analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.okarahub.com/wp-content/themes/lambda/vendor/leafo/scssphp/site/templates/vostok_zakaz.rar

Full analysis: https://app.any.run/tasks/a8732ca1-a5cf-4821-9bca-f1a8c5b62055
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 25, 2019, 17:11:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
ransomware
troldesh
shade
evasion
Indicators:
MD5:

52DCE669DC9AC6AA9EF0D718C6CE71D9

SHA1:

5C718ED32CE47DBD096D0C9689CEDEAF5562155D

SHA256:

168FC83BDFDE3E98DB3E026072EDD4208ACEF80CD939EFE3D28C151F96B10A52

SSDEEP:

3:N8DSLjSLGKiVOlAQrF3ISIAL8jgVNA9mIjEmB0cf4X:2OLjSyFVOlAkF3ajQDI70cfa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • rad298DA.tmp (PID: 1464)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 3540)
    • Changes the autorun value in the registry

      • rad298DA.tmp (PID: 1464)
    • TROLDESH was detected

      • rad298DA.tmp (PID: 1464)
    • Deletes shadow copies

      • rad298DA.tmp (PID: 1464)
    • Dropped file may contain instructions of ransomware

      • rad298DA.tmp (PID: 1464)
    • Runs app for hidden code execution

      • rad298DA.tmp (PID: 1464)
    • Actions looks like stealing of personal data

      • rad298DA.tmp (PID: 1464)
    • Modifies files in Chrome extension folder

      • rad298DA.tmp (PID: 1464)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3540)
      • rad298DA.tmp (PID: 1464)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 3336)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3540)
      • rad298DA.tmp (PID: 1464)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3540)
      • rad298DA.tmp (PID: 1464)
    • Creates files in the program directory

      • rad298DA.tmp (PID: 1464)
    • Creates files like Ransomware instruction

      • rad298DA.tmp (PID: 1464)
    • Checks for external IP

      • rad298DA.tmp (PID: 1464)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2648)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2648)
    • Creates files in the user directory

      • iexplore.exe (PID: 2104)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2648)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2104)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2648)
    • Dropped object may contain URL to Tor Browser

      • rad298DA.tmp (PID: 1464)
    • Dropped object may contain TOR URL's

      • rad298DA.tmp (PID: 1464)
    • Dropped object may contain Bitcoin addresses

      • rad298DA.tmp (PID: 1464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe winrar.exe no specs wscript.exe cmd.exe no specs #TROLDESH rad298da.tmp vssadmin.exe no specs vssadmin.exe vssvc.exe no specs cmd.exe no specs chcp.com no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2648"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2104"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2648 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1968"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DG7GI13C\vostok_zakaz[1].rar"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3540"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Подробности заказа АО Авиационная компания Восток.js" C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2108"C:\Windows\System32\cmd.exe" /c C:\Users\admin\AppData\Local\Temp\rad298DA.tmpC:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1464C:\Users\admin\AppData\Local\Temp\rad298DA.tmpC:\Users\admin\AppData\Local\Temp\rad298DA.tmp
cmd.exe
User:
admin
Integrity Level:
MEDIUM
2136C:\Windows\system32\vssadmin.exe List ShadowsC:\Windows\system32\vssadmin.exerad298DA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3720"C:\Windows\system32\vssadmin.exe" Delete Shadows /All /QuietC:\Windows\system32\vssadmin.exe
rad298DA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1000C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3336C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exerad298DA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
1 319
Read events
1 190
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
1 052
Text files
59
Unknown types
43

Dropped files

PID
Process
Filename
Type
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF38173C16848D9CA9.TMP
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF16960653C72607DE.TMP
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2A95C6A7-677D-11E9-B63D-5254004A04AF}.dat
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2A95C6A8-677D-11E9-B63D-5254004A04AF}.datbinary
MD5:6807968D2F176D3745DA8291181AB7A5
SHA256:BDE06ECBA9697B4639184024320C373A3905EB385F567CAF54784687A05E3674
1968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1968.35651\Подробности заказа АО Авиационная компания Восток.jstext
MD5:03A114751DAA5A002F94D7782EA89855
SHA256:0B466944597D825617672E4A55B54DD3EDAB00693217DA50E707A2963854ED02
2104iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DG7GI13C\vostok_zakaz[1].rarcompressed
MD5:6A8CFE8268B80444986D0DBE24B0AF4A
SHA256:CAADC68D86FBC510D37E871C5DDC21EC2CC739E39761627889D4FF2844E39C1A
2104iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:22B802DC5CD391BD05710140417ADF34
SHA256:704266BFF30E2AE1EFC3AA56F843599DAB5CDE86F4FC9452460B93D3AA04DFA5
3540WScript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\1c[1].jpgexecutable
MD5:8A27C768D4E826C4FBCF3E18EEAB2D6F
SHA256:2A14B8E70569CA69B51D26503A3017B89156EFB36DCD1E183BFDE592F823AB23
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
19
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
3540
WScript.exe
GET
200
88.99.148.81:80
http://magicslim.ru/misc/farbtastic/1c.jpg
DE
executable
952 Kb
suspicious
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
403
104.16.155.36:80
http://whatismyipaddress.com/
US
text
100 b
shared
1464
rad298DA.tmp
GET
200
104.18.35.131:80
http://whatsmyip.net/
US
html
7.35 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2648
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1464
rad298DA.tmp
193.23.244.244:443
Chaos Computer Club e.V.
DE
malicious
2104
iexplore.exe
184.95.38.139:443
www.okarahub.com
SECURED SERVERS LLC
US
malicious
1464
rad298DA.tmp
131.188.40.189:443
Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.
DE
malicious
3540
WScript.exe
88.99.148.81:80
magicslim.ru
Hetzner Online GmbH
DE
suspicious
1464
rad298DA.tmp
194.55.15.222:9001
suspicious
1464
rad298DA.tmp
94.130.40.100:443
Hetzner Online GmbH
DE
malicious
1464
rad298DA.tmp
198.98.58.88:443
FranTech Solutions
US
suspicious
1464
rad298DA.tmp
104.18.35.131:80
whatsmyip.net
Cloudflare Inc
US
shared
104.16.155.36:80
whatismyipaddress.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.okarahub.com
  • 184.95.38.139
malicious
magicslim.ru
  • 88.99.148.81
suspicious
whatismyipaddress.com
  • 104.16.155.36
  • 104.16.154.36
shared
whatsmyip.net
  • 104.18.35.131
  • 104.18.34.131
shared
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3540
WScript.exe
Potential Corporate Privacy Violation
ET POLICY Suspicious EXE Download Content-Type image/jpeg
3540
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2
3540
WScript.exe
A Network Trojan was detected
ET TROJAN JS/WSF Downloader Dec 08 2016 M4
3540
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
1464
rad298DA.tmp
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 281
1464
rad298DA.tmp
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
1464
rad298DA.tmp
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
1464
rad298DA.tmp
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 124
1464
rad298DA.tmp
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
1464
rad298DA.tmp
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 713
24 ETPRO signatures available at the full report
No debug info