File name:

request.zip

Full analysis: https://app.any.run/tasks/54e86f04-e5b5-48d2-947a-79cb5e598fe1
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 16, 2020, 15:12:25
OS: Windows 10 Professional (build: 16299, 64 bit)
Tags:
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

8BD7CB4BC870478DF5445FE268D113EC

SHA1:

265DB6D60C6AF85F33AEFB02C608D04CC45E850B

SHA256:

0044C5D9921EC5081F157ECC0EBDB5C47B9E67B0C0755C5B3F7E0FB221EE3CA3

SSDEEP:

3072:y7XdWZnh/ELyj7X5qmUiwzLq9aiLn7O9Q2NAOePZw:SXdWl/LnU/3+cBNxePO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • WINWORD.EXE (PID: 640)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 640)
  • SUSPICIOUS

    • Creates files in the program directory

      • WINWORD.EXE (PID: 640)
    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 3364)
  • INFO

    • Reads the software policy settings

      • WINWORD.EXE (PID: 640)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 640)
    • Scans artifacts that could help determine the target

      • WINWORD.EXE (PID: 640)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 640)
    • Reads Environment values

      • WINWORD.EXE (PID: 640)
    • Reads the machine GUID from the registry

      • WINWORD.EXE (PID: 640)
    • Reads settings of System Certificates

      • WINWORD.EXE (PID: 640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2020:10:16 02:26:23
ZipCRC: 0x49869a14
ZipCompressedSize: 96797
ZipUncompressedSize: 101139
ZipFileName: decree,010.20.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
88
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winword.exe regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIb3364.410\decree,010.20.doc" /o ""C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.12026.20264
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
1228regsvr32 c:\programdata\fidiI.txtC:\WINDOWS\SYSTEM32\regsvr32.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
10.0.16299.15 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3364"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\request.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
2 440
Read events
2 270
Write events
152
Delete events
18

Modification events

(PID) Process:(3364) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3364) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3364) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3364) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E
Operation:writeName:@C:\WINDOWS\system32\windows.storage.dll,-9216
Value:
This PC
(PID) Process:(3364) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E
Operation:writeName:@windows.storage.dll,-21825
Value:
3D Objects
(PID) Process:(3364) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E
Operation:writeName:@C:\WINDOWS\system32\windows.storage.dll,-50691
Value:
Libraries
(PID) Process:(3364) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\19e\52C64B7E
Operation:writeName:@C:\WINDOWS\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(3364) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\request.zip
(PID) Process:(3364) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3364) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
Executable files
0
Suspicious files
2
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A1FEDU2BYDWIJ1DO4K2H.temp
MD5:
SHA256:
640WINWORD.EXEC:\Users\admin\AppData\Local\Temp\.sestext
MD5:
SHA256:
640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
640WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Rar$DIb3364.410\~$cree,010.20.docpgc
MD5:
SHA256:
640WINWORD.EXEC:\programdata\fidiI.txtxml
MD5:
SHA256:
640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
3364WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3364.410\decree,010.20.docdocument
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
3
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
640
WINWORD.EXE
GET
404
185.98.87.81:80
http://go5bln3.com/muty/sohaq.php?l=tali7.cab
RU
xml
345 b
malicious
640
WINWORD.EXE
GET
404
13.107.42.23:443
https://config.edge.skype.com/config/v2/Office/word/16.0.12026.20264/Production/CC?&Clientid=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&Application=word&Platform=win32&Version=16.0.12026.20264&MsoVersion=16.0.12026.20194&Audience=Production&Build=ship&Architecture=x64&Language=en-US&SubscriptionLicense=false&PerpetualLicense=2019&Channel=CC&InstallType=C2R&SessionId=%7bFFCF4442-CFCE-4AE2-8A6A-071FBF35FAB3%7d&LabMachine=false
US
xml
345 b
malicious
640
WINWORD.EXE
POST
404
52.114.74.43:443
https://self.events.data.microsoft.com/OneCollector/1.0/
NL
xml
345 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
640
WINWORD.EXE
185.98.87.81:80
go5bln3.com
Dataline Ltd
RU
malicious
640
WINWORD.EXE
13.107.42.23:443
config.edge.skype.com
Microsoft Corporation
US
suspicious
640
WINWORD.EXE
52.114.74.43:443
self.events.data.microsoft.com
Microsoft Corporation
NL
whitelisted

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.23
malicious
go5bln3.com
  • 185.98.87.81
malicious
self.events.data.microsoft.com
  • 52.114.74.43
whitelisted

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
Process
Message
WINWORD.EXE
2020-10-16 15:13:28.601 T#3688 <E> [MATSDK] HTTP request WI-1 failed after 362 ms, events were rejected by the server (404) and will be all dropped
WINWORD.EXE
2020-10-16 15:13:28.601 T#3688 <E> [MATSDK] Http response JSON parsing failed