File name:

trojan-bonanza.7z

Full analysis: https://app.any.run/tasks/31806ae5-4f40-496f-afdd-c59155ee4467
Verdict: Malicious activity
Analysis date: July 06, 2021, 17:55:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

3DA139109E56EFE7D47676DFD2744DB3

SHA1:

D64E68E1692C963CB640EACF9252DDB277F3CD82

SHA256:

1CDB88BF3DB4D9FEA34A421C903035216C2EE069D7ECCFD1735CC8DCBD0EF6EE

SSDEEP:

196608:8/oDkrpZSkHIs0VbbZ0m5URubuwb5lGeukS0qEVSqHh0oMBPD3MUKnnYLREtLDM1:6oDk7PY/fC6uO5lmkTRVlh0oMBPDcUKY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3396)
      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 2348)
      • svchost.exe (PID: 880)
      • Explorer.EXE (PID: 1072)
    • Application was dropped or rewritten from another process

      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 692)
      • Everything.exe (PID: 2892)
      • Everything.exe (PID: 3308)
      • Everything.exe (PID: 2540)
      • Everything.exe (PID: 2348)
      • Everything.exe (PID: 3772)
      • Trojan.Win32.Pakes.jvd.exe (PID: 2576)
      • Trojan.Win32.Pakes.jzb.exe (PID: 3432)
      • Trojan.Win32.Pakes.jzb.exe (PID: 3232)
      • Trojan.Win32.Pakes.kns.exe (PID: 1840)
      • Trojan.Win32.Pakes.kmt.exe (PID: 3308)
      • Trojan.Win32.Pakes.kmt.exe (PID: 2804)
      • Trojan.Win32.Opener.b.exe (PID: 3052)
      • Trojan.Win32.Pakes.bge.exe (PID: 1128)
      • Trojan.Win32.Pakes.bke.exe (PID: 2272)
      • Trojan.Win32.Obfuscated.wis.exe (PID: 2000)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • Trojan.Win32.Nosok.aq.exe (PID: 2652)
      • Trojan.Win32.Nosok.al.exe (PID: 304)
      • Trojan.Win32.Nosok.aj.exe (PID: 3072)
      • Trojan.Win32.NetBuster.15.exe (PID: 3084)
      • Trojan.Win32.Neopat.exe (PID: 3324)
      • Trojan.Win32.Negasm.exe (PID: 2544)
      • Trojan.Win32.Milt.a.exe (PID: 2524)
      • Trojan.Win32.MSNTrick.exe (PID: 1796)
      • Trojan.Win32.MouseDisable.exe (PID: 952)
      • Trojan.Win32.Midgare.qwd.exe (PID: 3880)
      • Trojan.Win32.LoveYou.exe (PID: 1356)
      • Trojan.Win32.Looper.exe (PID: 1668)
      • Trojan.Win32.Linkre.exe (PID: 2356)
      • Trojan.Win32.LastTime.exe (PID: 900)
      • Trojan.Win32.LaSta.exe (PID: 2632)
      • Trojan.Win32.Laoshen.d.exe (PID: 3260)
      • Trojan.Win32.Laoshen.c.exe (PID: 2468)
      • Trojan.Win32.Lame.exe (PID: 2192)
      • Trojan.Win32.Snatch.edit.exe (PID: 3524)
      • Trojan.Win32.Small.yfq.exe (PID: 2748)
      • Trojan.Win32.Small.xya.exe (PID: 620)
      • Trojan.Win32.Koska.exe (PID: 2064)
      • Trojan.Win32.Small.u.exe (PID: 2472)
      • Trojan.Win32.Small.me.exe (PID: 2584)
      • Trojan.Win32.Small.lf.exe (PID: 4008)
      • Trojan.Win32.SwapMouse.exe (PID: 3636)
      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
      • Trojan.Win32.Small.xtb.exe (PID: 2268)
      • Trojan.Win32.StartPage.i.exe (PID: 2304)
      • Trojan.Win32.StartPage.bfx.exe (PID: 3568)
      • Trojan.Win32.StartPage.aym.exe (PID: 3360)
      • Trojan.Win32.StartPage.bey.exe (PID: 2516)
      • Trojan.Win32.StartPage.bey.exe (PID: 2532)
