes.16070401.9500" with 1% detection rate) - source
- Extracted File
- relevance
- 10/10
- The analysis spawned a process that was identified as malicious
- details
- 1/68 Antivirus vendors marked spawned process "21l0dsf1.yzl.exe" (PID: 2376) as malicious (classified as "WebCompanion.C potentially unwanted" with 1% detection rate)
1/63 Antivirus vendors marked spawned process "WebCompanionInstaller.exe" (PID: 3196) as malicious (classified as "WebCompanion.C potentially unwanted" with 1% detection rate) - source
- Monitored Target
- relevance
- 10/10
- The analysis extracted a file that was identified as malicious
- Installation/Persistance
- Drops executable files to the Windows system directory
- details
- File type "PE32 executable (GUI) Intel 80386 for MS Windows" was dropped at "%WINDIR%\Temp\asw.d59bc30c4f64c8b0\avast_free_antivirus_setup_online.exe"
- source
- Extracted File
- relevance
- 7/10
- Writes data to a remote process
- details
- "<Input Sample>" wrote 1500 bytes to a remote process "%TEMP%\7zS80AEF99A\installer.exe" (Handle: 108)
"<Input Sample>" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\installer.exe" (Handle: 108)
"<Input Sample>" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\installer.exe" (Handle: 108)
"<Input Sample>" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\installer.exe" (Handle: 108)
"installer.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\GenericSetup.exe" (Handle: 184)
"installer.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\GenericSetup.exe" (Handle: 184)
"installer.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\GenericSetup.exe" (Handle: 184)
"installer.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\GenericSetup.exe" (Handle: 184)
"cmd.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\Carrier.exe" (Handle: 84)
"cmd.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\Carrier.exe" (Handle: 84)
"cmd.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS80AEF99A\Carrier.exe" (Handle: 84)
"cmd.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\21l0dsf1.yzl.exe" (Handle: 84)
"cmd.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\21l0dsf1.yzl.exe" (Handle: 84)
"cmd.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\21l0dsf1.yzl.exe" (Handle: 84)
"cmd.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\21l0dsf1.yzl.exe" (Handle: 84)
"21l0dsf1.yzl.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS2009.tmp\WebCompanionInstaller.exe" (Handle: 220)
"21l0dsf1.yzl.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS2009.tmp\WebCompanionInstaller.exe" (Handle: 220)
"21l0dsf1.yzl.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS2009.tmp\WebCompanionInstaller.exe" (Handle: 220)
"21l0dsf1.yzl.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\7zS2009.tmp\WebCompanionInstaller.exe" (Handle: 220)
"cmd.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\psk13wj0.0ws.exe" (Handle: 84)
"cmd.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\psk13wj0.0ws.exe" (Handle: 84)
"cmd.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\psk13wj0.0ws.exe" (Handle: 84)
"cmd.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\psk13wj0.0ws.exe" (Handle: 84)
"psk13wj0.0ws.exe" wrote 1500 bytes to a remote process "C:\Windows\Temp\asw.d59bc30c4f64c8b0\avast_free_antivirus_setup_online.exe" (Handle: 268)
"psk13wj0.0ws.exe" wrote 4 bytes to a remote process "C:\Windows\Temp\asw.d59bc30c4f64c8b0\avast_free_antivirus_setup_online.exe" (Handle: 268)
"psk13wj0.0ws.exe" wrote 32 bytes to a remote process "C:\Windows\Temp\asw.d59bc30c4f64c8b0\avast_free_antivirus_setup_online.exe" (Handle: 268)
"psk13wj0.0ws.exe" wrote 52 bytes to a remote process "C:\Windows\Temp\asw.d59bc30c4f64c8b0\avast_free_antivirus_setup_online.exe" (Handle: 268)
"avast_free_antivirus_setup_online.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\Instup.exe" (Handle: 408)
"avast_free_antivirus_setup_online.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\Instup.exe" (Handle: 408)
"avast_free_antivirus_setup_online.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\Instup.exe" (Handle: 408)
"avast_free_antivirus_setup_online.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\Instup.exe" (Handle: 408)
"Instup.exe" wrote 1500 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\New_11090912\instup.exe" (Handle: 544)
"Instup.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\New_11090912\instup.exe" (Handle: 544)
"Instup.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\New_11090912\instup.exe" (Handle: 544)
"Instup.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\_av_iup.tm~a03332\New_11090912\instup.exe" (Handle: 544) - source
- API Call
- relevance
- 6/10
- Drops executable files to the Windows system directory
- Network Related
- Contacts very many different hosts
- details
- Contacted 23 (or more) hosts in at least 5 different countries
- source
- Network Traffic
- relevance
- 9/10
- Found more than one unique User-Agent
- details
- Found the following User-Agents: Avast Microstub/2.0
BTWebClient/351S(44332)
uTorrent(44332)/3.5.1
Avast SimpleHttp/3.0
avast! Antivirus - source
- Network Traffic
- relevance
- 5/10
- Malicious artifacts seen in the context of a contacted host
- details
- Found malicious artifacts related to "104.17.61.19": ...
