Jenis Virus
Jenis Virus
General Info
File name: success.exe
Tags: evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5: DE225405F8E348BFBB5BA8ABDC092B48
SHA1: C04AD314F2A77275464FA9E516859287C9818E23
SHA256: 473D50C8FBCAB1A88603E67FCBF878ACD761806F3C88B05195E75C2BBE8016CB
SSDEEP: 12288:pomHu4B7ScNyaPdYwLcGgBOs3YuDfkYsOCPSaB/8CnbSunwPQrNuDdTviCbppiOX:po2Wc4aPd/oBOM5sQAb5w4rgDdTvFR
Launch configuration
Task duration: 120 seconds Heavy Evasion option: off Network geolocation: off
Additional time used: 60 seconds MITM proxy: off Privacy: Public submission
Network: on
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000) LocalPack US Package
Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000) WinMan WinIP Package TopLevel
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 1/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
Mozilla Maintenance Service (55.0.3)
Behavior activities
MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process Starts CMD.EXE for commands execution Application was crashed
IWC.exe (PID: 2620) success.exe (PID: 4020) IWC.exe (PID: 2620)
ygyuig.exe (PID: 4076)
Runs app for hidden code execution Dropped object may contain Bitcoin addresses
success.exe (PID: 4020) Application launched itself ygyuig.exe (PID: 3980)
ygyuig.exe (PID: 4076) ygyuig.exe (PID: 4076) success.exe (PID: 4020)
Actions looks like stealing of personal data Uses REG.EXE to modify Windows registry
ygyuig.exe (PID: 3980) cmd.exe (PID: 3244)
Changes the autorun value in the registry Executable content was dropped or overwritten
ygyuig.exe (PID: 3980) success.exe (PID: 4020)
reg.exe (PID: 2492) ygyuig.exe (PID: 3980)
Malware configuration
No Malware configuration.
Static information
TRiD EXIF
LegalCopyright:
InternalName: success.exe
FileVersion: 0.0.0.0
FileDescription:
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0xcacfe
UninitializedDataSize: -
InitializedDataSize: 177152
CodeSize: 822784
LinkerVersion: 8
PEType: PE32
Summary
Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 10-May-2018 20:48:55
FileDescription: -
FileVersion: 0.0.0.0
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 2/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
InternalName: success.exe
LegalCopyright: -
OriginalFilename: success.exe
ProductVersion: 0.0.0.0
Checksum: 0x0000
Sections
Name Virtual Address Virtual Size Raw Size Charateristics Entropy
Resources
Title Entropy Size Codepage Language Type
Imports
mscoree.dll
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 3/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
Processes
Total processes Monitored processes Malicious processes Suspicious processes
41 8 4 0
Behavior graph
cmd.exe reg.exe
no specs
Specs description
Program did not start Low-level access to the HDD Process was added to the startup Debug information is available
Probably Tor was used Behavior similar to spam Task has injected processes Executable file was dropped
Known threat RAM overrun Network attacks were detected Integrity level elevation
Connects to the network CPU overrun Process starts the services System was rebooted
File is detected by antivirus software Inspected object has suspicious PE Behavior similar to exploiting Task contains an error or was
structure the vulnerability rebooted
Process information
Information
Version: 0.0.0.0
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 4/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
Information
Information
Version: 0.0.0.0
Information
Information
Information
Information
Version: 1.0.0.0
Information
Registry activity
Total events Read events Write events Delete events
464 446 18 0
Modification events
Value: 0
Value: 0
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 5/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: FileTracingMask
Value: 4294901760
Value: 4294901760
Value: 1048576
Value: %windir%\tracing
Value: 0
Value: 0
Value: 4294901760
Value: 4294901760
Value: 1048576
Value: %windir%\tracing
Value: 0
Value: 1
Files activity
Executable files Suspicious files Text files Unknown types
4 0 1 0
Dropped files
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 6/7
12/21/23, 2:08 PM Malware analysis success.exe Malicious activity | ANY.RUN - Malware Sandbox Online
Network activity
HTTP(S) requests TCP/UDP connections DNS requests Threats
1 1 1 0
HTTP requests
Connections
DNS requests
Domain IP Reputation
Threats
3980 ygyuig.exe Potential Corporate Privacy Violation ET POLICY External IP Lookup - checkip.dyndns.org
3980 ygyuig.exe Potentially Bad Traffic ET POLICY DynDNS CheckIp External IP Address Server Response
https://any.run/report/473d50c8fbcab1a88603e67fcbf878acd761806f3c88b05195e75c2bbe8016cb/3c4aa768-74c8-49ee-a5d7-5abead5c2da1/ 7/7