      • Everything.exe (PID: 2836)
      • Trojan.Win32.Sith.exe (PID: 4080)
      • Trojan.Win32.VB.dek.exe (PID: 1692)
      • everything-setup.exe (PID: 3360)
      • Trojan.Win32.Slefdel.bvk.exe (PID: 3860)
      • Trojan.Win32.Small.bam.exe (PID: 2804)
      • Trojan.Win32.Small.biq.exe (PID: 2464)
      • Trojan.Win32.Slefdel.awr.exe (PID: 296)
      • Trojan.Win32.Small.adw.exe (PID: 3340)
      • Trojan.Win32.Regrun.hf.exe (PID: 2320)
      • Trojan.Win32.RASFlooder.a.exe (PID: 2340)
      • Trojan.Win32.Qhost.kir.exe (PID: 3952)
      • Trojan.Win32.RamEater.12.exe (PID: 2800)
      • Trojan.Win32.RepWhim.exe (PID: 3092)
      • Trojan.Win32.Regrun.nt.exe (PID: 3856)
      • Trojan.Win32.Regrun.hf.exe (PID: 2544)
      • Trojan.Win32.Qhost.keq.exe (PID: 3888)
      • Trojan.Win32.Qhost.keq.exe (PID: 1328)
      • Trojan.Win32.Qhost.iq.exe (PID: 2252)
      • Trojan.Win32.Screen.exe (PID: 3284)
      • Trojan.Win32.Regrun.nt.exe (PID: 544)
      • Trojan.Win32.Shetr.exe (PID: 328)
      • Trojan.Win32.Scar.cfc.exe (PID: 1144)
      • Trojan.Win32.Qhost.kir.exe (PID: 2684)
      • Trojan.Win32.Qhost.kfs.exe (PID: 964)
      • Trojan.Win32.KillWin.k.exe (PID: 2692)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.KillWin.d.exe (PID: 3764)
      • Trojan.Win32.KillWin.d.exe (PID: 3976)
      • Trojan.Win32.KillFiles.h.exe (PID: 2268)
      • Trojan.Win32.KillWin.gi.exe (PID: 1940)
      • Trojan.Win32.KillFiles.er.exe (PID: 3416)
      • Trojan.Win32.KillFiles.am.exe (PID: 3696)
      • Trojan.Win32.Homepage.d.exe (PID: 1004)
      • Trojan.Win32.HideAll.exe (PID: 3380)
      • Trojan.Win32.Haradong.cw.exe (PID: 2744)
      • Trojan.Win32.Inject.cam.exe (PID: 824)
      • Trojan.Win32.Inject.gug.exe (PID: 2884)
      • Trojan.Win32.Inject.gug.exe (PID: 3084)
      • Trojan.Win32.Inject.cam.exe (PID: 2160)
      • Trojan.Win32.Inject.hui.exe (PID: 3620)
      • Trojan.Win32.Inetrack.exe (PID: 3864)
      • Trojan.Win32.Inetrack.exe (PID: 4092)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • Trojan.Win32.IEThief.exe (PID: 772)
      • 1979343.exe (PID: 2084)
    • Drops executable file immediately after starts

      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 2892)
      • Explorer.EXE (PID: 1072)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • 1979343.exe (PID: 2084)
    • Changes the autorun value in the registry

      • Everything.exe (PID: 3308)
      • Trojan.Win32.Pakes.bke.exe (PID: 2272)
      • Trojan.Win32.Neopat.exe (PID: 3324)
      • Trojan.Win32.MouseDisable.exe (PID: 952)
      • Trojan.Win32.Milt.a.exe (PID: 2524)
      • Trojan.Win32.Looper.exe (PID: 1668)
      • Explorer.EXE (PID: 1072)
      • Trojan.Win32.Small.xya.exe (PID: 620)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • Trojan.Win32.Small.yfq.exe (PID: 2748)
      • Trojan.Win32.Small.lf.exe (PID: 4008)
      • Trojan.Win32.StartPage.bfx.exe (PID: 3568)
      • Trojan.Win32.StartPage.i.exe (PID: 2304)
      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
    • Runs injected code in another process

