| File name: | Net-Worm.zip |
| Full analysis: | https://app.any.run/tasks/bae25f78-3b9a-4a77-9afa-679d93881f60 |
| Verdict: | Malicious activity |
| Analysis date: | March 16, 2024, 13:18:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v4.5 to extract, compression method=deflate |
| MD5: | 346FFDD056F329E084C09E3FA5A5D3D9 |
| SHA1: | 6225A8B13D67BC8617B0C48BC9EB4B050875C982 |
| SHA256: | 1F39E3EBF80E66923D7AE2A49C2CDF9DF50FEC5D187CB253C4485E83BD1AD170 |
| SSDEEP: | 98304:x1Fmmecd/fuc8nJUxB3wyEuo0vZ9RNkxFg3m8IUbfkhR98mw9csB69sxLGR9O973:dwPy8dfIn |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 45 |
|---|---|
| ZipBitFlag: | 0x0800 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:03:16 12:29:42 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | 2 |
| ZipUncompressedSize: | - |
| ZipFileName: | Net-Worm/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 748 | NET STOP MCSHIELD | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 848 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Description: EternalRocks Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 948 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Rahack\Rahack.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Rahack\Rahack.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225785 Modules
| |||||||||||||||
| 1288 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.E.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.E.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 | |||||||||||||||
| 1348 | "C:\Windows\system32\ntvdm.exe" -i1 | C:\Windows\System32\ntvdm.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: NTVDM.EXE Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1352 | C:\Windows\system32\net1 STOP MCSHIELD | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1496 | "C:\Windows\System32\netsh.exe" firewall set portopening TCP 1013 BS | C:\Windows\System32\netsh.exe | — | Kobalc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 1560 | NET STOP SWEEPSRV.SYS | C:\Windows\System32\net.exe | — | Opaserv.l.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1576 | C:\Windows\system32\net1 STOP PERSFW | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1740 | "C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe" | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Net-Worm.zip | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3992) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Opaserv.l.exe | executable | |
MD5:71C981D4F5316C3AD1DEEFE48FDDB94A | SHA256:DE709DACAC623C637448DC91F6DFD441A49C89372AF2C53E2027E4AF5310B95D | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\EternalRocks.exe | executable | |
MD5:C52F20A854EFB013A0A1248FD84AAA95 | SHA256:CF8533849EE5E82023AD7ADBDBD6543CB6DB596C53048B1A0C00B3643A72DB30 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.A.exe | executable | |
MD5:EF1952B755BA912B9F60B2ED8DD68D30 | SHA256:B2FA6EDAA5FFC51D12150424355A0C86AC9F46D7EC772D35AB8D9F4FE7996D91 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.c.sourcecode.txt | text | |
MD5:28FAD72D643985282FB85CA9B7892DFB | SHA256:FEBBF809124ED9D5771CA2DA4F2D8FD23643970BECC3D6B062E14CC97FAEE4B7 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.A.exe | executable | |
MD5:5AE700C1DFFB00CEF492844A4DB6CD69 | SHA256:258F82166D20C68497A66D82349FC81899FDE8FE8C1CC66E59F739A9EA2C95A9 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Sasser\Sasser.B.exe | executable | |
MD5:FA3348956253F9F733B28B4CF1D45942 | SHA256:00808F00EC970E3ED518ED40BA77F64BE2B9761B02FBAEA2047C5AC82D8B8F99 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Loveware.txt | text | |
MD5:9F59E4D545E1A16EC4AD1B11291C5346 | SHA256:CD41EB3B411ABD314E90D980F4E05D7D2DB60FB8A9616F84754B4E1EEB10F290 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Kolabc\Kobalc.exe | executable | |
MD5:15717CD327A723820D71900611545917 | SHA256:DB6CEA7E8D62D3B21EFE3B423B48C131E345CB55F168CBE1F142E491BB812747 | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\Blaster\Blaster.E.exe | executable | |
MD5:8676210E6246948201AA014DB471DE90 | SHA256:2E481059B9BC9686C676D69A80202EED5022C9A53ECD8CAC215E70C601DD7FDC | |||
| 3992 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Net-Worm\Net-Worm\CodeRed.a.exe | bs | |
MD5:6F5767EC5A9CC6F7D195DDE3C3939120 | SHA256:59FE169797953F2046B283235FE80158EBF02BA586EABFEA306402FBA8473DAE | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
— | — | 192.168.87.1:135 | — | — | — | unknown |
— | — | 192.168.87.2:135 | — | — | — | unknown |
— | — | 192.168.87.3:135 | — | — | — | unknown |
— | — | 192.168.87.4:135 | — | — | — | unknown |
— | — | 192.168.87.5:135 | — | — | — | unknown |
— | — | 192.168.87.6:135 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
windowsupdate.com |
| unknown |
kimble.org |
| unknown |
hodkskis1981.weedns.com |
| unknown |
xoxoxmyman.weedns.com |
| unknown |
watson.microsoft.com |
| whitelisted |
1.0x0103x0x0m.co.cc |
| unknown |
1.itsy-bitsy.co.cc |
| unknown |
dashman.dnip.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .co.cc Domain |
— | — | Potentially Bad Traffic | ET DNS Query for .cc TLD |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .co.cc Domain |
— | — | Potentially Bad Traffic | ET DNS Query for .cc TLD |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .co.cc Domain |
— | — | Potentially Bad Traffic | ET DNS Query for .cc TLD |
— | — | Potentially Bad Traffic | ET DNS Query for .cc TLD |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .co.cc Domain |
— | — | Misc activity | ET INFO IRC Nick change on non-standard port |
— | — | Misc activity | ET INFO IRC Nick change on non-standard port |