URL: http://wcdownloader-qa.lavasoft.com/4.0.1753.3301 (AV positives: 1/66 scanned on 12/28/2017 01:38:19)
URL: http://appdownload.lavasoft.com/malsync/adurllist/dailyList.zip (AV positives: 1/66 scanned on 12/16/2017 15:42:28)
URL: http://wcdownloadercdn.lavasoft.com/4.0.1777.3330/WcInstaller.exe (AV positives: 1/66 scanned on 12/08/2017 00:47:10)
URL: http://flow.lavasoft.com.cdn.cloudflare.net/ (AV positives: 1/66 scanned on 12/02/2017 18:50:01)
URL: http://wcdownloadercdn.lavasoft.com/4.0.1767.3319/WcInstaller.exe (AV positives: 1/66 scanned on 11/30/2017 14:34:17)
File SHA256: de903a444fc99f006ef13276f69989e640735cf34aeaa467675dd10f664eed7e (Date: 01/04/2018 11:44:30)
File SHA256: daf1293df01b4f11e7e3056116b4d24e2b55e6f1bf6fdd651b7c10636efbd963 (Date: 01/04/2018 11:16:47)
File SHA256: 4acc2f6d891bf52225b1161500c2f4a6ce83cf420d2077d1f9b0dabb0a292a22 (AV positives: 1/66 scanned on 12/27/2017 05:18:20)
File SHA256: 866a8fb02c387b7160d43fb72cc5cfbc5acbb0df825be2f359727bafedc56d3a (Date: 12/24/2017 15:50:55)
File SHA256: 1f609cc69834d87864af9422c0175b3d08b18879a8d053aab1a5c2370a245562 (AV positives: 1/68 scanned on 12/23/2017 08:07:25)
File SHA256: 61c02bb77dbf7f00765667c7bb1edd82268fdbc94ae46720faacc248012b18cb (AV positives: 1/62 scanned on 12/20/2017 14:30:36)
File SHA256: 04523d04f6f0f09e61770b42a46f1b5a744d5eaebd39350fe9606cf6720bf693 (AV positives: 4/67 scanned on 12/20/2017 08:21:58)
File SHA256: 0e37c48d15b483eb5c97c8e71a17e8b6e649813f1b572ce86f9970e07a3285bb (AV positives: 1/66 scanned on 12/19/2017 02:48:29)
File SHA256: ff2fdcd19ff0bb00d889778cc484e318844164a221ebd8332028f87fa782bc67 (Date: 12/18/2017 17:06:07)
File SHA256: 530d58110e1ae90c036e4b78f41a3b2b241e83a2c71a0e4847843aee4c07d5bc (Date: 12/16/2017 12:47:43)
Found malicious artifacts related to "104.17.116.51": ...
