File name:

OpenBulet.1.2.1.2.zip

Full analysis: https://app.any.run/tasks/c537241b-3e7c-4858-b651-349a37e42c29
Verdict: Malicious activity
Analysis date: April 14, 2019, 19:49:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

36FF1D6BAA5CE63072CB4D6D0679AC0B

SHA1:

1179E45116B4575B5F78AD72B6CE5C7A269B4583

SHA256:

26303176A4CC7B5F487D495FF3DF540353047B701176A20921DAF3284EF4D266

SSDEEP:

393216:+4/3LKXuG8u258EnaHMsVGQOyMKV83HN+QJ9/XTxt:+4/3LKX+OEnaHMNQOplUe7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • OpenBullet.exe (PID: 2632)
    • Application was dropped or rewritten from another process

      • OpenBullet.exe (PID: 2632)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2960)
    • Reads Environment values

      • OpenBullet.exe (PID: 2632)
  • INFO

    • Reads settings of System Certificates

      • OpenBullet.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2019:04:07 12:47:23
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: OpenBulet 1.2.1.2/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe openbullet.exe

Process information

PID
CMD
Path
Indicators
Parent process
2632"C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\OpenBullet.exe" C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\OpenBullet.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
OpenBullet
Exit code:
0
Version:
1.2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\openbulet.1.2.1.2\openbullet.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2960"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
Total events
527
Read events
470
Write events
57
Delete events
0

Modification events

(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\msxml3r.dll,-1
Value:
XML Document
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Extraction\Profile
Operation:writeName:Overwrite
Value:
0
Executable files
34
Suspicious files
0
Text files
7
Unknown types
4

Dropped files

PID
Process
Filename
Type
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Extreme.Net.dllexecutable
MD5:
SHA256:
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\AngleSharp.dllexecutable
MD5:BF331AB2E9BB06D900929DE29C659AE8
SHA256:0B6D37C6113914DECB8AE2142DEE7CF476206036806821AC6DC63D69269F827B
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Leaf.xNet.dllexecutable
MD5:3F303B19BFF2A4AD3AEFA94C1A897F34
SHA256:B762310FBDE4B23D9D353998AC8B11292F715659247674352B9411FAC412D246
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.Wpf.dllexecutable
MD5:F1E1A1058A95C27CC453F8559E4AB3ED
SHA256:4061499B5E66C9309352A660A457AC95C8FA98229A8BBCCC648DEB85F5FF7CC7
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\ICSharpCode.AvalonEdit.dllexecutable
MD5:B4D5D46E50006E87B30E7D514E95173C
SHA256:058F38F33F3F99F904AB9588447A234346C859718404B4E8A523673ED19CDBE7
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.Modules.dllexecutable
MD5:621192DB357916F2261989A49FA2C6BD
SHA256:87525121D7826DCFC76963AB8BD7996B9644BF4F148D1296757EB702A43DA51F
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\LiteDB.dllexecutable
MD5:25B242D00C6C32E1F437EB2064EA2E29
SHA256:E72ACDDF47586BC0999D598E3BD125A254BB6F4AE151C076993304F6E31FBBED
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Jint.dllexecutable
MD5:734C5CE8F9B104D8AD3C7B494E96F9B9
SHA256:ED618668AE9E7C02C7C2B7332DD09079168CCA96432A051044683C996337001C
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.dllexecutable
MD5:9A39A51E6DCB22B80DB481FBFBCD7826
SHA256:61B809B97DC878F42E85EE2C5D8471853527754E4F53B17C0507334C57E19E04
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Microsoft.Scripting.Metadata.dllexecutable
MD5:1BED5E618B922411CFAE2EAC84AFEF43
SHA256:A4ACE184DDB98E81CFCC6C838299915D8C33B714594E3836DE7C75B1F70E55EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2632
OpenBullet.exe
151.101.0.133:443
raw.githubusercontent.com
Fastly
US
malicious

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
shared

Threats

No threats detected
No debug info