analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

94B76A_source.eml.zip

Full analysis: https://app.any.run/tasks/437365fc-2f68-4503-9e1c-298fd7fac6dc
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 14, 2019, 09:08:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redaman
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

65559C6AFDC31BB4D1504C1A6AAC0887

SHA1:

4359996122A8C3BEE8EF3ADD6BC4D8DB72BA6FD9

SHA256:

2114DBD9B88C84EFDCC96BC7A23E486FC209A1D704790A993CB98C2944A12106

SSDEEP:

6144:9f6tBQLUgwx3kvE0Iw0ZomfV/ICe+pZIeBdKANOotBXL4bfizjICqMhaUD1ZD:0bkUz1kvE3XgCe+pZHK6HL4zccChaMPD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Док-ты на оплату.exe (PID: 2888)
      • rundll32.exe (PID: 3260)
      • OUTLOOK.EXE (PID: 3776)
      • WinRAR.exe (PID: 2964)
      • explorer.exe (PID: 284)
      • WinRAR.exe (PID: 3500)
    • Application was dropped or rewritten from another process

      • Док-ты на оплату.exe (PID: 2888)
    • Loads the Task Scheduler COM API

      • Док-ты на оплату.exe (PID: 2888)
    • REDAMAN was detected

      • rundll32.exe (PID: 3260)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2964)
      • Док-ты на оплату.exe (PID: 2888)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3776)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3776)
    • Creates files in the program directory

      • Док-ты на оплату.exe (PID: 2888)
    • Connects to unusual port

      • rundll32.exe (PID: 3260)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 3500)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 94B76A_source.eml
ZipUncompressedSize: 447319
ZipCompressedSize: 344851
ZipCRC: 0xe569deaa
ZipModifyDate: 2019:03:14 16:08:16
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
6
Malicious processes
1
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs outlook.exe winrar.exe док-ты на оплату.exe #REDAMAN rundll32.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3500"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\94B76A_source.eml.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3776"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Rar$DIb3500.6081\94B76A_source.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\7ZO6FLI3\Док-ты на оплату.7z"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2888"C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2964.8455\док-ты на оплату.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nddeapi.dll
c:\windows\system32\authz.dll
c:\users\admin\appdata\local\temp\75c9.tmp
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3260rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
284C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
Total events
2 666
Read events
2 157
Write events
489
Delete events
20

Modification events

(PID) Process:(284) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3500) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\94B76A_source.eml.zip
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(284) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
Executable files
3
Suspicious files
2
Text files
24
Unknown types
4

Dropped files

PID
Process
Filename
Type
3776OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR2AA6.tmp.cvr
MD5:
SHA256:
3776OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp2C5D.tmp
MD5:
SHA256:
3776OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\7ZO6FLI3\Док-ты на оплату (2).7z\:Zone.Identifier:$DATA
MD5:
SHA256:
3260rundll32.exeC:\Users\admin\AppData\Local\Temp\75C9.tmp
MD5:
SHA256:
3260rundll32.exeC:\Users\admin\AppData\Local\Temp\ebnehcpfpnabpacf
MD5:
SHA256:
3260rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\Док-ты на оплату.exe
MD5:
SHA256:
3260rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2964.8455\fpchdphlbabeihpc
MD5:
SHA256:
3776OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\~Outlook Data File - NoMail.pst.tmp
MD5:
SHA256:
3776OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{47F60782-9897-4C9C-B919-573151FB2E59}.tmp
MD5:
SHA256:
3500WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3500.6081\94B76A_source.emleml
MD5:94178902076BCE1FDD4EEED9E7BB3654
SHA256:3458D3558E8F724FF71DFB2BA6F4BBFD177ACB53D48166A072E85BE71418BB41
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
45
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3776
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3260
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
325 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3776
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3260
rundll32.exe
77.203.13.57:9001
SFR
FR
suspicious
3260
rundll32.exe
136.243.147.28:9001
Hetzner Online GmbH
DE
suspicious
3260
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious
3260
rundll32.exe
193.81.216.170:9001
A1 Telekom Austria AG
AT
unknown
3260
rundll32.exe
82.102.20.254:31315
GB
suspicious
3260
rundll32.exe
178.175.143.156:9001
I.C.S. Trabia-Network S.R.L.
MD
suspicious
3260
rundll32.exe
126.15.17.45:443
Softbank BB Corp.
JP
suspicious
3260
rundll32.exe
85.25.159.253:47044
Host Europe GmbH
DE
suspicious
3260
rundll32.exe
185.100.85.175:443
Flokinet Ltd
RO
suspicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
myip.ru
  • 178.62.9.171
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3260
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
3260
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
3260
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
3260
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 120
3260
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3260
rundll32.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
3260
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 572
3260
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3260
rundll32.exe
Generic Protocol Command Decode
SURICATA STREAM CLOSEWAIT FIN out of window
3260
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 611
No debug info