      • Trojan.Win32.Midgare.qwd.exe (PID: 3880)
    • Application was injected by another process

      • Explorer.EXE (PID: 1072)
    • Writes to a start menu file

      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Changes the login/logoff helper path in the registry

      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Changes internet zones settings

      • Trojan.Win32.Small.yfq.exe (PID: 2748)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 284)
      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 692)
      • Everything.exe (PID: 3308)
      • Everything.exe (PID: 2892)
      • Everything.exe (PID: 2348)
      • Everything.exe (PID: 2540)
      • Everything.exe (PID: 3772)
      • Trojan.Win32.Pakes.kns.exe (PID: 1840)
      • Trojan.Win32.Pakes.jvd.exe (PID: 2576)
      • Trojan.Win32.Pakes.jzb.exe (PID: 3432)
      • Trojan.Win32.Pakes.bge.exe (PID: 1128)
      • Trojan.Win32.Pakes.bke.exe (PID: 2272)
      • Trojan.Win32.Obfuscated.wis.exe (PID: 2000)
      • Trojan.Win32.Opener.b.exe (PID: 3052)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • wscript.exe (PID: 3032)
      • Trojan.Win32.Nosok.aq.exe (PID: 2652)
      • Trojan.Win32.Nosok.al.exe (PID: 304)
      • Trojan.Win32.Neopat.exe (PID: 3324)
      • Trojan.Win32.Negasm.exe (PID: 2544)
      • Trojan.Win32.MouseDisable.exe (PID: 952)
      • Trojan.Win32.Milt.a.exe (PID: 2524)
      • Trojan.Win32.Nosok.aj.exe (PID: 3072)
      • Trojan.Win32.MSNTrick.exe (PID: 1796)
      • Trojan.Win32.Looper.exe (PID: 1668)
      • Trojan.Win32.Linkre.exe (PID: 2356)
      • Trojan.Win32.LastTime.exe (PID: 900)
      • Trojan.Win32.LaSta.exe (PID: 2632)
      • Trojan.Win32.Midgare.qwd.exe (PID: 3880)
      • Trojan.Win32.Laoshen.d.exe (PID: 3260)
      • Trojan.Win32.Laoshen.c.exe (PID: 2468)
      • Trojan.Win32.Snatch.edit.exe (PID: 3524)
      • Trojan.Win32.Small.yfq.exe (PID: 2748)
      • Trojan.Win32.Small.xya.exe (PID: 620)
      • Trojan.Win32.Koska.exe (PID: 2064)
      • Trojan.Win32.Small.me.exe (PID: 2584)
      • Trojan.Win32.Small.xtb.exe (PID: 2268)
      • Trojan.Win32.Small.u.exe (PID: 2472)
      • Trojan.Win32.Small.lf.exe (PID: 4008)
      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
      • Trojan.Win32.SwapMouse.exe (PID: 3636)
      • Trojan.Win32.StartPage.i.exe (PID: 2304)
      • Trojan.Win32.StartPage.bfx.exe (PID: 3568)
      • Trojan.Win32.StartPage.aym.exe (PID: 3360)
      • Trojan.Win32.StartPage.bey.exe (PID: 2532)
      • Trojan.Win32.VB.dek.exe (PID: 1692)
      • everything-setup.exe (PID: 3360)
      • Trojan.Win32.Small.biq.exe (PID: 2464)
      • Trojan.Win32.Sith.exe (PID: 4080)
      • Trojan.Win32.Slefdel.awr.exe (PID: 296)
      • Trojan.Win32.Qhost.kir.exe (PID: 3952)
      • Trojan.Win32.RamEater.12.exe (PID: 2800)
      • Trojan.Win32.Regrun.nt.exe (PID: 3856)
      • Trojan.Win32.Regrun.hf.exe (PID: 2544)
      • Trojan.Win32.Qhost.kir.exe (PID: 2684)
      • Trojan.Win32.Qhost.keq.exe (PID: 1328)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.Regrun.nt.exe (PID: 544)
      • Trojan.Win32.KillWin.d.exe (PID: 3976)
      • Trojan.Win32.HideAll.exe (PID: 3380)
      • Trojan.Win32.Homepage.d.exe (PID: 1004)
      • Trojan.Win32.KillFiles.er.exe (PID: 3416)
      • Trojan.Win32.Inject.hui.exe (PID: 3620)
      • Trojan.Win32.Inject.gug.exe (PID: 3084)
      • Trojan.Win32.Inject.gug.exe (PID: 2884)
      • Trojan.Win32.Haradong.cw.exe (PID: 2744)
      • 1979343.exe (PID: 2084)
      • Trojan.Win32.Inject.cam.exe (PID: 824)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • Trojan.Win32.IEThief.exe (PID: 772)
    • Reads the computer name

