analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

malicious.iso

Full analysis: https://app.any.run/tasks/df98cbb1-8bb1-4435-87f5-f67a60696603
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 22, 2019, 11:44:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
xpertrat
stealer
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'AWB-00412.180320192892.pdf'
MD5:

8BDC4B12DA5DAF82F81DFD6F2A2E1344

SHA1:

7BC80F9005967ADD2923D3637ADEF613FE0F3B87

SHA256:

0F7812807B823DCF7B3C199A9DD607AAE9FC6BFEA06A69C6B66E79E19490B526

SSDEEP:

24576:rUuuA+2A6v29otAbuZjkecyvHx+5uT1q:aA+D6vgo6iZjkkvHlw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • AWB-00412.180320192892.pdf.exe (PID: 1332)
      • AWB-00412.180320192892.pdf.exe (PID: 4008)
    • UAC/LUA settings modification

      • AWB-00412.180320192892.pdf.exe (PID: 4008)
    • XPERTRAT was detected

      • iexplore.exe (PID: 2392)
    • Changes the autorun value in the registry

      • iexplore.exe (PID: 2392)
    • Connects to CnC server

      • iexplore.exe (PID: 2392)
    • Actions looks like stealing of personal data

      • iexplore.exe (PID: 240)
    • Stealing of credential data

      • iexplore.exe (PID: 240)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1900)
      • iexplore.exe (PID: 2392)
    • Application launched itself

      • AWB-00412.180320192892.pdf.exe (PID: 1332)
      • iexplore.exe (PID: 2392)
    • Starts Internet Explorer

      • AWB-00412.180320192892.pdf.exe (PID: 4008)
      • iexplore.exe (PID: 2392)
    • Creates files in the user directory

      • iexplore.exe (PID: 2392)
      • iexplore.exe (PID: 3916)
      • iexplore.exe (PID: 240)
    • Connects to unusual port

      • iexplore.exe (PID: 2392)
    • Loads DLL from Mozilla Firefox

      • iexplore.exe (PID: 3916)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iso | ISO 9660 CD image (27.6)
.atn | Photoshop Action (27.1)
.gmc | Game Music Creator Music (6.1)

EXIF

ISO

System: Win32
VolumeName: AWB-00412.180320192892.pdf
VolumeBlockCount: 483
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2019:03:18 07:23:33+08:00
Software: PowerISO
VolumeCreateDate: 2019:03:18 07:23:33.00+08:00
VolumeModifyDate: 2019:03:18 07:23:33.00+08:00

Composite

VolumeSize: 966 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
8
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe awb-00412.180320192892.pdf.exe no specs awb-00412.180320192892.pdf.exe no specs #XPERTRAT iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1604"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\malicious.isoC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1900"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\malicious.iso"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1332"C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exe" C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4008"C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exe" C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeAWB-00412.180320192892.pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2392 C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeC:\Program Files\Internet Explorer\iexplore.exe
AWB-00412.180320192892.pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3916 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj0.txt"C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
240 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj1.txt"C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2524 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj2.txt"C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
922
Read events
818
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4008AWB-00412.180320192892.pdf.exeC:\Users\admin\AppData\Local\Temp\~DF141084EE04BD87E2.TMP
MD5:
SHA256:
1900WinRAR.exeC:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeexecutable
MD5:442D46C3C9EBC0C666921B7523C35A01
SHA256:19F1362F8FEB68678B420935877C3D1E68B894B9071378CEA44807EDC10288C0
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6binary
MD5:5C200A6D71ACA8186BAFB1D8956FDBA4
SHA256:669B670EC756FA4B572DE9F9300C5BDDC6FDFF913D2DCF07282A211057030F20
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6.exeexecutable
MD5:442D46C3C9EBC0C666921B7523C35A01
SHA256:19F1362F8FEB68678B420935877C3D1E68B894B9071378CEA44807EDC10288C0
240iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj1.txttext
MD5:7FB9A9AD0FD9B1E0108ED71FBB276048
SHA256:7D63C301317E144B0133A72250AE2D8E09AF65A92E6A807EC58A71939FE530A9
2392iexplore.exeC:\Users\admin\AppData\Local\Temp\admin.bmpimage
MD5:343FA15C150A516B20CC9F787CFD530E
SHA256:D632E9DBACDCD8F6B86BA011ED6B23F961D104869654CAA764216EA57A916524
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\utimage
MD5:A634CB7EB39B833D885186B5BA1023F2
SHA256:8806D6FD705D67F18EAA6C95806D405CD3A3A56E41636958A408973F602DAEBF
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6.pasbinary
MD5:2EEC4FEAAD2D41A806A8D3197A4F538B
SHA256:119392EE23F7CEDCB8D278E0FCD9B3FE75EC3124C4ACAB8F4129A3BA164F7DDF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2392
iexplore.exe
84.38.135.183:1234
DataClub S.A.
NL
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
4 ETPRO signatures available at the full report
No debug info