URL: http://webcompanion.com/nano_download.php?partner=IO170906 (AV positives: 1/66 scanned on 12/13/2017 16:45:17)
URL: http://webcompanion.com/nano_download.php?partner=FZ160201 (AV positives: 1/64 scanned on 05/18/2017 17:41:31)
URL: http://webcompanion.com/test_malicious_url.exe (AV positives: 1/64 scanned on 04/27/2017 05:16:06)
File SHA256: 0595dd113e4998abf47fc907172b9ca6092219c971bda8f242e2cd310f2404a1 (AV positives: 1/68 scanned on 01/06/2018 19:16:51)
File SHA256: 6b7d46ef354221ef212abd7380b98d7b9189c40e95656e430294f3b283b4e47c (AV positives: 1/67 scanned on 12/24/2017 06:48:35)
File SHA256: 1fd3aa7605d6fc7f11da6af9a467646bfc764ef2e97b31f128ae5a1f4e77ebb3 (AV positives: 1/68 scanned on 12/22/2017 15:25:29)
File SHA256: b8e923d26ea5a49d1d6eaa631dc3af5f7ef980772fcf14a248a1a03a918079db (AV positives: 1/68 scanned on 12/13/2017 16:45:21)
File SHA256: 03e75740e34512335619364007faa96b4f1b5bc720c52cde4d826b98c241eb9b (AV positives: 4/68 scanned on 12/11/2017 08:26:04)
File SHA256: 0b23f15085989a19dedb3723767ab4249298582b0f648dd4ee3a005219ac4205 (Date: 05/10/2017 08:43:32)
File SHA256: 58859238b06b8bdb928f57552b484e5e19a10ebff56ced95f351a01236561ab9 (Date: 02/24/2017 08:39:52)
File SHA256: 5fe924737dcba6cf8dd83fc7f37756f37e808d1143f401df86c3726b37847b15 (Date: 02/24/2017 05:28:49)
Found malicious artifacts related to "104.16.70.38": ...
File SHA256: 5f964ffd6665549007e1c144580af6ad841fc656f02d247fbdcbdc20affd7020 (AV positives: 1/66 scanned on 01/06/2018 12:21:46)
File SHA256: 533298add3906bea9fd5d683178f598f2956b969c54b59408e6cb3940e5e321c (AV positives: 1/66 scanned on 01/01/2018 00:18:47)
File SHA256: 3fc701c37ccf106d98380bf35210801ca8cf3d21a9727979e2585200bf5fe113 (AV positives: 1/68 scanned on 12/13/2017 08:19:13)
File SHA256: eeccbe6962accf360c5ff5cd0088a43aef70cf3d6243dcaefa4d58b1c028de7e (AV positives: 4/64 scanned on 10/24/2017 23:06:07)
File SHA256: f2ec68f3a45e75e34c43b85be2083192e0fc3f37f227aedff796516f4b19985c (AV positives: 1/65 scanned on 10/17/2017 21:58:09)
Found malicious artifacts related to "23.56.186.141": ...
File SHA256: 7e424e3fa210d463804e23e748c16eb2cf49928b3874b484de2ce80d5f985781 (Date: 12/16/2017 01:16:19)
File SHA256: 3c39779df6de6156e6a978b396e566b047c5a3b38b42c72f4a3f2d69df26515f (Date: 12/15/2017 21:52:35)
File SHA256: 5ec5ebe9cc3f4354982decdd8c27a1767940ada2da4d5e59e5291ee6966f1171 (AV positives: 25/67 scanned on 11/26/2017 18:40:11)
File SHA256: 15ad9722b54337cea1472fb0da8cbfe561d59eb0519215d923266e7f16d6ddcd (AV positives: 18/66 scanned on 11/25/2017 21:21:40)
File SHA256: 3e25ca3d11589f0caf806ea83c4cae97e5009b3dd7bc1e903ed5a0a96950b3cf (AV positives: 1/68 scanned on 11/09/2017 23:32:01)
File SHA256: c50b1b78e5d850ef9108f044af8d214eaf01ea885f0039cb3a70814f5a86ce41 (AV positives: 39/67 scanned on 10/31/2017 15:09:25)
File SHA256: c62db44becb524a7c3c64ff6b9c5ff3f6060390b2984e11867381a3d71f5802e (AV positives: 2/68 scanned on 10/29/2017 18:22:18)
Found malicious artifacts related to "77.234.45.53": ...
