| File name: | Net-Worm.zip |
| Full analysis: | https://app.any.run/tasks/7d1120b3-bc63-42d9-9704-e88eeb6454c8 |
| Verdict: | Malicious activity |
| Analysis date: | March 10, 2024, 14:08:28 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v4.5 to extract, compression method=deflate |
| MD5: | C767D9A19901A2E540D3BA41168C7694 |
| SHA1: | CE2CE6F04807CA1F536A9880292850781747733D |
| SHA256: | 03CEF643BAA7561DD495994D4701AC3983964AFC014971BBD128307ECF94C1D5 |
| SSDEEP: | 98304:eFmmecd/fuc8nJUxB3wyEuo0vZ9RNkxFg3m8IUbfkhR98mw9csB69sxLGR9O976z:MwPy8dfIc |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 45 |
|---|---|
| ZipBitFlag: | 0x0800 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:03:03 01:03:34 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | 2 |
| ZipUncompressedSize: | - |
| ZipFileName: | Net-Worm/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | NET STOP NAVAPSVC | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1336 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 | |||||||||||||||
| 1696 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Kolabc\Kobalc.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Kolabc\Kobalc.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft® Windows NET Runtime Optimization Service Integrity Level: MEDIUM Exit code: 0 Version: 5.1.2600.0 (xpclient.010817-1148) | |||||||||||||||
| 1836 | NET STOP SWEEPSRV.SYS | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1888 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Description: EternalRocks Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1992 | "C:\Windows\system32\ntvdm.exe" -i1 | C:\Windows\System32\ntvdm.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: NTVDM.EXE Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2024 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.A.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.A.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 | |||||||||||||||
| 2096 | C:\Windows\system32\net1 STOP PERSFW | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 2120 | NET STOP AVPCC | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2244 | NET STOP MCSHIELD | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Net-Worm.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Kolabc\Kobalc.exe | executable | |
MD5:15717CD327A723820D71900611545917 | SHA256:DB6CEA7E8D62D3B21EFE3B423B48C131E345CB55F168CBE1F142E491BB812747 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe | executable | |
MD5:71C981D4F5316C3AD1DEEFE48FDDB94A | SHA256:DE709DACAC623C637448DC91F6DFD441A49C89372AF2C53E2027E4AF5310B95D | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.B.exe | executable | |
MD5:FA3348956253F9F733B28B4CF1D45942 | SHA256:00808F00EC970E3ED518ED40BA77F64BE2B9761B02FBAEA2047C5AC82D8B8F99 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Loveware.txt | text | |
MD5:9F59E4D545E1A16EC4AD1B11291C5346 | SHA256:CD41EB3B411ABD314E90D980F4E05D7D2DB60FB8A9616F84754B4E1EEB10F290 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.A.exe | executable | |
MD5:EF1952B755BA912B9F60B2ED8DD68D30 | SHA256:B2FA6EDAA5FFC51D12150424355A0C86AC9F46D7EC772D35AB8D9F4FE7996D91 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Rahack\Rahack.exe | executable | |
MD5:70089174CF0B97D4E4DE889F03E97A7A | SHA256:400C72EF312E3B46FE417AA82D6691D18A07C0708E94B6FA7B47934909D3DB7C | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.A.exe | executable | |
MD5:5AE700C1DFFB00CEF492844A4DB6CD69 | SHA256:258F82166D20C68497A66D82349FC81899FDE8FE8C1CC66E59F739A9EA2C95A9 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe | executable | |
MD5:C52F20A854EFB013A0A1248FD84AAA95 | SHA256:CF8533849EE5E82023AD7ADBDBD6543CB6DB596C53048B1A0C00B3643A72DB30 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.c.sourcecode.txt | text | |
MD5:28FAD72D643985282FB85CA9B7892DFB | SHA256:FEBBF809124ED9D5771CA2DA4F2D8FD23643970BECC3D6B062E14CC97FAEE4B7 | |||
| 3700 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.E.exe | executable | |
MD5:8676210E6246948201AA014DB471DE90 | SHA256:2E481059B9BC9686C676D69A80202EED5022C9A53ECD8CAC215E70C601DD7FDC | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |