analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Consignment Document PL&BL Draft.r00

Full analysis: https://app.any.run/tasks/b449bd61-badd-464b-8aa0-82d85cc6c0da
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 30, 2020, 05:17:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
stealer
masslogger
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

58995681F9389BC36866624D772C6F9F

SHA1:

87115E9C0074EC127D1D6778FB0F661834E001D3

SHA256:

28B68458109EBCD6633290C6CC79134295B506DABD415CBD677F73AE36CDF166

SSDEEP:

12288:k91+tFA0/iohlukhRYWt2CPonUvzjpCVqKN14xvpGBkv:kGFF/Lh/bEAoUO9mv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Consignment Document PL&BL Draft.exe (PID: 3684)
      • Consignment Document PL&BL Draft.exe (PID: 3880)
    • MASSLOGGER was detected

      • Consignment Document PL&BL Draft.exe (PID: 3880)
    • Executes PowerShell scripts

      • cmd.exe (PID: 2720)
    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 2788)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Consignment Document PL&BL Draft.exe (PID: 3880)
    • Application launched itself

      • Consignment Document PL&BL Draft.exe (PID: 3684)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2788)
    • Creates files in the user directory

      • powershell.exe (PID: 3284)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe consignment document pl&bl draft.exe no specs #MASSLOGGER consignment document pl&bl draft.exe no specs cmd.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2788"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Consignment Document PL&BL Draft.r00.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3684"C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exeWinRAR.exe
User:
admin
Company:
6Lw!i4$D2Rj@(p9
Integrity Level:
MEDIUM
Description:
Mw4$i3@Y6Rx_Dc#78K
Exit code:
0
Version:
9.14.19.24
3880"C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exe
Consignment Document PL&BL Draft.exe
User:
admin
Company:
6Lw!i4$D2Rj@(p9
Integrity Level:
MEDIUM
Description:
Mw4$i3@Y6Rx_Dc#78K
Exit code:
0
Version:
9.14.19.24
2720"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exe' & exitC:\Windows\system32\cmd.exeConsignment Document PL&BL Draft.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3284powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PLC:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
687
Read events
608
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3284powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XTUI1BOBA3I8KBQDOW8W.temp
MD5:
SHA256:
3284powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:DD7C82F5B42C2186AD9417FA0B24A692
SHA256:9260CBB82550E6D71FD9B81EC4A85A0128A740A0BF8DF38EAFA1C63EB5577A43
2788WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2788.23071\Consignment Document PL&BL Draft.exeexecutable
MD5:7B66ED211BE2A53B69C53F45D1ABB11E
SHA256:1AB76C511B783F9E86701E02B795B27E57849CB82FCA9F0DBD36BA1EB75670DB
3284powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF8aa91.TMPbinary
MD5:DD7C82F5B42C2186AD9417FA0B24A692
SHA256:9260CBB82550E6D71FD9B81EC4A85A0128A740A0BF8DF38EAFA1C63EB5577A43
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info