File SHA256: 9bbf823b19be9102984ec57ec7cd2f645fa8794574ca85b2953d8a92bd5f083d (Date: 01/02/2018 22:35:49)
File SHA256: 696e687b82681f86ee73954f5694aa80f7e04b6e874a443c80505264388506f8 (Date: 01/02/2018 21:06:30)
File SHA256: 3912e4aa399146e1cc2bf77605b19ae4182b4829ef2757575cefa503a3ce095e (Date: 12/23/2017 13:35:49)
File SHA256: 827c0f089235b14369dc3635e61de7de46f058a3434f7561fc54878cd84a3866 (Date: 12/20/2017 23:41:50)
File SHA256: 2766d827ed786366c39246432bbfafa875976803f6b50ebf39849dd652752110 (Date: 12/20/2017 19:19:36)
File SHA256: 41dfc0baf8953a1b80e2e1b20829b9dd630b6a00031c78ecfbc80d588eab37d8 (AV positives: 26/68 scanned on 12/18/2017 02:58:37)
File SHA256: 15ad9722b54337cea1472fb0da8cbfe561d59eb0519215d923266e7f16d6ddcd (AV positives: 18/66 scanned on 11/25/2017 21:21:41)
File SHA256: 225ba84e69cece00a49ddee651ab805138794c1bc80cefbdb309a5207769da19 (AV positives: 1/67 scanned on 11/15/2017 19:54:23)
File SHA256: 87f49940095a7a016d6b1728fb886e577f5eb4d0d52fe59431db4231ba745950 (AV positives: 17/67 scanned on 11/13/2017 01:00:36)
File SHA256: dd600b17f2f66746a38b236c769c8a956aa8e80987206ec20d79e2c9551ad75a (AV positives: 15/67 scanned on 11/12/2017 22:21:58)
Found malicious artifacts related to "178.79.208.1": ...
File SHA256: 7dfc0a2ab531ffcc9b969b8e5caef85e26163003452ca9deba2102a2ff3d9c1c (Date: 12/16/2017 18:51:59)
File SHA256: 3a419c8dd18a06a2a780563e8d3c1100890cb2ba0374ee719aef0efd83527680 (Date: 12/12/2017 05:01:08)
File SHA256: ee631d813358155c417eb7f8f77125bf9874a805be4e1285b20c9f5bb25db166 (Date: 12/09/2017 09:20:51)
File SHA256: b51b0501045123a8ae9522a5b856daf8efbbe842036f1b783798f0b4a23542bb (Date: 12/06/2017 14:34:40)
File SHA256: 8821e4c68899e44e5059142310c41927a554d975ef182df5e6882bd2c4518dad (Date: 12/06/2017 13:34:32)
File SHA256: 08cecd70320cae69c6a4760c911bc5c25f93d979711b28ad4d2ef87271c89541 (AV positives: 2/64 scanned on 08/03/2017 08:37:10)
File SHA256: cc1490d17eb99521988b6c760e34e5afab1e7dc72739d9848713829ac59189ed (AV positives: 2/65 scanned on 08/01/2017 14:59:50)
File SHA256: b5af7f49540d52f1fa2fb6d02588d5488faf3c035114b434986aaf57823e6f36 (AV positives: 6/64 scanned on 07/24/2017 12:38:07)
File SHA256: 8591183f242dc2b06a68acb357e0c47ec50a10d72eb2bc72ff27ff74f4be5a52 (AV positives: 12/64 scanned on 07/21/2017 13:11:44)
File SHA256: bd57ae63f4b722135f1b936bf48d40b15062c7e1fc84f388c764a301c8381063 (AV positives: 55/64 scanned on 07/20/2017 10:39:54) - source
- Network Traffic
- relevance
- 10/10
- Multiple malicious artifacts seen in the context of different hosts
- details
- Found malicious artifacts related to "104.17.61.19": ...