      • WinRAR.exe (PID: 284)
      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 692)
      • Everything.exe (PID: 2892)
      • Everything.exe (PID: 3308)
      • Everything.exe (PID: 3772)
      • Everything.exe (PID: 2540)
      • Everything.exe (PID: 2348)
      • Trojan.Win32.Pakes.bke.exe (PID: 2272)
      • Trojan.Win32.Obfuscated.wis.exe (PID: 2000)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • wscript.exe (PID: 3032)
      • Trojan.Win32.Negasm.exe (PID: 2544)
      • Trojan.Win32.MSNTrick.exe (PID: 1796)
      • Trojan.Win32.Milt.a.exe (PID: 2524)
      • Trojan.Win32.Linkre.exe (PID: 2356)
      • Trojan.Win32.Small.yfq.exe (PID: 2748)
      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
      • Trojan.Win32.VB.dek.exe (PID: 1692)
      • Trojan.Win32.Slefdel.awr.exe (PID: 296)
      • Trojan.Win32.Inject.gug.exe (PID: 3084)
      • 1979343.exe (PID: 2084)
    • Creates files in the user directory

      • Explorer.EXE (PID: 1072)
      • Everything.exe (PID: 2540)
      • Trojan.Win32.Linkre.exe (PID: 2356)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Executable content was dropped or overwritten

      • everything-setup.exe (PID: 1604)
      • Everything.exe (PID: 2892)
      • WinRAR.exe (PID: 284)
      • Explorer.EXE (PID: 1072)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • 1979343.exe (PID: 2084)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 284)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 284)
      • Explorer.EXE (PID: 1072)
    • Application launched itself

      • Everything.exe (PID: 692)
      • Trojan.Win32.Pakes.kmt.exe (PID: 2804)
      • Trojan.Win32.Inject.gug.exe (PID: 2884)
      • Trojan.Win32.Inject.cam.exe (PID: 824)
    • Creates a directory in Program Files

      • Everything.exe (PID: 2892)
      • Trojan.Win32.Pakes.bge.exe (PID: 1128)
    • Creates a software uninstall entry

      • Everything.exe (PID: 2892)
    • Creates files in the program directory

      • Everything.exe (PID: 2892)
      • Everything.exe (PID: 3308)
      • Trojan.Win32.KillWin.d.exe (PID: 3976)
    • Starts itself from another location

      • Everything.exe (PID: 2892)
    • Changes default file association

      • Everything.exe (PID: 3308)
    • Executed as Windows Service

      • Everything.exe (PID: 3772)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 284)
      • Explorer.EXE (PID: 1072)
      • Trojan.Win32.Nosok.n.exe (PID: 2576)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • 1979343.exe (PID: 2084)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1072)
    • Uses NETSH.EXE for network configuration

      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Executes scripts

      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Reads Environment values

      • netsh.exe (PID: 3764)
    • Changes the started page of IE

      • Trojan.Win32.Milt.a.exe (PID: 2524)
      • Trojan.Win32.StartPage.bfx.exe (PID: 3568)
      • Trojan.Win32.StartPage.i.exe (PID: 2304)
      • Trojan.Win32.StartPage.aym.exe (PID: 3360)
      • Trojan.Win32.StartPage.bey.exe (PID: 2532)
    • Executes application which crashes

