Summary | ZeroBOX

sogoubmbd.e

Gen1
Category Machine Started Completed
FILE s1_win7_x6402 April 7, 2021, 2:49 p.m. April 7, 2021, 2:51 p.m.
Size 2.3MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a57644fd92464f84b407a671faf519bd
SHA256 4d6a9dc1a53e7b973da056a9bb900ee7b3047bdcc4d165c132562b78d39afc03
CRC32 190B2DAC
ssdeep 49152:KuuE7AnqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFWd:sE7AqrlyutLxC3sEwwMd
PDB Path F:\SogouSoftwareWorkDir\SogouSoftware\Src\MiniDownLoad\Release\MiniDownLoad.pdb
Yara
  • network_http - Communications over HTTP
  • escalate_priv - Escalade priviledges
  • screenshot - Take screenshot
  • win_mutex - Create or check mutex
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_private_profile - Affect private profile
  • win_files_operation - Affect private profile
  • Str_Win32_Wininet_Library - Match Windows Inet API library declaration
  • Str_Win32_Internet_API - Match Windows Inet API call
  • Str_Win32_Http_API - Match Windows Http API call
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDigitalSignature - DigitalSignature Check
  • HasDebugData - DebugData Check
  • HasRichSignature - Rich Signature Check

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path F:\SogouSoftwareWorkDir\SogouSoftware\Src\MiniDownLoad\Release\MiniDownLoad.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
resource name EXE
request GET http://yz.app.sogou.com/appinfo?num=7187
request GET http://ping.t.sogou.com/pingd?srctype=sogousoftware&gid=ajPvVhluZC6COd4TfDjHgh0000o60f--&unc=sogousoftware_normal&t=10&rand=1617785359
request GET http://xz.sogou.com/handleUserIdDb256?userid=293cdfe5155ef661a6c8d1373e74eb41&downloadtype=bpackage&unc=sogousoftware_normal&pcid=0&mode=recommend
request GET http://yze.t.sogou.com/externalapp/3.2.2.58/SogouSoftwareExternalApp.exe
request HEAD https://img02.sogoucdn.com/v2/thumb/retype/ext/jpg/cls/imagick?appid=200504&url=http://dl.app.sogou.com/pc_logo/-9210862937994770673.png
request GET https://img02.sogoucdn.com/v2/thumb/retype/ext/jpg/cls/imagick?appid=200504&url=http://dl.app.sogou.com/pc_logo/-9210862937994770673.png
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3872
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73dd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3872
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74e51000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4016
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4016
region_size: 2293760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05d40000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4016
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05f30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
name EXE language LANG_CHINESE filetype PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0003a310 size 0x001ef578
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00243ce8 size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00244150 size 0x00000068
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x002441b8 size 0x000002f4
file C:\Program Files (x86)\SogouSoftware\download\download\MiniThunderPlatform.exe
file C:\Program Files (x86)\SogouSoftware\download\download\MiniTPFw.exe
file C:\Program Files (x86)\SogouSoftware\download\download\msvcr71.dll
file C:\Program Files (x86)\SogouSoftware\crash\ExceptionReport.exe
file C:\Users\test22\AppData\Local\Temp\minidownload.exe
file C:\Program Files (x86)\SogouSoftware\download\download\msvcp71.dll
file C:\Program Files (x86)\SogouSoftware\download\download\ThunderFW.exe
file C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe
