Summary | ZeroBOX

FreeMaps.af75d672c26d4cc59fc74465083f473c.exe

Category Machine Started Completed
FILE s1_win7_x6402 April 28, 2021, 11:08 a.m. April 28, 2021, 11:10 a.m.
Size 373.8KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 10e868b5ebf405fe2ca10e0552023d44
SHA256 71fb7537b5a88f41f407fcfda5781b4834f3fce234ff50030e48569574b4b043
CRC32 709935B8
ssdeep 6144:kbUTp1H7vzPjAcM+zsT8qEJEbrPBj3AIDkk7vCdWYDbHIae+0U/aM4tp5iFw2EWb:kIX7788J2aIDz7asspeuSLp5iefq
Yara
  • PE_Header_Zero - PE File Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDigitalSignature - DigitalSignature Check
  • HasRichSignature - Rich Signature Check

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
34.102.222.207 Active Moloch
34.107.128.118 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49809 -> 34.107.128.118:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49809
34.107.128.118:443
C=US, O=Let's Encrypt, CN=R3 CN=dp.tb.ask.com 44:f8:0d:13:ec:93:20:8d:aa:87:47:8b:43:be:99:08:b7:64:ef:7b

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
request GET http://anx.mindspark.com/anx.gif?anxa=CAPDownloadProcess&anxe=Error&errorCode=-16&errorType=nsisError&errorDetails=af75d672c26d4cc59fc74465083f473c&platform=vicinio&anxv=2.7.1.3000&anxd=2018-10-23&coid=af75d672c26d4cc59fc74465083f473c&refPartner=^BXV^mni000^S29402&refSub=&anxl=en-US&anxr=2022722323&refCobrand=BXV&refCampaign=mni000&refTrack=S29402&refCountry=
request GET http://anx.mindspark.com/anx.gif?anxa=CAPDownloadProcess&anxe=Error&errorCode=-11&errorType=nsisError&errorDetails=File+Not+Found+%28404%29&platform=vicinio&anxv=2.7.1.3000&anxd=2018-10-23&coid=af75d672c26d4cc59fc74465083f473c&refPartner=^BXV^mni000^S29402&refSub=&anxl=en-US&anxr=2075128396&refCobrand=BXV&refCampaign=mni000&refTrack=S29402&refCountry=
request GET https://dp.tb.ask.com/installerParams.jhtml?coId=af75d672c26d4cc59fc74465083f473c
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 996
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10004000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 996
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02850000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 996
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nseFFE5.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nseFFE5.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\nseFFE5.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\nseFFE5.tmp\System.dll
process freemaps.af75d672c26d4cc59fc74465083f473c.exe
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\FreeMapsTooltab Uninstall Internet Explorer
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00020019
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\FreeMapsTooltab Uninstall Internet Explorer
2 0
host 172.217.25.14
CAT-QuickHeal PUA.Mindsparki.Gen
Cylance Unsafe
K7GW Adware ( 004e15d51 )
K7AntiVirus Adware ( 004e15d51 )
Invincea heuristic
F-Prot W32/Adware.ANBU
Kaspersky not-a-virus:HEUR:WebToolbar.Win32.Agent.gen
ViRobot Adware.Mindspark.382768.A
Rising PUF.MySearch!1.AEA3 (CLASSIC:bWQ1OnZ3N/AEVQMtiToiO3hiHy0)
Emsisoft Application.WebToolbar (A)
Comodo ApplicUnwnt@#101t2rdwcqm0e
DrWeb Adware.MyWebSearch.145
Fortinet Adware/Agent
Cyren W32/Adware.JQZB-7335
Webroot W32.Adware.Installcore
Antiy-AVL GrayWare/Win32.StartPage.gen
Endgame malicious (high confidence)
SUPERAntiSpyware PUP.MindSpark/Variant
ZoneAlarm not-a-virus:HEUR:Downloader.Win32.Agent.gen
Microsoft PUA:Win32/MyWebSearch
AhnLab-V3 PUP/Win32.Mindspark.R233545
VBA32 Adware.Agent
Malwarebytes PUP.Optional.MindSpark
Zoner Trojan.Win32.70060
ESET-NOD32 Win32/Toolbar.MyWebSearch.BA potentially unwanted
Yandex PUA.Agent!
SentinelOne static engine - malicious
GData Win32.Adware.Mindspark.E
AVG Win32:UnwantedSig [PUP]
Avast Win32:UnwantedSig [PUP]
CrowdStrike malicious_confidence_100% (D)
Qihoo-360 Win32/Virus.Adware.e71