File name:

malicious.iso

Full analysis: https://app.any.run/tasks/df98cbb1-8bb1-4435-87f5-f67a60696603
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 22, 2019, 11:44:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
xpertrat
stealer
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'AWB-00412.180320192892.pdf'
MD5:

8BDC4B12DA5DAF82F81DFD6F2A2E1344

SHA1:

7BC80F9005967ADD2923D3637ADEF613FE0F3B87

SHA256:

0F7812807B823DCF7B3C199A9DD607AAE9FC6BFEA06A69C6B66E79E19490B526

SSDEEP:

24576:rUuuA+2A6v29otAbuZjkecyvHx+5uT1q:aA+D6vgo6iZjkkvHlw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • AWB-00412.180320192892.pdf.exe (PID: 1332)
      • AWB-00412.180320192892.pdf.exe (PID: 4008)
    • UAC/LUA settings modification

      • AWB-00412.180320192892.pdf.exe (PID: 4008)
    • Changes the autorun value in the registry

      • iexplore.exe (PID: 2392)
    • XPERTRAT was detected

      • iexplore.exe (PID: 2392)
    • Connects to CnC server

      • iexplore.exe (PID: 2392)
    • Actions looks like stealing of personal data

      • iexplore.exe (PID: 240)
    • Stealing of credential data

      • iexplore.exe (PID: 240)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1900)
      • iexplore.exe (PID: 2392)
    • Application launched itself

      • AWB-00412.180320192892.pdf.exe (PID: 1332)
      • iexplore.exe (PID: 2392)
    • Starts Internet Explorer

      • AWB-00412.180320192892.pdf.exe (PID: 4008)
      • iexplore.exe (PID: 2392)
    • Creates files in the user directory

      • iexplore.exe (PID: 2392)
      • iexplore.exe (PID: 3916)
      • iexplore.exe (PID: 240)
    • Connects to unusual port

      • iexplore.exe (PID: 2392)
    • Loads DLL from Mozilla Firefox

      • iexplore.exe (PID: 3916)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iso | ISO 9660 CD image (27.6)
.atn | Photoshop Action (27.1)
.gmc | Game Music Creator Music (6.1)

EXIF

ISO

System: Win32
VolumeName: AWB-00412.180320192892.pdf
VolumeBlockCount: 483
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2019:03:18 07:23:33+08:00
Software: PowerISO
VolumeCreateDate: 2019:03:18 07:23:33.00+08:00
VolumeModifyDate: 2019:03:18 07:23:33.00+08:00

Composite

VolumeSize: 966 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
8
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe awb-00412.180320192892.pdf.exe no specs awb-00412.180320192892.pdf.exe no specs #XPERTRAT iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj1.txt"C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1332"C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exe" C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\awb-00412.180320192892.pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1604"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\malicious.isoC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1900"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\malicious.iso"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2392 C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeC:\Program Files\Internet Explorer\iexplore.exe
AWB-00412.180320192892.pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2524 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj2.txt"C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3916 /stext "C:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj0.txt"C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
4008"C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exe" C:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeAWB-00412.180320192892.pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\awb-00412.180320192892.pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
922
Read events
818
Write events
104
Delete events
0

Modification events

(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\isoburn.exe,-350
Value:
Disc Image File
(PID) Process:(1604) rundll32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids
Operation:writeName:Windows.IsoFile
Value:
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@%SystemRoot%\System32\isoburn.exe,-352
Value:
Windows Disc Image Burner
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\isoburn.exe
Value:
Windows Disc Image Burner
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\WinRAR\WinRAR.exe
Value:
WinRAR archiver
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:(1604) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
Executable files
2
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4008AWB-00412.180320192892.pdf.exeC:\Users\admin\AppData\Local\Temp\~DF141084EE04BD87E2.TMP
MD5:
SHA256:
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6.exeexecutable
MD5:
SHA256:
1900WinRAR.exeC:\Users\admin\Desktop\AWB-00412.180320192892.pdf.exeexecutable
MD5:
SHA256:
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6binary
MD5:
SHA256:
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6.pasbinary
MD5:2EEC4FEAAD2D41A806A8D3197A4F538B
SHA256:119392EE23F7CEDCB8D278E0FCD9B3FE75EC3124C4ACAB8F4129A3BA164F7DDF
2392iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\utimage
MD5:A634CB7EB39B833D885186B5BA1023F2
SHA256:8806D6FD705D67F18EAA6C95806D405CD3A3A56E41636958A408973F602DAEBF
240iexplore.exeC:\Users\admin\AppData\Roaming\P4U8N5Y3-N0F7-P7T5-N113-K7R6K4T0G6G6\gfkgicwnj1.txttext
MD5:7FB9A9AD0FD9B1E0108ED71FBB276048
SHA256:7D63C301317E144B0133A72250AE2D8E09AF65A92E6A807EC58A71939FE530A9
2392iexplore.exeC:\Users\admin\AppData\Local\Temp\admin.bmpimage
MD5:343FA15C150A516B20CC9F787CFD530E
SHA256:D632E9DBACDCD8F6B86BA011ED6B23F961D104869654CAA764216EA57A916524
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
8

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2392
iexplore.exe
84.38.135.183:1234
DataClub S.A.
NL
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
2392
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] XpertRAT
4 ETPRO signatures available at the full report
No debug info