File name:

QUM, IL VATICANO DELL'ISLAM.rar

Full analysis: https://app.any.run/tasks/6c5cff49-df4e-4edf-86bc-b68ae8cd507b
Verdict: Malicious activity
Threats:

PlugX is a remote access trojan that is used extensively by Chinese APTs. The malware is primarily employed for spying on victims and can perform a variety of malicious activities, such as logging users’ keystrokes and exfiltrating information from browsers.

Analysis date: July 12, 2020, 08:13:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
plugx
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2E69B5ED15156E5680334FA88BE5D1BD

SHA1:

C435C75877B39406DBE06E357EF304710D567DA9

SHA256:

282EEF984C20CC334F926725CC36AB610B00D05B5990C7F55C324791AB156D92

SSDEEP:

3072:yRnizlIWzdBu9+0ZZHmdGHQgracn2mc9DXDmUpEmq8MENdRrF:yRclIkjX0ZZHmd/Ujnzc9DXCxM3F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • QUM, IL VATICANO DELL'ISLAM.exe (PID: 2936)
      • qum.exe (PID: 3356)
      • AAM Updates.exe (PID: 1888)
    • Loads dropped or rewritten executable

      • QUM, IL VATICANO DELL'ISLAM.exe (PID: 2936)
      • AAM Updates.exe (PID: 1888)
      • qum.exe (PID: 3356)
    • Changes the autorun value in the registry

      • qum.exe (PID: 3356)
    • PLUGX was detected

      • AAM Updates.exe (PID: 1888)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2608)
      • QUM, IL VATICANO DELL'ISLAM.exe (PID: 2936)
      • qum.exe (PID: 3356)
    • Starts Microsoft Office Application

      • QUM, IL VATICANO DELL'ISLAM.exe (PID: 2936)
      • WinRAR.exe (PID: 2608)
    • Reads Internet Cache Settings

      • QUM, IL VATICANO DELL'ISLAM.exe (PID: 2936)
      • AAM Updates.exe (PID: 1888)
    • Creates files in the program directory

      • qum.exe (PID: 3356)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3124)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3124)
      • WINWORD.EXE (PID: 2092)
      • WINWORD.EXE (PID: 2704)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start winrar.exe qum, il vaticano dell'islam.exe winword.exe no specs qum.exe #PLUGX aam updates.exe winword.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1888"C:\ProgramData\AAM UpdatesmKD\AAM Updates.exe" 278C:\ProgramData\AAM UpdatesmKD\AAM Updates.exe
qum.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe CEF Helper
Exit code:
0
Version:
3.9.0.327
Modules
Images
c:\programdata\aam updatesmkd\aam updates.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2092"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIa2608.1850\~$M, IL VATICANO DELL'ISLAM.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
2608"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\QUM, IL VATICANO DELL'ISLAM.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2704"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIa2608.4633\QUM, IL VATICANO DELL'ISLAM.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
2936"C:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\QUM, IL VATICANO DELL'ISLAM.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\QUM, IL VATICANO DELL'ISLAM.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Word
Exit code:
0
Version:
12.0.4518.1014
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2608.44239\qum, il vaticano dell'islam\qum, il vaticano dell'islam.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\temp\rar$exa2608.44239\qum, il vaticano dell'islam\wwlib.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
3124"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\QUM, IL VATICANO DELL'ISLAM.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEQUM, IL VATICANO DELL'ISLAM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3356"C:\Users\admin\AppData\Local\Temp\qum.exe" C:\Users\admin\AppData\Local\Temp\qum.exe
QUM, IL VATICANO DELL'ISLAM.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe CEF Helper
Exit code:
0
Version:
3.9.0.327
Modules
Images
c:\users\admin\appdata\local\temp\qum.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
3 035
Read events
2 105
Write events
702
Delete events
228

Modification events

(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2608) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2608) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\QUM, IL VATICANO DELL'ISLAM.rar
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
6
Suspicious files
8
Text files
2
Unknown types
4

Dropped files

PID
Process
Filename
Type
3124WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR2EB.tmp.cvr
MD5:
SHA256:
2608WinRAR.exeC:\Users\admin\AppData\Local\Temp\__rar_2608.45473
MD5:
SHA256:
3124WINWORD.EXEC:\Users\admin\AppData\Local\Temp\profiles.bin
MD5:
SHA256:
2092WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR28FC.tmp.cvr
MD5:
SHA256:
3124WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso6403.tmp
MD5:
SHA256:
2704WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR94E5.tmp.cvr
MD5:
SHA256:
2608WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\QUM, IL VATICANO DELL'ISLAM.docxdocument
MD5:
SHA256:
2936QUM, IL VATICANO DELL'ISLAM.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\QUM, IL VATICANO DELL'ISLAM.docxdocument
MD5:
SHA256:
3124WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
3124WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Rar$EXa2608.44239\QUM, IL VATICANO DELL'ISLAM\~$M, IL VATICANO DELL'ISLAM.docxpgc
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
9
DNS requests
4
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2936
QUM, IL VATICANO DELL'ISLAM.exe
GET
200
103.85.24.190:80
http://103.85.24.190/qum.dat
CN
binary
348 Kb
malicious
1888
AAM Updates.exe
POST
167.88.180.32:80
http://www.systeminfor.com/15951c85
CA
malicious
1888
AAM Updates.exe
POST
167.88.180.32:80
http://www.systeminfor.com/e4350f56
CA
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2936
QUM, IL VATICANO DELL'ISLAM.exe
103.85.24.190:80
Starry Network Limited
CN
malicious
1888
AAM Updates.exe
167.88.180.32:110
www.systeminfor.com
CA
malicious
1888
AAM Updates.exe
167.88.180.32:995
www.systeminfor.com
CA
malicious
1888
AAM Updates.exe
167.88.180.32:80
www.systeminfor.com
CA
malicious

DNS requests

Domain
IP
Reputation
www.systeminfor.com
  • 167.88.180.32
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2936
QUM, IL VATICANO DELL'ISLAM.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
2936
QUM, IL VATICANO DELL'ISLAM.exe
A Network Trojan was detected
ET TROJAN Request for Malicious .dat File
1888
AAM Updates.exe
A Network Trojan was detected
ET TROJAN Possible PlugX Common Header Struct
No debug info