File name: | вирусы.7z |
Full analysis: | https://app.any.run/tasks/4386aed1-88a0-48fe-ad45-8c15d763a708 |
Verdict: | Malicious activity |
Analysis date: | September 11, 2019, 05:57:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-7z-compressed |
File info: | 7-zip archive data, version 0.4 |
MD5: | FBD5F1285B72DD1B3F39BC8A7843B5D8 |
SHA1: | BE9C0D30FED7936429BFCA78A4D0C578F634B004 |
SHA256: | 29A1D4D563E57D7EFE7D2C29DDF77F803F6D10A416AFF281B84BED99D9BAC9A7 |
SSDEEP: | 768:LuPOhMw7k9lns2rdUCvInkC9rik9TjRO/s:LuJEoLdvInV3s/s |
.7z | | | 7-Zip compressed archive (v0.4) (57.1) |
---|---|---|
.7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2760 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\вирусы.7z" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3256 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Группа компаний Рольф подробности заказа.js" | C:\Windows\System32\WScript.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
3748 | "C:\Windows\System32\cmd.exe" /c C:\Users\admin\AppData\Local\Temp\radEA981.tmp | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3240 | "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\radEA981.tmp | C:\Windows\system32\rundll32.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\вирусы.7z | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\wshext.dll,-4804 |
Value: JScript Script File | |||
(PID) Process: | (2760) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
Operation: | write | Name: | ShowPassword |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3256 | WScript.exe | C:\Users\admin\AppData\Local\Temp\radEA981.tmp | html | |
MD5:C9E894DEECCFF301179986D026560C50 | SHA256:BB1F12D42A5BD228B6E5C23F76C9FD0B4E056A8A6B8DC9EF2E3F745F32A284CD | |||
2760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2760.861\вирусы\Группа компаний Рольф подробности заказа.js | text | |
MD5:A2147E592A8F032EAADF87DEA0F02E0B | SHA256:66009A8A4A90546F60B4E2C3D94B1D0F7BDD8C7D4C991B45B4792DF74B781ED8 | |||
3256 | WScript.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\suspendedpage[1].htm | html | |
MD5:C9E894DEECCFF301179986D026560C50 | SHA256:BB1F12D42A5BD228B6E5C23F76C9FD0B4E056A8A6B8DC9EF2E3F745F32A284CD |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3256 | WScript.exe | GET | 200 | 198.38.82.253:80 | http://oteea-land.com/cgi-sys/suspendedpage.cgi | US | html | 7.41 Kb | malicious |
3256 | WScript.exe | GET | 302 | 198.38.82.253:80 | http://oteea-land.com/DATABASE/gr.mpwq | US | html | 231 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3256 | WScript.exe | 198.38.82.253:80 | oteea-land.com | Server Central Network | US | malicious |
Domain | IP | Reputation |
---|---|---|
oteea-land.com |
| malicious |