analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://bazaar.abuse.ch/download/b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286/

Full analysis: https://app.any.run/tasks/d7929fec-29b4-4cda-9923-1320245789d6
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 08, 2020, 12:17:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

D2D1318860110139A50EE8D5DADDD10E

SHA1:

B4EF0FC8AEACCF451EFA3CE4E23C009106904923

SHA256:

08AC254BA19EB3FD2F339E8B1239CA69E1CF7B7FDAE6ABA26DE7AF389341FE9E

SSDEEP:

3:N8N0uDWB4/iRGRHzSSXkBCWHBTF5F0s:23G4igdzSkkBCmn5F0s

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 1808)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 2184)
    • Registers / Runs the DLL via REGSVR32.EXE

      • WINWORD.EXE (PID: 1808)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 1808)
    • Requests a remote executable file from MS Office

      • WINWORD.EXE (PID: 1808)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 1496)
    • Application launched itself

      • WINWORD.EXE (PID: 1808)
    • Starts Microsoft Office Application

      • WINWORD.EXE (PID: 1808)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 1496)
    • Manual execution by user

      • WINWORD.EXE (PID: 1808)
      • WinRAR.exe (PID: 2144)
    • Application launched itself

      • firefox.exe (PID: 2280)
      • firefox.exe (PID: 1496)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 1808)
      • WINWORD.EXE (PID: 3728)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 1496)
      • WINWORD.EXE (PID: 1808)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 1808)
      • firefox.exe (PID: 1496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
10
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe winrar.exe no specs winword.exe winword.exe no specs regsvr32.exe

Process information

PID
CMD
Path
Indicators
Parent process
2280"C:\Program Files\Mozilla Firefox\firefox.exe" "https://bazaar.abuse.ch/download/b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286/"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
1496"C:\Program Files\Mozilla Firefox\firefox.exe" https://bazaar.abuse.ch/download/b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286/C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3860"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1496.0.2039401479\1743911376" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1496 "\\.\pipe\gecko-crash-server-pipe.1496" 1180 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3876"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1496.3.1691480165\332716785" -childID 1 -isForBrowser -prefsHandle 1752 -prefMapHandle 1748 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1496 "\\.\pipe\gecko-crash-server-pipe.1496" 776 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
624"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1496.13.1971673431\1660352298" -childID 2 -isForBrowser -prefsHandle 2924 -prefMapHandle 2928 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1496 "\\.\pipe\gecko-crash-server-pipe.1496" 2900 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3724"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1496.20.2146160316\1143947427" -childID 3 -isForBrowser -prefsHandle 3744 -prefMapHandle 3752 -prefsLen 7631 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1496 "\\.\pipe\gecko-crash-server-pipe.1496" 3764 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2144"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Downloads\b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286.zip" C:\Users\admin\Downloads\b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1808"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Downloads\b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286\b23322f71771729668c866c9e3772eddb428c3c5d68bfba9433da3fe63f0c286.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3728"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\WINWORD.EXEWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
2184regsvr32 C:\Users\admin\AppData\Local\Temp\main.themeC:\Windows\system32\regsvr32.exe
WINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
3 771
Read events
2 707
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
91
Text files
45
Unknown types
53

Dropped files

PID
Process
Filename
Type
1496firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
1496firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
1496firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
1496firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
MD5:
SHA256:
1496firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
1496firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:5027177F513CDAE07DB2330E1DED5934
SHA256:0C53F16051E738287A4612F68E296238087627E594CFD6DDFA1FECC2E998328B
1496firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\593EE06E0028389F46DEA3F616D978E292FDD8FCcompressed
MD5:0C86E40E2051B7B207003ADB85C44EE3
SHA256:21A0BDB49ACD21463D06A74E9CCD88A70AE382DE4B161952204BAB4D2FC0DD72
1496firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4jsonlz4
MD5:6D378E0D40B6EACA22C8BCE899A1C5C1
SHA256:ADA2467B2477ACEFF837AC7820C435AD1EBBE844B2DA31C7AB9AE8D010C7A639
1496firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\34068BD107C2AE4BD0A7761F67D4FCA79A0E06CAcompressed
MD5:432D18B4AF09FF86C8F8A35768C8E0CF
SHA256:D998F8EFD669FF482549EC32E81A3E158272696D7DD9707D8B3D5DA556A21577
1496firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:DE9496ACA551ADE408EF6466A11833A1
SHA256:8F9C7FDB3E0BC01024E43A8E242468FC4DD4F74C725E32A883571635203DC10A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
29
DNS requests
80
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1496
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
1808
WINWORD.EXE
GET
200
80.85.157.176:80
http://sv51gh.com/pupi/gyru.php?l=taxef14.cab
RU
executable
167 Kb
suspicious
2184
regsvr32.exe
GET
304
67.27.233.126:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.7 Kb
whitelisted
1496
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1496
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1496
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2184
regsvr32.exe
GET
200
67.27.233.126:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.7 Kb
whitelisted
1496
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1core
US
der
471 b
whitelisted
1496
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1496
firefox.exe
GET
200
2.16.177.18:80
http://detectportal.firefox.com/success.txt
unknown
text
8 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1496
firefox.exe
151.101.2.49:443
bazaar.abuse.ch
Fastly
US
malicious
1496
firefox.exe
143.204.201.119:443
snippets.cdn.mozilla.net
US
suspicious
1496
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1496
firefox.exe
34.215.30.140:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
1496
firefox.exe
2.16.177.18:80
detectportal.firefox.com
Akamai International B.V.
unknown
1496
firefox.exe
52.38.182.23:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
1496
firefox.exe
2.16.177.99:443
shavar.services.mozilla.com
Akamai International B.V.
unknown
1496
firefox.exe
216.58.207.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
1496
firefox.exe
216.58.212.142:443
www.youtube.com
Google Inc.
US
whitelisted
1496
firefox.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
bazaar.abuse.ch
  • 151.101.2.49
  • 151.101.66.49
  • 151.101.130.49
  • 151.101.194.49
whitelisted
detectportal.firefox.com
  • 2.16.177.18
  • 2.16.177.88
whitelisted
a1089.dscd.akamai.net
  • 2.16.177.88
  • 2.16.177.18
whitelisted
p2.shared.global.fastly.net
  • 151.101.194.49
  • 151.101.130.49
  • 151.101.66.49
  • 151.101.2.49
whitelisted
search.services.mozilla.com
  • 34.215.30.140
  • 52.89.139.159
  • 52.25.145.219
whitelisted
search.r53-2.services.mozilla.com
  • 52.25.145.219
  • 52.89.139.159
  • 34.215.30.140
whitelisted
push.services.mozilla.com
  • 52.38.182.23
whitelisted
autopush.prod.mozaws.net
  • 52.38.182.23
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
snippets.cdn.mozilla.net
  • 143.204.201.119
  • 143.204.201.68
  • 143.204.201.83
  • 143.204.201.78
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
1808
WINWORD.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1808
WINWORD.EXE
Misc activity
ET INFO EXE - Served Attached HTTP
2184
regsvr32.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2184
regsvr32.exe
Not Suspicious Traffic
ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O)
1 ETPRO signatures available at the full report
No debug info