file C:\Program Files (x86)\SogouSoftware\download\download\download_engine.dll
file C:\Program Files (x86)\SogouSoftware\download\download\atl71.dll
file C:\Program Files (x86)\SogouSoftware\tmp\ExternalApp.exe
file C:\Program Files (x86)\SogouSoftware\download\xldl.dll
file C:\Program Files (x86)\SogouSoftware\download\download\zlib1.dll
file C:\Program Files (x86)\SogouSoftware\SogouSoftwareLoader.dll
file C:\Program Files (x86)\SogouSoftware\download\download\dl_peer_id.dll
file C:\Users\test22\AppData\Local\Temp\minidownload.exe
file C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe
file C:\Users\test22\AppData\Local\Temp\minidownload.exe
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK Date: Wed, 07 Apr 2021 05:49:40 GMT Content-Type: application/octet-stream Content-Length: 12435040 Connection: keep-alive ETag: "1939545478" Accept-Ranges: bytes Last-Modified: Mon, 12 Dec 2016 13:03:15 GMT Server: WS CDN Server Age: 2411928 X-Via: 1.1 PSfjqzdxsq151:5 (Cdn Cache Server V2.0)[7 200 0], 1.1 PShgseSEL5ps83:3 (Cdn Cache Server V2.0)[1 200 0] X-Ws-Request-Id: 606d47f4_PShgseSEL5ps83_664-53774 MZÿÿ¸@غ´ Í!¸LÍ!This program cannot be run in DOS mode. $1¸„:uÙêiuÙêiuÙêi¶ÖµiwÙêiuÙëiîÙêi¶Ö·idÙêi!úÚiÙêi²ßìitÙêiRichuÙêiPELÁãKà ZÔË0p@POS¾€¤s´ànH¥½pŒ.textÒXZ `.rdatap^@@.datax¯p@À.
received: 1024
socket: 1468
1 1024 0
section {u'size_of_data': u'0x0020a800', u'virtual_address': u'0x0003a000', u'entropy': 7.935676122614296, u'name': u'.rsrc', u'virtual_size': u'0x0020a638'} entropy 7.93567612261 description A section with a high entropy has been found
entropy 0.900279991385 description Overall entropy of this PE file is high
url http://nsis.sf.net/NSIS_Error
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 172.217.25.14
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob
process sogoubmbd.e useragent HttpDownload
process sogoubmbd.e useragent HttpRequest
process SogouSoftware.exe useragent Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; {D9D54F49-E51C-445e-92F2-1EE3C2313240})
Process injection Process 6704 resumed a thread in remote process 3872
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002c0
suspend_count: 1
process_identifier: 3872
1 0 0
Bkav W32.HfsAdware.170E
CAT-QuickHeal Trojan.MauvaiseRI.S5244821
McAfee PUP-FTL
Cylance Unsafe
Zillya Downloader.SogouCRTD.Win32.237
K7AntiVirus Unwanted-Program ( 004cca081 )
Alibaba Downloader:Win32/Sogou.e55d24e6
K7GW Unwanted-Program ( 004cca081 )
Invincea heuristic
F-Prot W32/Sogou.H.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
ClamAV Win.Worm.Chir-2282
Kaspersky not-a-virus:Downloader.Win32.Sogou.g
NANO-Antivirus Trojan.Win32.Gbot.fgypno
Avast Win32:Malware-gen
Emsisoft Application.Chindo (A)
Comodo Application.Win32.Sogou.C@6e9656
F-Secure Adware.ADWARE/Sogou.wqqyp
DrWeb BackDoor.Gbot.2850
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0PJJ19
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.vc
FireEye Generic.mg.a57644fd92464f84
SentinelOne DFI - Malicious PE
Cyren W32/Sogou.H.gen!Eldorado
eGambit Unsafe.AI_Score_90%
Avira ADWARE/Sogou.wqqyp
Antiy-AVL RiskWare[Downloader]/Win32.Sogou
Microsoft PUA:Win32/Sogou
Endgame malicious (high confidence)
ZoneAlarm not-a-virus:Downloader.Win32.Sogou.g
AhnLab-V3 PUP/Win32.Downloader.R180775
VBA32 Downloader.Sogou
Malwarebytes Adware.Sogou
ESET-NOD32 a variant of Win32/Sogou.H potentially unwanted
TrendMicro-HouseCall TROJ_GEN.R002C0PJJ19
Yandex PUA.Downloader!
Ikarus not-a-virus:Downloader.Sogou
MaxSecure Trojan.Malware.8608356.susgen
AVG Win32:Malware-gen
Panda PUP/Sogou
CrowdStrike win/malicious_confidence_80% (D)