URL: http://wcdownloader-qa.lavasoft.com/4.0.1753.3301 (AV positives: 1/66 scanned on 12/28/2017 01:38:19)
URL: http://appdownload.lavasoft.com/malsync/adurllist/dailyList.zip (AV positives: 1/66 scanned on 12/16/2017 15:42:28)
URL: http://wcdownloadercdn.lavasoft.com/4.0.1777.3330/WcInstaller.exe (AV positives: 1/66 scanned on 12/08/2017 00:47:10)
URL: http://flow.lavasoft.com.cdn.cloudflare.net/ (AV positives: 1/66 scanned on 12/02/2017 18:50:01)
URL: http://wcdownloadercdn.lavasoft.com/4.0.1767.3319/WcInstaller.exe (AV positives: 1/66 scanned on 11/30/2017 14:34:17)
File SHA256: de903a444fc99f006ef13276f69989e640735cf34aeaa467675dd10f664eed7e (Date: 01/04/2018 11:44:30)
File SHA256: daf1293df01b4f11e7e3056116b4d24e2b55e6f1bf6fdd651b7c10636efbd963 (Date: 01/04/2018 11:16:47)
File SHA256: 4acc2f6d891bf52225b1161500c2f4a6ce83cf420d2077d1f9b0dabb0a292a22 (AV positives: 1/66 scanned on 12/27/2017 05:18:20)
File SHA256: 866a8fb02c387b7160d43fb72cc5cfbc5acbb0df825be2f359727bafedc56d3a (Date: 12/24/2017 15:50:55)
File SHA256: 1f609cc69834d87864af9422c0175b3d08b18879a8d053aab1a5c2370a245562 (AV positives: 1/68 scanned on 12/23/2017 08:07:25)
File SHA256: 61c02bb77dbf7f00765667c7bb1edd82268fdbc94ae46720faacc248012b18cb (AV positives: 1/62 scanned on 12/20/2017 14:30:36)
File SHA256: 04523d04f6f0f09e61770b42a46f1b5a744d5eaebd39350fe9606cf6720bf693 (AV positives: 4/67 scanned on 12/20/2017 08:21:58)
File SHA256: 0e37c48d15b483eb5c97c8e71a17e8b6e649813f1b572ce86f9970e07a3285bb (AV positives: 1/66 scanned on 12/19/2017 02:48:29)
File SHA256: ff2fdcd19ff0bb00d889778cc484e318844164a221ebd8332028f87fa782bc67 (Date: 12/18/2017 17:06:07)
File SHA256: 530d58110e1ae90c036e4b78f41a3b2b241e83a2c71a0e4847843aee4c07d5bc (Date: 12/16/2017 12:47:43)
Found malicious artifacts related to "104.17.116.51": ...
URL: http://webcompanion.com/nano_download.php?partner=IO170906 (AV positives: 1/66 scanned on 12/13/2017 16:45:17)
URL: http://webcompanion.com/nano_download.php?partner=FZ160201 (AV positives: 1/64 scanned on 05/18/2017 17:41:31)
URL: http://webcompanion.com/test_malicious_url.exe (AV positives: 1/64 scanned on 04/27/2017 05:16:06)
File SHA256: 0595dd113e4998abf47fc907172b9ca6092219c971bda8f242e2cd310f2404a1 (AV positives: 1/68 scanned on 01/06/2018 19:16:51)
File SHA256: 6b7d46ef354221ef212abd7380b98d7b9189c40e95656e430294f3b283b4e47c (AV positives: 1/67 scanned on 12/24/2017 06:48:35)
File SHA256: 1fd3aa7605d6fc7f11da6af9a467646bfc764ef2e97b31f128ae5a1f4e77ebb3 (AV positives: 1/68 scanned on 12/22/2017 15:25:29)
File SHA256: b8e923d26ea5a49d1d6eaa631dc3af5f7ef980772fcf14a248a1a03a918079db (AV positives: 1/68 scanned on 12/13/2017 16:45:21)
File SHA256: 03e75740e34512335619364007faa96b4f1b5bc720c52cde4d826b98c241eb9b (AV positives: 4/68 scanned on 12/11/2017 08:26:04)
File SHA256: 0b23f15085989a19dedb3723767ab4249298582b0f648dd4ee3a005219ac4205 (Date: 05/10/2017 08:43:32)
File SHA256: 58859238b06b8bdb928f57552b484e5e19a10ebff56ced95f351a01236561ab9 (Date: 02/24/2017 08:39:52)
File SHA256: 5fe924737dcba6cf8dd83fc7f37756f37e808d1143f401df86c3726b37847b15 (Date: 02/24/2017 05:28:49)
Found malicious artifacts related to "104.16.70.38": ...
File SHA256: 5f964ffd6665549007e1c144580af6ad841fc656f02d247fbdcbdc20affd7020 (AV positives: 1/66 scanned on 01/06/2018 12:21:46)
File SHA256: 533298add3906bea9fd5d683178f598f2956b969c54b59408e6cb3940e5e321c (AV positives: 1/66 scanned on 01/01/2018 00:18:47)
File SHA256: 3fc701c37ccf106d98380bf35210801ca8cf3d21a9727979e2585200bf5fe113 (AV positives: 1/68 scanned on 12/13/2017 08:19:13)
File SHA256: eeccbe6962accf360c5ff5cd0088a43aef70cf3d6243dcaefa4d58b1c028de7e (AV positives: 4/64 scanned on 10/24/2017 23:06:07)
File SHA256: f2ec68f3a45e75e34c43b85be2083192e0fc3f37f227aedff796516f4b19985c (AV positives: 1/65 scanned on 10/17/2017 21:58:09)
Found malicious artifacts related to "23.56.186.141": ...
File SHA256: 7e424e3fa210d463804e23e748c16eb2cf49928b3874b484de2ce80d5f985781 (Date: 12/16/2017 01:16:19)
File SHA256: 3c39779df6de6156e6a978b396e566b047c5a3b38b42c72f4a3f2d69df26515f (Date: 12/15/2017 21:52:35)
File SHA256: 5ec5ebe9cc3f4354982decdd8c27a1767940ada2da4d5e59e5291ee6966f1171 (AV positives: 25/67 scanned on 11/26/2017 18:40:11)
File SHA256: 15ad9722b54337cea1472fb0da8cbfe561d59eb0519215d923266e7f16d6ddcd (AV positives: 18/66 scanned on 11/25/2017 21:21:40)
File SHA256: 3e25ca3d11589f0caf806ea83c4cae97e5009b3dd7bc1e903ed5a0a96950b3cf (AV positives: 1/68 scanned on 11/09/2017 23:32:01)
File SHA256: c50b1b78e5d850ef9108f044af8d214eaf01ea885f0039cb3a70814f5a86ce41 (AV positives: 39/67 scanned on 10/31/2017 15:09:25)
File SHA256: c62db44becb524a7c3c64ff6b9c5ff3f6060390b2984e11867381a3d71f5802e (AV positives: 2/68 scanned on 10/29/2017 18:22:18)
Found malicious artifacts related to "77.234.45.53": ...
File SHA256: 9bbf823b19be9102984ec57ec7cd2f645fa8794574ca85b2953d8a92bd5f083d (Date: 01/02/2018 22:35:49)
File SHA256: 696e687b82681f86ee73954f5694aa80f7e04b6e874a443c80505264388506f8 (Date: 01/02/2018 21:06:30)
File SHA256: 3912e4aa399146e1cc2bf77605b19ae4182b4829ef2757575cefa503a3ce095e (Date: 12/23/2017 13:35:49)
File SHA256: 827c0f089235b14369dc3635e61de7de46f058a3434f7561fc54878cd84a3866 (Date: 12/20/2017 23:41:50)
File SHA256: 2766d827ed786366c39246432bbfafa875976803f6b50ebf39849dd652752110 (Date: 12/20/2017 19:19:36)
File SHA256: 41dfc0baf8953a1b80e2e1b20829b9dd630b6a00031c78ecfbc80d588eab37d8 (AV positives: 26/68 scanned on 12/18/2017 02:58:37)
File SHA256: 15ad9722b54337cea1472fb0da8cbfe561d59eb0519215d923266e7f16d6ddcd (AV positives: 18/66 scanned on 11/25/2017 21:21:41)
File SHA256: 225ba84e69cece00a49ddee651ab805138794c1bc80cefbdb309a5207769da19 (AV positives: 1/67 scanned on 11/15/2017 19:54:23)
File SHA256: 87f49940095a7a016d6b1728fb886e577f5eb4d0d52fe59431db4231ba745950 (AV positives: 17/67 scanned on 11/13/2017 01:00:36)
File SHA256: dd600b17f2f66746a38b236c769c8a956aa8e80987206ec20d79e2c9551ad75a (AV positives: 15/67 scanned on 11/12/2017 22:21:58)
Found malicious artifacts related to "178.79.208.1": ...
