analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

loader.zip

Full analysis: https://app.any.run/tasks/c6749845-4a67-44aa-8c10-070d68649804
Verdict: Malicious activity
Analysis date: July 18, 2019, 09:16:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

65CB72A3C2670D1944C84D46D5929969

SHA1:

0AF292EB3AF41EF3B5E051EF09D03185B1359224

SHA256:

154573E4BEA70F11BA39669931A413FAFC876CCB1559EF27369D4FEE68EC7264

SSDEEP:

98304:sEbxZ0TFbheOUW1NP71Xolw69n6e/5F4rDfLijJvKVY56TMudN9QDXfTC4N5jyw6:sonSeOX3P7holw6dxF4Hf8h1KBcDXfFc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ynku_loader.exe (PID: 544)
      • ynku_loader.exe (PID: 2852)
    • Loads dropped or rewritten executable

      • ynku_loader.exe (PID: 544)
      • SearchProtocolHost.exe (PID: 2552)
      • WerFault.exe (PID: 3996)
      • ynku_loader.exe (PID: 2852)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ynku_loader.exe (PID: 544)
      • ynku_loader.exe (PID: 2852)
  • INFO

    • Manual execution by user

      • ynku_loader.exe (PID: 544)
      • ynku_loader.exe (PID: 2852)
    • Application was crashed

      • ynku_loader.exe (PID: 544)
      • ynku_loader.exe (PID: 2852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.kmz | Google Earth saved working session (60)
.zip | ZIP compressed archive (40)

EXIF

ZIP

ZipFileName: core.dll
ZipUncompressedSize: 2366976
ZipCompressedSize: 2265630
ZipCRC: 0xf7729651
ZipModifyDate: 2019:07:16 19:32:21
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs searchprotocolhost.exe no specs ynku_loader.exe werfault.exe no specs ynku_loader.exe

Process information

PID
CMD
Path
Indicators
Parent process
3488"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\loader.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2552"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
544"C:\Users\admin\Desktop\ynku_loader.exe" C:\Users\admin\Desktop\ynku_loader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ynku
Exit code:
3221225477
Version:
1.0.0.0
3996C:\Windows\system32\WerFault.exe -u -p 544 -s 720C:\Windows\system32\WerFault.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2852"C:\Users\admin\Desktop\ynku_loader.exe" C:\Users\admin\Desktop\ynku_loader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ynku
Exit code:
3221225477
Version:
1.0.0.0
Total events
450
Read events
428
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3488WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3488.44155\core.dll
MD5:
SHA256:
3488WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3488.44155\Google.Authenticator.dll
MD5:
SHA256:
3488WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3488.44155\insecure.txt
MD5:
SHA256:
3488WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3488.44155\ynku_loader.exe
MD5:
SHA256:
3996WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\ynku_loader.exe.544.dmp
MD5:
SHA256:
3996WerFault.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_ynku_loader.exe_8f2f2caf19af9b16e86677b4e2e54b5b256875b4_0f926925\Report.werbinary
MD5:C564E792380AFFFAA75140BC48D5CE12
SHA256:AECAE6122E4467BF2F20A07FCC1C770FA5F3AC1958276B4DE59D5D0B3F65241F
544ynku_loader.exeC:\Users\admin\Desktop\d.dllexecutable
MD5:9FA4244F9872E36FB191BAC93B95D683
SHA256:9EB18CCF4579D1D76B24FBF6FC8821D6879D9A210E388002A0E71E09C2D66E1B
2852ynku_loader.exeC:\Users\admin\Desktop\d.dllexecutable
MD5:9FA4244F9872E36FB191BAC93B95D683
SHA256:9EB18CCF4579D1D76B24FBF6FC8821D6879D9A210E388002A0E71E09C2D66E1B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info