MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 989ca7508d256332e873b3d6eaf03156f1c77806dc820a900da0ab48ea360d52. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Generic


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 989ca7508d256332e873b3d6eaf03156f1c77806dc820a900da0ab48ea360d52
SHA3-384 hash: 75a32d823ebb439b959b90d4f85cca241a361d4c28fe69cc4cb3cd3fe25503b4e9fa18672e2f5169d2243bd728eb1e24
SHA1 hash: 634cb4f5db830521fad92acc8713080e87feb1fd
MD5 hash: 3d8f7453ad8bc2572aa624d68a11c29f
humanhash: artist-march-mirror-sodium
File name:SecuriteInfo.com.Program.Unwanted.4549.24101.22778
Download: download sample
Signature Adware.Generic
File size:6'464'464 bytes
First seen:2022-04-21 15:13:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eb5bc6ff6263b364dfbfb78bdb48ed59 (55 x Adware.Generic, 18 x RaccoonStealer, 8 x Adware.ExtenBro)
ssdeep 196608:6EMEjtEFtfGzUlqJ6FNTuQEkwx7cJSeWA2FF:FMEyFBG4bNHEkkoJ5w
TLSH T1B3561227B298753EC49E6B364673A05018FBB66DF426BD1666E8C48DCF271C00E3E725
TrID 48.3% (.EXE) Inno Setup installer (109740/4/30)
18.9% (.EXE) InstallShield setup (43053/19/16)
18.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.6% (.EXE) Win64 Executable (generic) (10523/12/4)
2.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:Adware.Generic exe signed

Code Signing Certificate

Organisation:Avanquest Software SAS
Issuer:Symantec Class 3 Extended Validation Code Signing CA - G2
Algorithm:sha256WithRSAEncryption
Valid from:2019-09-25T00:00:00Z
Valid to:2020-11-26T23:59:59Z
Serial number: 28f8bfe689388ec2a8934461376bc5ef
Thumbprint Algorithm:SHA256
Thumbprint: 087c72ebd51c3c8fd3ff30e966102f46404007d6f24669290661d06ee0614499
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
314
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://devicedoctor.com/files/DeviceDoctor_Bundle.exe
Verdict:
No threats detected
Analysis date:
2020-06-09 09:52:37 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe expand.exe overlay packed setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
rans.spyw.evad
Score:
38 / 100
Signature
Deletes shadow drive data (may be related to ransomware)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive service information (via WMI, MSSMBios_RawSMBiosTables, often done to detect sandboxes)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 613297 Sample: SecuriteInfo.com.Program.Un... Startdate: 21/04/2022 Architecture: WINDOWS Score: 38 58 receiver.smartpcupdate.com 2->58 68 Multi AV Scanner detection for dropped file 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Tries to steal Mail credentials (via file registry) 2->72 74 3 other signatures 2->74 10 SecuriteInfo.com.Program.Unwanted.4549.24101.exe 2 2->10         started        signatures3 process4 file5 48 SecuriteInfo.com.P...nted.4549.24101.tmp, PE32 10->48 dropped 76 Obfuscated command line found 10->76 14 SecuriteInfo.com.Program.Unwanted.4549.24101.tmp 33 46 10->14         started        signatures6 process7 dnsIp8 64 service.smartpcupdate.com 94.130.13.99, 80 HETZNER-ASDE Germany 14->64 66 smart-pc.avanquest.com 34.243.112.164, 49770, 80 AMAZON-02US United States 14->66 50 C:\Program Files (x86)\...\is-E8AS3.tmp, PE32 14->50 dropped 52 C:\Program Files (x86)\...\is-A8RAR.tmp, PE32 14->52 dropped 54 C:\...\DeviceDoctor.exe (copy), PE32 14->54 dropped 56 14 other files (2 malicious) 14->56 dropped 18 DeviceDoctor.exe 12 13 14->18         started        22 DeviceDoctor.exe 8 14->22         started        24 taskkill.exe 1 14->24         started        26 2 other processes 14->26 file9 process10 dnsIp11 60 192.168.2.1 unknown unknown 18->60 46 C:\Program Files (x86)\Device Doctor\7z.dll, PE32 18->46 dropped 28 schtasks.exe 1 18->28         started        30 schtasks.exe 1 18->30         started        32 schtasks.exe 1 18->32         started        62 receiver.smartpcupdate.com 142.132.139.157, 49775, 49776, 49800 UNIVERSITYOFWINNIPEG-ASNCA Canada 22->62 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        38 conhost.exe 26->38         started        file12 process13 process14 40 conhost.exe 28->40         started        42 conhost.exe 30->42         started        44 conhost.exe 32->44         started       
Threat name:
Win32.PUA.SpeedingUpMyPC
Status:
Malicious
First seen:
2020-05-09 00:18:33 UTC
File Type:
PE (Exe)
Extracted files:
521
AV detection:
8 of 42 (19.05%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
647983ebde53e0501ff1af8ef6190dfeea5ccc64caf7dce808f1e3d98fb66a3c
MD5 hash:
84db4b4205f705da71471dc6ecc061f5
SHA1 hash:
b90bac8c13a1553d58feef95a2c41c64118b29cf
SH256 hash:
d280b7ab50ca6406309e5249f9718c41610d492323a9eb97a47595c31b837fef
MD5 hash:
c889b8791cd33ad40cf64f24433883e3
SHA1 hash:
8528be5299a377fb9241fbedc69bd03679f21bf5
SH256 hash:
989ca7508d256332e873b3d6eaf03156f1c77806dc820a900da0ab48ea360d52
MD5 hash:
3d8f7453ad8bc2572aa624d68a11c29f
SHA1 hash:
634cb4f5db830521fad92acc8713080e87feb1fd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments