analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Tax%20Payment%20Challan.zip

Full analysis: https://app.any.run/tasks/5d63f6eb-6118-4e7e-a1ea-0f811e59afc3
Verdict: Malicious activity
Analysis date: August 26, 2019, 03:43:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

2E9AC620C8E987DE893E868A060F28AE

SHA1:

6416ADB973B67B54D363E712522B62A8E499DF33

SHA256:

1305CFE1705275E5838EA109BBEBAEDD20B2B3FC09A59790D594D271EB4A5214

SSDEEP:

12288:wtrS6K+x+yXGBVgLaY1Z1kGDchPYZI+mJhkJU:ArS6jXGL0j1vkGDrZIBJhwU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Tax Payment Challan.exe (PID: 3104)
      • lwkumpch.exe (PID: 3592)
    • Writes to a start menu file

      • Tax Payment Challan.exe (PID: 3104)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Tax Payment Challan.exe (PID: 3104)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3508)
      • Tax Payment Challan.exe (PID: 3104)
    • Executed via COM

      • DllHost.exe (PID: 4056)
    • Reads internet explorer settings

      • Tax Payment Challan.exe (PID: 3104)
      • lwkumpch.exe (PID: 3592)
    • Creates files in the user directory

      • Tax Payment Challan.exe (PID: 3104)
    • Starts itself from another location

      • Tax Payment Challan.exe (PID: 3104)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Tax Payment Challan.exe
ZipUncompressedSize: 741376
ZipCompressedSize: 413395
ZipCRC: 0x3ff4927a
ZipModifyDate: 2019:08:25 21:24:21
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe tax payment challan.exe cmd.exe no specs PhotoViewer.dll no specs lwkumpch.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3508"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\3251d3a2-9687-4230-8f79-48c269c4ddf9.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3104"C:\Users\admin\AppData\Local\Temp\Rar$EXa3508.2281\Tax Payment Challan.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3508.2281\Tax Payment Challan.exe
WinRAR.exe
User:
admin
Company:
PERSONAL COMPUTER
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2768cmd.exe /c C:\Users\admin\AppData\Local\Temp\NewBitmapImage.bmpC:\Windows\system32\cmd.exeTax Payment Challan.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4056C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3592"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lwkumpch.exe"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lwkumpch.exeTax Payment Challan.exe
User:
admin
Company:
PERSONAL COMPUTER
Integrity Level:
MEDIUM
Version:
1.00
Total events
2 296
Read events
1 095
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
29
Unknown types
0

Dropped files

PID
Process
Filename
Type
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\dnserrordiagoff_webOC[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\ErrorPageTemplate[2]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\errorPageStrings[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\ErrorPageTemplate[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\errorPageStrings[2]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\httpErrorPagesScripts[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\background_gradient[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\info_48[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\bullet[1]
MD5:
SHA256:
3104Tax Payment Challan.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\background_gradient[1]
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info