| download: | File.7z |
| Full analysis: | https://app.any.run/tasks/b6b5ea06-9cc5-4091-910c-ab183557591a |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 21, 2022, 06:14:05 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 4BAE0558EF80F6E0522E7A0F9FC9F782 |
| SHA1: | 964AA1E695069810C9A71D772FAD9A3702CBBAE7 |
| SHA256: | 2278C8C48B2BF0E8080776FB52F09DF454454F4731E322174EBDC3E622D3E102 |
| SSDEEP: | 1536:yppaEi4xgj05MU3xmLty9WmStMrjFhTUxSekS0sgXN+x5b2pxGg4xmQttTdMTwE:w4MwJUBmRyMEhGV0vX4Tb2pxwxmoxAl |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 668 | "C:\Users\admin\Pictures\Adobe Films\setup777.exe.exe" | C:\Users\admin\Pictures\Adobe Films\setup777.exe.exe | — | IMgcDjPzjnTluuLiWjmZD_zU.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 672 | "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\admin\AppData\Local\Temp\aoiscqbz.exe" C:\Windows\system32\wxwxzyqo\ | C:\Windows\System32\cmd.exe | 13.php.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 752 | "C:\Users\admin\Pictures\Adobe Films\FJEfRXZ.exe.exe" | C:\Users\admin\Pictures\Adobe Films\FJEfRXZ.exe.exe | IMgcDjPzjnTluuLiWjmZD_zU.exe | ||||||||||||
User: admin Company: Gpztfsxtc Soltujfubn Integrity Level: HIGH Description: Qda68 Ugkmxoj Trtxiavysv Exit code: 0 Version: 1.4.2108.86054 (vqfqruh_sgj.495318-3282) Modules
| |||||||||||||||
| 760 | "C:\Users\admin\Documents\IMgcDjPzjnTluuLiWjmZD_zU.exe" | C:\Users\admin\Documents\IMgcDjPzjnTluuLiWjmZD_zU.exe | Service.bmp.exe | ||||||||||||
User: admin Company: HeadHunter Integrity Level: HIGH Description: HeadHunter Exit code: 0 Version: 10.1.5.16 Modules
| |||||||||||||||
| 1332 | cmd /c cmd < Esistenza.wbk | C:\Windows\system32\cmd.exe | — | FJEfRXZ.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1868 | "C:\Users\admin\Pictures\Adobe Films\SetupMEXX.exe.exe" | C:\Users\admin\Pictures\Adobe Films\SetupMEXX.exe.exe | — | File.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2008 | "C:\Windows\system32\ntvdm.exe" | C:\Windows\system32\ntvdm.exe | — | TrdngAnlzr22649.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: NTVDM.EXE Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2120 | C:\Windows\system32\wxwxzyqo\aoiscqbz.exe /d"C:\Users\admin\Pictures\Adobe Films\13.php.exe" | C:\Windows\system32\wxwxzyqo\aoiscqbz.exe | — | services.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 2308 | schtasks /create /f /RU "admin" /tr "C:\Program Files\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST | C:\Windows\system32\schtasks.exe | — | Service.bmp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2432 | "C:\Users\admin\Pictures\Adobe Films\random.exe.exe" -h | C:\Users\admin\Pictures\Adobe Films\random.exe.exe | random.exe.exe | ||||||||||||
User: admin Company: TODO: <Company name> Integrity Level: HIGH Description: TODO: <File description> Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\File.7z | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2828) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2828 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2828.31434\File.exe | executable | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\PL_Client[1].bmp | binary | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:— | SHA256:— | |||
| 3840 | NiceProcessX32.bmp.exe | C:\Users\admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dll | executable | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Service[1].bmp | executable | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\Documents\OJ5vxl5kgcLJzMyoJFgbF.jet | binary | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\Pictures\Adobe Films\NiceProcessX32.bmp.exe | executable | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\Pictures\Adobe Films\file3.exe.exe | html | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\Pictures\Adobe Films\rrmix.exe.exe | executable | |
MD5:— | SHA256:— | |||
| 2588 | File.exe | C:\Users\admin\Pictures\Adobe Films\file4.exe.exe | html | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2588 | File.exe | HEAD | 200 | 193.233.48.98:80 | http://193.233.48.98/Offscum.exe | RU | — | — | suspicious |
2588 | File.exe | HEAD | 200 | 45.144.225.57:80 | http://45.144.225.57/download/NiceProcessX32.bmp | unknown | — | — | malicious |
2588 | File.exe | GET | — | 45.144.225.57:80 | http://45.144.225.57/download/Service.bmp | unknown | — | — | malicious |
2588 | File.exe | HEAD | — | 193.233.48.74:80 | http://193.233.48.74/rrmix.exe | RU | — | — | suspicious |
2588 | File.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file5.exe | RU | — | — | malicious |
2588 | File.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file2.exe | RU | — | — | malicious |
2588 | File.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file3.exe | RU | — | — | malicious |
2588 | File.exe | HEAD | — | 31.41.244.81:80 | http://31.41.244.81:9080/13.php | RU | — | — | suspicious |
2588 | File.exe | GET | — | 193.233.48.98:80 | http://193.233.48.98/Offscum.exe | RU | — | — | suspicious |
2588 | File.exe | GET | 200 | 45.144.225.57:80 | http://45.144.225.57/download/NiceProcessX32.bmp | unknown | executable | 259 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2588 | File.exe | 212.193.30.45:80 | — | — | RU | malicious |
2588 | File.exe | 45.144.225.57:80 | — | — | — | malicious |
2588 | File.exe | 104.20.68.143:443 | pastebin.com | Cloudflare Inc | US | malicious |
2588 | File.exe | 162.159.134.233:80 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2588 | File.exe | 212.193.30.21:80 | — | — | RU | malicious |
2588 | File.exe | 162.159.134.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2588 | File.exe | 193.233.48.98:80 | — | OOO FREEnet Group | RU | suspicious |
— | — | 193.106.191.190:80 | — | LLC Kras-Host | RU | malicious |
— | — | 212.193.30.29:80 | — | — | RU | malicious |
— | — | 31.41.244.81:80 | — | LLC DARNET | RU | suspicious |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| malicious |
cdn.discordapp.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
ipinfo.io |
| shared |
colgefine.at |
| malicious |
stpaulslouisville.com |
| unknown |
www.rahmancorp.com |
| unknown |
telegram.org |
| whitelisted |
twitter.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2588 | File.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2588 | File.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2588 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2588 | File.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
2588 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2588 | File.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
2588 | File.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
2588 | File.exe | A Network Trojan was detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2588 | File.exe | Potential Corporate Privacy Violation | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) |
2588 | File.exe | A Network Trojan was detected | ET TROJAN Win32/Spy.Socelars.S CnC Activity M3 |