| File name: | 94B76A_source.eml.zip |
| Full analysis: | https://app.any.run/tasks/437365fc-2f68-4503-9e1c-298fd7fac6dc |
| Verdict: | Malicious activity |
| Threats: | Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links. |
| Analysis date: | March 14, 2019, 09:08:49 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | 65559C6AFDC31BB4D1504C1A6AAC0887 |
| SHA1: | 4359996122A8C3BEE8EF3ADD6BC4D8DB72BA6FD9 |
| SHA256: | 2114DBD9B88C84EFDCC96BC7A23E486FC209A1D704790A993CB98C2944A12106 |
| SSDEEP: | 6144:9f6tBQLUgwx3kvE0Iw0ZomfV/ICe+pZIeBdKANOotBXL4bfizjICqMhaUD1ZD:0bkUz1kvE3XgCe+pZHK6HL4zccChaMPD |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2019:03:14 16:08:16 |
| ZipCRC: | 0xe569deaa |
| ZipCompressedSize: | 344851 |
| ZipUncompressedSize: | 447319 |
| ZipFileName: | 94B76A_source.eml |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | — | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2888 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2964 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\7ZO6FLI3\Док-ты на оплату.7z" | C:\Program Files\WinRAR\WinRAR.exe | OUTLOOK.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 3260 | rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject root | C:\Windows\system32\rundll32.exe | taskeng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3500 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\94B76A_source.eml.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 3776 | "C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Rar$DIb3500.6081\94B76A_source.eml" | C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE | WinRAR.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Exit code: 0 Version: 14.0.6025.1000 Modules
| |||||||||||||||
| (PID) Process: | (284) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\94B76A_source.eml.zip | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3500) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (284) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList |
| Operation: | write | Name: | a |
Value: WinRAR.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3776 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR2AA6.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3776 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\tmp2C5D.tmp | — | |
MD5:— | SHA256:— | |||
| 3776 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\7ZO6FLI3\Док-ты на оплату (2).7z\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
| 3260 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\75C9.tmp | — | |
MD5:— | SHA256:— | |||
| 3260 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\ebnehcpfpnabpacf | — | |
MD5:— | SHA256:— | |||
| 3260 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe | — | |
MD5:— | SHA256:— | |||
| 3260 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\fpchdphlbabeihpc | — | |
MD5:— | SHA256:— | |||
| 3776 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\~Outlook Data File - NoMail.pst.tmp | — | |
MD5:— | SHA256:— | |||
| 3776 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{47F60782-9897-4C9C-B919-573151FB2E59}.tmp | — | |
MD5:— | SHA256:— | |||
| 3776 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3776 | OUTLOOK.EXE | GET | — | 64.4.26.155:80 | http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig | US | — | — | whitelisted |
3260 | rundll32.exe | GET | 200 | 178.62.9.171:80 | http://myip.ru/index_small.php | GB | html | 325 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3260 | rundll32.exe | 126.15.17.45:443 | — | Softbank BB Corp. | JP | suspicious |
3260 | rundll32.exe | 37.122.208.220:9001 | — | Host Europe GmbH | GB | suspicious |
3260 | rundll32.exe | 178.175.143.156:9001 | — | I.C.S. Trabia-Network S.R.L. | MD | suspicious |
3776 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
3260 | rundll32.exe | 178.62.9.171:80 | myip.ru | Digital Ocean, Inc. | GB | malicious |
3260 | rundll32.exe | 136.243.147.28:9001 | — | Hetzner Online GmbH | DE | suspicious |
3260 | rundll32.exe | 77.203.13.57:9001 | — | SFR | FR | suspicious |
3260 | rundll32.exe | 178.63.27.82:9001 | — | Hetzner Online GmbH | DE | suspicious |
3260 | rundll32.exe | 91.122.52.237:9001 | — | PJSC Rostelecom | RU | suspicious |
3260 | rundll32.exe | 80.211.199.162:9001 | — | INTERNET CZ, a.s. | CZ | suspicious |
Domain | IP | Reputation |
|---|---|---|
config.messenger.msn.com |
| whitelisted |
myip.ru |
| unknown |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
3260 | rundll32.exe | Potential Corporate Privacy Violation | ET POLICY myip.ru IP lookup |
3260 | rundll32.exe | A Network Trojan was detected | ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check |
3260 | rundll32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check |
3260 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 120 |
3260 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
3260 | rundll32.exe | Generic Protocol Command Decode | SURICATA STREAM excessive retransmissions |
3260 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 572 |
3260 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
3260 | rundll32.exe | Generic Protocol Command Decode | SURICATA STREAM CLOSEWAIT FIN out of window |
3260 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 611 |