File SHA256: 7dfc0a2ab531ffcc9b969b8e5caef85e26163003452ca9deba2102a2ff3d9c1c (Date: 12/16/2017 18:51:59)
File SHA256: 3a419c8dd18a06a2a780563e8d3c1100890cb2ba0374ee719aef0efd83527680 (Date: 12/12/2017 05:01:08)
File SHA256: ee631d813358155c417eb7f8f77125bf9874a805be4e1285b20c9f5bb25db166 (Date: 12/09/2017 09:20:51)
File SHA256: b51b0501045123a8ae9522a5b856daf8efbbe842036f1b783798f0b4a23542bb (Date: 12/06/2017 14:34:40)
File SHA256: 8821e4c68899e44e5059142310c41927a554d975ef182df5e6882bd2c4518dad (Date: 12/06/2017 13:34:32)
File SHA256: 08cecd70320cae69c6a4760c911bc5c25f93d979711b28ad4d2ef87271c89541 (AV positives: 2/64 scanned on 08/03/2017 08:37:10)
File SHA256: cc1490d17eb99521988b6c760e34e5afab1e7dc72739d9848713829ac59189ed (AV positives: 2/65 scanned on 08/01/2017 14:59:50)
File SHA256: b5af7f49540d52f1fa2fb6d02588d5488faf3c035114b434986aaf57823e6f36 (AV positives: 6/64 scanned on 07/24/2017 12:38:07)
File SHA256: 8591183f242dc2b06a68acb357e0c47ec50a10d72eb2bc72ff27ff74f4be5a52 (AV positives: 12/64 scanned on 07/21/2017 13:11:44)
File SHA256: bd57ae63f4b722135f1b936bf48d40b15062c7e1fc84f388c764a301c8381063 (AV positives: 55/64 scanned on 07/20/2017 10:39:54) - source
- Network Traffic
- relevance
- 10/10
- Contacts very many different hosts
- Pattern Matching
- YARA signature match
- details
- YARA signature "win_retefe_g1" classified file "installer.exe" as "retefe,banker" based on indicators: "33c98bc7f7e20f90c1f7d90bc851e8,81f1696e65498b45e0356e74656c0bc88b45dc6a013547656e750bc8586a0059530fa2" (Author: Slavo Greminger, SWITCH-CERT)
- source
- YARA Signature
- relevance
- 10/10
- YARA signature match
- System Destruction
- Interacts with the primary disk partition (DR0)
- details
- "avast_free_antivirus_setup_online.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x2d1400
"avast_free_antivirus_setup_online.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x74080
"avast_free_antivirus_setup_online.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x7c088
"Instup.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x2d1400
"Instup.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x74080
"Instup.exe" interacting with "\Device\Harddisk0\DR0" using IoControlCode 0x7c088 - source
- API Call
- relevance
- 5/10
- Interacts with the primary disk partition (DR0)
- Unusual Characteristics
- Checks for a resource fork (ADS) file
- details
- "Instup.exe" checked file "C:"
"instup.exe" checked file "C:" - source
- API Call
- relevance
- 5/10
- Spawns a lot of processes
- details
- Spawned process "<Input Sample>" (Show Process)
Spawned process "installer.exe" with commandline ".\installer.exe" (Show Process)
Spawned process "GenericSetup.exe" (Show Process)
Spawned process "cmd.exe" with commandline "/C ""%TEMP%\7zS80AEF99A\Carrier.exe" /S /FORCEINSTALL 1110010101111110"" (Show Process)
Spawned process "Carrier.exe" with commandline "/S /FORCEINSTALL 1110010101111110" (Show Process)
Spawned process "cmd.exe" with commandline "/C ""%TEMP%\21l0dsf1.yzl.exe" --silent --homepage=1 --search=1 --partner=BT171001"" (Show Process)
