analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://p7fg8a.ch.files.1drv.com/y4md9A3nDOsrzJWeHDlS6FWFCsN87EbIclCkqny2qxEy5ACsGJadyDx_loNeajKxoDQ0y57NrcrWs2Bw6QeajcbMLyl4ymyZFwxdev2aafSspqXXFtsOO5q-VYBLq3V0M0ZjJ5Y0cKLcyV00M4B3c0AP_g8NfC9eP3MSDtOEXEfdu1sNoBxKgQkoc3xz8CfuXfx9wpTKzGmgmP1eceU0Ms6vQ/attached%20Invoice%20%26%20Packing%20List.pdf.z?download&psid=1

Full analysis: https://app.any.run/tasks/8f38e7ed-0023-458b-9e0d-4bc74796d7df
Verdict: Malicious activity
Analysis date: April 24, 2019, 00:42:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

2479DFF2970174F1CD6F4B0527957750

SHA1:

5549139AFCD66806F929989B868CF99F43F52821

SHA256:

06457B3A502AD58592784FE867C88DCC5563D8BF3C2677E960C4A7BA47FA6838

SSDEEP:

6:2WHy5ahq4fhTjoHDpc6dMT6hnXjnOwCPj287ZRqgCmOEztjVVok1WAzGPtrDuK4F:2KygJ5IVfOGXjOvfZMgC5Eztj/rWBDu7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • attached Invoice & Packing List.pdf.exe (PID: 2192)
      • attached Invoice & Packing List.pdf.exe (PID: 760)
      • attached Invoice & Packing List.pdf.exe (PID: 2148)
      • attached Invoice & Packing List.pdf.exe (PID: 3200)
      • attached Invoice & Packing List.pdf.exe (PID: 2180)
      • attached Invoice & Packing List.pdf.exe (PID: 3936)
    • Writes to a start menu file

      • attached Invoice & Packing List.pdf.exe (PID: 3936)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2300)
      • attached Invoice & Packing List.pdf.exe (PID: 3936)
    • Application launched itself

      • attached Invoice & Packing List.pdf.exe (PID: 2192)
      • attached Invoice & Packing List.pdf.exe (PID: 760)
    • Creates files in the user directory

      • notepad++.exe (PID: 3884)
      • attached Invoice & Packing List.pdf.exe (PID: 3936)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2308)
    • Creates files in the user directory

      • iexplore.exe (PID: 3616)
    • Changes internet zones settings

      • iexplore.exe (PID: 2308)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2308)
      • iexplore.exe (PID: 3616)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2308)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2308)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
11
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start iexplore.exe iexplore.exe winrar.exe attached invoice & packing list.pdf.exe no specs attached invoice & packing list.pdf.exe no specs notepad++.exe attached invoice & packing list.pdf.exe gup.exe attached invoice & packing list.pdf.exe no specs attached invoice & packing list.pdf.exe no specs attached invoice & packing list.pdf.exe

Process information

PID
CMD
Path
Indicators
Parent process
2308"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3616"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2308 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2300"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\B6AKU5BF\attached%20Invoice%20&%20Packing%20List.pdf[1].z"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2192"C:\Users\admin\AppData\Local\Temp\Rar$EXa2300.9036\attached Invoice & Packing List.pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2300.9036\attached Invoice & Packing List.pdf.exeWinRAR.exe
User:
admin
Company:
Micro-Star International Co., Ltd.
Integrity Level:
MEDIUM
Description:
MSI Notification
Exit code:
0
Version:
2.3.1806.8
760"C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exe" C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exeexplorer.exe
User:
admin
Company:
Micro-Star International Co., Ltd.
Integrity Level:
MEDIUM
Description:
MSI Notification
Exit code:
0
Version:
2.3.1806.8
3884"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exe"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.51
3936"C:\Users\admin\AppData\Local\Temp\Rar$EXa2300.9036\attached Invoice & Packing List.pdf.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa2300.9036\attached Invoice & Packing List.pdf.exe
attached Invoice & Packing List.pdf.exe
User:
admin
Company:
Micro-Star International Co., Ltd.
Integrity Level:
MEDIUM
Description:
MSI Notification
Version:
2.3.1806.8
3236"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Exit code:
0
Version:
4.1
3200"C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exe" C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exeexplorer.exe
User:
admin
Company:
Micro-Star International Co., Ltd.
Integrity Level:
MEDIUM
Description:
MSI Notification
Version:
2.3.1806.8
2180"C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exe"C:\Users\admin\Desktop\attached Invoice & Packing List.pdf.exeattached Invoice & Packing List.pdf.exe
User:
admin
Company:
Micro-Star International Co., Ltd.
Integrity Level:
MEDIUM
Description:
MSI Notification
Exit code:
0
Version:
2.3.1806.8
Total events
1 526
Read events
1 431
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
2
Text files
16
Unknown types
6

Dropped files

PID
Process
Filename
Type
2308iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2308iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2308iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2BD988B7B8773799.TMP
MD5:
SHA256:
2308iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF28AE2FDCA8B17768.TMP
MD5:
SHA256:
2308iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{E24ABF37-6629-11E9-A09E-5254004A04AF}.dat
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019042420190425\index.datdat
MD5:E0328EB35422122801F05C2FF69B487C
SHA256:2F06C436DB7D04969C8EB80AB3580179D1FE1685766AE73609D4A3F0BAB331D7
2300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2300.9036\attached Invoice & Packing List.pdf.exeexecutable
MD5:63BA32624321FA85853C33E8D41D564B
SHA256:359434CCF86273FA47CD12140352517C94FE5390E9BC105EE88D7E96383887F1
2308iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019042420190425\index.datdat
MD5:67DD13B6C915302E307C49453BA88E07
SHA256:43BF99004C35DFDB5682D146D7F709FDB2AAE8FDB400B2F2A8FE1A789162D0FD
3616iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.logtext
MD5:86D26B31CF88E1CBE2A443AC566858B8
SHA256:2AF09A6479D768D62117959C0E2895CF5EE149DB30BAC79FCE62DB46AA410C16
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:384499C301DA8D9BE5AB9DC2BAEE4A2C
SHA256:60327A2F2F0644499AC2065843A9D43FDE8A9A4A71233184ED6E225971B9D9D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
195.138.255.24:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
DE
der
1.37 Kb
whitelisted
2308
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2308
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3236
gup.exe
37.59.28.236:443
notepad-plus-plus.org
OVH SAS
FR
whitelisted
195.138.255.24:80
isrg.trustid.ocsp.identrust.com
AS33891 Netzbetrieb GmbH
DE
whitelisted
3616
iexplore.exe
13.107.42.12:443
p7fg8a.ch.files.1drv.com
Microsoft Corporation
US
suspicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
p7fg8a.ch.files.1drv.com
  • 13.107.42.12
whitelisted
notepad-plus-plus.org
  • 37.59.28.236
whitelisted
isrg.trustid.ocsp.identrust.com
  • 195.138.255.24
  • 195.138.255.16
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093