      • Trojan.Win32.LaSta.exe (PID: 2632)
    • Starts Internet Explorer

      • Explorer.EXE (PID: 1072)
    • Creates executable files which already exist in Windows

      • Trojan.Win32.Nosok.n.exe (PID: 2576)
    • Reads Microsoft Outlook installation path

      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
    • Reads the date of Windows installation

      • Everything.exe (PID: 2348)
    • Reads internet explorer settings

      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
    • Executed via COM

      • DllHost.exe (PID: 1824)
    • Creates files in the Windows directory

      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.KillWin.d.exe (PID: 3976)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • Trojan.Win32.KillWin.d.exe (PID: 3976)
    • Removes files from Windows directory

      • Trojan.Win32.KillWin.d.exe (PID: 3976)
  • INFO

    • Manual execution by user

      • everything-setup.exe (PID: 1604)
      • iexplore.exe (PID: 1832)
      • everything-setup.exe (PID: 3360)
      • Trojan.Win32.Sith.exe (PID: 4080)
      • Everything.exe (PID: 2836)
      • Trojan.Win32.Slefdel.bvk.exe (PID: 3860)
      • Trojan.Win32.Small.adw.exe (PID: 3340)
      • Trojan.Win32.Small.biq.exe (PID: 2464)
      • Trojan.Win32.Slefdel.awr.exe (PID: 296)
      • Trojan.Win32.Small.bam.exe (PID: 2804)
      • Trojan.Win32.Regrun.hf.exe (PID: 2320)
      • Trojan.Win32.RamEater.12.exe (PID: 2800)
      • Trojan.Win32.RASFlooder.a.exe (PID: 2340)
      • Trojan.Win32.Qhost.kir.exe (PID: 2684)
      • Trojan.Win32.RepWhim.exe (PID: 3092)
      • Trojan.Win32.Regrun.nt.exe (PID: 3856)
      • Trojan.Win32.Regrun.hf.exe (PID: 2544)
      • Trojan.Win32.Qhost.kir.exe (PID: 3952)
      • Trojan.Win32.Qhost.kfs.exe (PID: 964)
      • Trojan.Win32.Qhost.keq.exe (PID: 3888)
      • Trojan.Win32.Qhost.keq.exe (PID: 1328)
      • Trojan.Win32.Shetr.exe (PID: 328)
      • Trojan.Win32.Qhost.iq.exe (PID: 2252)
      • Trojan.Win32.Screen.exe (PID: 3284)
      • Trojan.Win32.Scar.cfc.exe (PID: 1144)
      • Trojan.Win32.Regrun.nt.exe (PID: 544)
      • Trojan.Win32.KillWin.k.exe (PID: 2692)
      • Trojan.Win32.KillWin.gt.exe (PID: 2176)
      • Trojan.Win32.KillWin.gi.exe (PID: 1940)
      • Trojan.Win32.KillWin.d.exe (PID: 3976)
      • Trojan.Win32.KillFiles.h.exe (PID: 2268)
      • Trojan.Win32.KillWin.d.exe (PID: 3764)
      • Trojan.Win32.KillFiles.am.exe (PID: 3696)
      • Trojan.Win32.Homepage.d.exe (PID: 1004)
      • Trojan.Win32.HideAll.exe (PID: 3380)
      • Trojan.Win32.Haradong.cw.exe (PID: 2744)
      • Trojan.Win32.KillFiles.er.exe (PID: 3416)
      • Trojan.Win32.Inject.gug.exe (PID: 2884)
      • Trojan.Win32.Inject.cam.exe (PID: 824)
      • Trojan.Win32.Inject.hui.exe (PID: 3620)
      • Trojan.Win32.Inetrack.exe (PID: 4092)
      • Trojan.Win32.Inject.bow.exe (PID: 1388)
      • Trojan.Win32.Inetrack.exe (PID: 3864)
      • Trojan.Win32.IEThief.exe (PID: 772)
    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 284)
    • Checks supported languages

      • netsh.exe (PID: 3764)
      • ntvdm.exe (PID: 1284)
      • iexplore.exe (PID: 1832)
      • ftp.exe (PID: 2044)
      • DllHost.exe (PID: 1824)
      • consent.exe (PID: 3284)
      • consent.exe (PID: 3764)
      • consent.exe (PID: 2856)
      • consent.exe (PID: 2932)
      • consent.exe (PID: 2292)
      • consent.exe (PID: 2656)
    • Reads the computer name

      • netsh.exe (PID: 3764)
      • iexplore.exe (PID: 1832)
      • ftp.exe (PID: 2044)
      • consent.exe (PID: 3764)
      • consent.exe (PID: 3284)
      • consent.exe (PID: 2932)
      • consent.exe (PID: 2856)
      • consent.exe (PID: 2292)
      • consent.exe (PID: 2656)
    • Reads security settings of IE

      • Trojan.Win32.StartPage.wc.exe (PID: 3556)
    • Checks Windows Trust Settings

      • consent.exe (PID: 3764)
      • consent.exe (PID: 3284)
      • consent.exe (PID: 2932)
      • consent.exe (PID: 2856)
      • consent.exe (PID: 2292)
      • consent.exe (PID: 2656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
222
Monitored processes
115
Malicious processes
86
Suspicious processes
6

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start inject drop and start winrar.exe searchprotocolhost.exe no specs everything-setup.exe everything.exe no specs everything.exe everything.exe everything.exe no specs everything.exe no specs everything.exe no specs trojan.win32.pakes.bge.exe no specs trojan.win32.pakes.bke.exe trojan.win32.pakes.jvd.exe no specs trojan.win32.pakes.jzb.exe no specs trojan.win32.pakes.jzb.exe trojan.win32.pakes.kmt.exe trojan.win32.pakes.kmt.exe no specs trojan.win32.pakes.kns.exe trojan.win32.opener.b.exe no specs trojan.win32.obfuscated.wis.exe no specs trojan.win32.nosok.n.exe netsh.exe no specs wscript.exe no specs trojan.win32.nosok.aq.exe no specs trojan.win32.nosok.al.exe trojan.win32.nosok.aj.exe trojan.win32.netbuster.15.exe no specs trojan.win32.neopat.exe trojan.win32.negasm.exe no specs trojan.win32.msntrick.exe no specs trojan.win32.mousedisable.exe trojan.win32.milt.a.exe trojan.win32.midgare.qwd.exe no specs trojan.win32.loveyou.exe no specs trojan.win32.looper.exe trojan.win32.linkre.exe no specs trojan.win32.lasttime.exe no specs trojan.win32.lasta.exe no specs ntvdm.exe no specs regedit.exe no specs explorer.exe iexplore.exe no specs trojan.win32.laoshen.d.exe no specs trojan.win32.laoshen.c.exe no specs trojan.win32.lame.exe no specs trojan.win32.koska.exe no specs trojan.win32.snatch.edit.exe no specs trojan.win32.small.yfq.exe trojan.win32.small.xya.exe trojan.win32.small.xtb.exe no specs trojan.win32.small.u.exe no specs trojan.win32.small.me.exe trojan.win32.small.lf.exe trojan.win32.swapmouse.exe no specs trojan.win32.startpage.wc.exe ftp.exe no specs trojan.win32.startpage.i.exe trojan.win32.startpage.bfx.exe trojan.win32.startpage.bey.exe no specs trojan.win32.startpage.aym.exe no specs trojan.win32.startpage.bey.exe trojan.win32.vb.dek.exe no specs PhotoViewer.dll no specs everything-setup.exe no specs everything.exe no specs svchost.exe no specs trojan.win32.sith.exe no specs trojan.win32.slefdel.awr.exe no specs trojan.win32.slefdel.bvk.exe no specs trojan.win32.small.adw.exe no specs trojan.win32.small.bam.exe no specs trojan.win32.small.biq.exe no specs trojan.win32.repwhim.exe no specs trojan.win32.regrun.nt.exe no specs trojan.win32.regrun.hf.exe no specs trojan.win32.regrun.hf.exe no specs trojan.win32.rasflooder.a.exe no specs trojan.win32.qhost.kir.exe no specs trojan.win32.rameater.12.exe no specs trojan.win32.qhost.kir.exe no specs trojan.win32.qhost.kfs.exe no specs trojan.win32.qhost.keq.exe no specs trojan.win32.qhost.keq.exe no specs trojan.win32.qhost.iq.exe no specs trojan.win32.screen.exe no specs trojan.win32.shetr.exe no specs trojan.win32.scar.cfc.exe trojan.win32.regrun.nt.exe no specs regedit.exe no specs trojan.win32.killwin.k.exe no specs consent.exe no specs trojan.win32.killwin.gt.exe consent.exe no specs trojan.win32.killwin.gi.exe consent.exe no specs trojan.win32.killwin.d.exe no specs trojan.win32.killwin.d.exe consent.exe no specs trojan.win32.killfiles.h.exe consent.exe no specs trojan.win32.killfiles.er.exe trojan.win32.killfiles.am.exe no specs trojan.win32.homepage.d.exe no specs trojan.win32.hideall.exe no specs trojan.win32.haradong.cw.exe no specs trojan.win32.inject.hui.exe trojan.win32.inject.gug.exe no specs trojan.win32.inject.gug.exe no specs trojan.win32.inject.cam.exe no specs trojan.win32.inject.cam.exe trojan.win32.inject.bow.exe 1979343.exe consent.exe no specs trojan.win32.inetrack.exe no specs trojan.win32.inetrack.exe trojan.win32.iethief.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
284"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\trojan-bonanza.7z"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
296"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Slefdel.awr.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Slefdel.awr.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.slefdel.awr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
304"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Nosok.al.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Nosok.al.exe
Everything.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.nosok.al.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
328"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Shetr.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Shetr.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.shetr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
544"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Regrun.nt.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Regrun.nt.exeExplorer.EXE
User:
admin
Company:
Microsotf Corption.
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00.0001
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.regrun.nt.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
620"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Small.xya.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Small.xya.exe
Everything.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.small.xya.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
692"C:\Users\admin\AppData\Local\Temp\nsg8A90.tmp\Everything\Everything.exe" -install "C:\Program Files\Everything" -install-options " -app-data -install-run-on-system-startup -install-service -disable-run-as-admin -uninstall-folder-context-menu -install-start-menu-shortcuts -install-desktop-shortcut -uninstall-url-protocol -install-efu-association -install-language 1033 -save-install-options 0"C:\Users\admin\AppData\Local\Temp\nsg8A90.tmp\Everything\Everything.exeeverything-setup.exe
User:
admin
Company:
voidtools
Integrity Level:
MEDIUM
Description:
Everything
Exit code:
0
Version:
1.4.1.1009
Modules
Images
c:\users\admin\appdata\local\temp\nsg8a90.tmp\everything\everything.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
772"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.IEThief.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.IEThief.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
IEthief Microsoft ???????
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.iethief.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\rpcrt4.dll
824"C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Inject.cam.exe" C:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Inject.cam.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
wizard MFC Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\trojan-bonanza\trojan.win32.inject.cam.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
880C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\system32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
90 025
Read events
88 235
Write events
1 745
Delete events
45

Modification events

(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(284) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\trojan-bonanza.7z
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(284) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1072) Explorer.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.7z\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
Executable files
744
Suspicious files
18
Text files
19
Unknown types
1 372

Dropped files

PID
Process
Filename
Type
1072Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aalt.exeexecutable
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aajf.exeexecutable
MD5:
SHA256:
1072Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\trojan-bonanza.7z.lnklnk
MD5:
SHA256:
1072Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Adut.exeexecutable
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aabv.exeexecutable
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aaxn.exeexecutable
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aamc.exeexecutable
MD5:
SHA256:
284WinRAR.exeC:\Users\admin\Desktop\trojan-bonanza\Trojan.Win32.Agent.aavk.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
5
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
r7.no-ip.biz
unknown
gurmanonline.com
unknown
www.zhaol.com
unknown
login.live.com
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a Suspicious no-ip Domain
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
No debug info