Spawned process "21l0dsf1.yzl.exe" with commandline "--silent --homepage=1 --search=1 --partner=BT171001" (Show Process)
Spawned process "cmd.exe" with commandline "/C ""%TEMP%\psk13wj0.0ws.exe" /silent"" (Show Process)
Spawned process "psk13wj0.0ws.exe" with commandline "/silent" (Show Process)
Spawned process "WebCompanionInstaller.exe" with commandline ".\WebCompanionInstaller.exe --partner=BT171001 --version=4.0.1780.3335 --prod --silent --homepage=1 --search=1 --partner=BT171001" (Show Process)
Spawned process "avast_free_antivirus_setup_online.exe" with commandline "/cookie:mmm_lvs_ppi_002_967_n /ga_clientid:114e83c8-7cac-442c-8868-6f6452f16be3 /silent" (Show Process)
Spawned process "Instup.exe" with commandline "/edition:1 /ga_clientid:114e83c8-7cac-442c-8868-6f6452f16be3 /guid:ef47ee49-1dae-4d31-867f-ec51e593c586 /prod:ais /sfx:lite /sfxstorage:%TEMP%\_av_iup.tm~a03332 /cookie:mmm_lvs_ppi_002_967_n /ga_clientid:114e83c8-7cac-442c-8868-6f6452f16be3 /silent" (Show Process)
Spawned process "instup.exe" with commandline "/cookie:mmm_lvs_ppi_002_967_n /edition:1 /ga_clientid:114e83c8-7cac-442c-8868-6f6452f16be3 /guid:ef47ee49-1dae-4d31-867f-ec51e593c586 /online_installer /prod:ais /sfx /sfxstorage:%TEMP%\_av_iup.tm~a03332 /silent" (Show Process) - source
- Monitored Target
- relevance
- 8/10
- Checks for a resource fork (ADS) file
- Hiding 1 Malicious Indicators
- All indicators are available only in the private webservice or standalone version
Suspicious Indicators 39
- Anti-Reverse Engineering
- Environment Awareness
- Contains ability to query CPU information
- details
- cpuid from PID 00002660
cpuid at 21023-9447-0089E251 - source
- Hybrid Analysis Technology
- relevance
- 10/10
- Executes WMI queries known to be used for VM detection
- details
- "installer.exe" issued a query "SELECT * FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled=True"
"installer.exe" issued a query "SELECT * FROM Win32_VideoController"
"installer.exe" issued a query "SELECT * FROM Win32_DiskDrive"
"installer.exe" issued a query "SELECT * FROM Win32_BaseBoard"
"installer.exe" issued a query "SELECT * FROM Win32_BIOS"
"installer.exe" issued a query "SELECT * FROM Win32_Processor" - source
- API Call
- relevance
- 10/10
- Found a dropped file containing the Windows username (possible fingerprint attempt)
- details
- Found dropped filename "tsitenz@localhost[1].txt" containing the spoofed Windows username "tsITenZ"
- source
- Extracted File
- relevance
- 5/10
- Reads the active computer name
- details
- "installer.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"GenericSetup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"Carrier.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"psk13wj0.0ws.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"WebCompanionInstaller.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"avast_free_antivirus_setup_online.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"Instup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
- Contains ability to query CPU information
Download HD Movies For Free on Laptop or PC - Utorrent - Step By Step Guide - Away Raza
