File name:

Win32.zip

Full analysis: https://app.any.run/tasks/48aa0e24-13d1-4922-b59e-a54731b72246
Verdict: Malicious activity
Analysis date: March 10, 2024, 23:28:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v4.5 to extract, compression method=deflate
MD5:

B251B30E1035C263C629C320F2C372E3

SHA1:

A2B0C01EB6FCBB92FC6335ABB1522BA344651673

SHA256:

2B480727BE5CBF562BC6CBC8F4D840292451B703D20934B6C78DE8D2BF744E9C

SSDEEP:

24576:JAzqvDYufXiUGYt3fYIeaYz9nhb8DOzVOiwjFmj/BtuGy6OkRS:JAzqvDYufXiUGYt3fYIeaYZnhb8DOzV8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3864)
      • Antares.exe (PID: 2572)
    • Starts NET.EXE for service management

      • Opaserv.exe (PID: 3164)
      • net.exe (PID: 848)
      • net.exe (PID: 796)
      • net.exe (PID: 2072)
      • net.exe (PID: 2168)
      • net.exe (PID: 1928)
    • Changes the autorun value in the registry

      • Opaserv.exe (PID: 3164)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3864)
      • Antares.exe (PID: 2572)
    • Starts a Microsoft application from unusual location

      • Rigel.exe (PID: 3728)
      • Rigel.exe (PID: 3408)
    • Executable content was dropped or overwritten

      • Antares.exe (PID: 2572)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 3324)
    • Hides command output

      • cmd.exe (PID: 3068)
    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 1448)
      • ctfmon.exe (PID: 1660)
  • INFO

    • Checks supported languages

      • not-virus_Joke.Win32.Badgame.exe (PID: 2340)
      • Opaserv.exe (PID: 3164)
      • IconDance.exe (PID: 664)
      • Rigel.exe (PID: 3728)
      • Rigel.exe (PID: 3408)
    • Manual execution by a user

      • not-virus_Joke.Win32.Badgame.exe (PID: 2340)
      • Opaserv.exe (PID: 3164)
      • Alerta.exe (PID: 3800)
      • IconDance.exe (PID: 664)
      • Winfig.exe (PID: 668)
      • Rigel.exe (PID: 3728)
      • Rigel.exe (PID: 3408)
      • Antares.exe (PID: 2444)
      • Antares.exe (PID: 2572)
      • wscript.exe (PID: 3324)
      • Whiter.exe (PID: 712)
      • explorer.exe (PID: 2424)
      • IMEKLMG.EXE (PID: 1504)
      • IMEKLMG.EXE (PID: 1188)
      • wmpnscfg.exe (PID: 2260)
      • wmpnscfg.exe (PID: 2300)
      • FakePetya.exe (PID: 2876)
      • FakePetya.exe (PID: 2992)
      • Sevgi.exe (PID: 2308)
      • Sevgi.exe (PID: 2616)
      • Whiter.exe (PID: 3804)
      • Whiter.exe (PID: 3084)
    • Create files in a temporary directory

      • not-virus_Joke.Win32.Badgame.exe (PID: 2340)
    • Dropped object may contain TOR URL's

      • WinRAR.exe (PID: 3864)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3864)
    • Reads the computer name

      • Opaserv.exe (PID: 3164)
      • not-virus_Joke.Win32.Badgame.exe (PID: 2340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 45
ZipBitFlag: 0x0800
ZipCompression: Deflated
ZipModifyDate: 2024:03:10 21:41:18
ZipCRC: 0x00000000
ZipCompressedSize: 2
ZipUncompressedSize: -
ZipFileName: Win32/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
36
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe not-virus_joke.win32.badgame.exe no specs opaserv.exe net.exe no specs net.exe no specs net.exe no specs net.exe no specs net.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs alerta.exe icondance.exe no specs winfig.exe no specs rigel.exe rigel.exe antares.exe no specs antares.exe wscript.exe no specs cmd.exe no specs whiter.exe no specs sevgi.exe no specs sevgi.exe no specs whiter.exe no specs whiter.exe no specs ctfmon.exe no specs sipnotify.exe no specs imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs explorer.exe no specs fakepetya.exe no specs fakepetya.exe

Process information

PID
CMD
Path
Indicators
Parent process
664"C:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.IconDance\IconDance.exe" C:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.IconDance\IconDance.exeexplorer.exe
User:
admin
Company:
Xavier LAURENT
Integrity Level:
MEDIUM
Description:
Danse des icônes
Exit code:
1073807364
Version:
1.0.0.30
Modules
Images
c:\users\admin\appdata\local\temp\win32\win32\trojan.win32.icondance\icondance.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
668"C:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.Win32.Winfig\Winfig.exe" C:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.Win32.Winfig\Winfig.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225595
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\win32\win32\virus.win32.winfig\winfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
712"C:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.Whiter\Whiter.exe" C:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.Whiter\Whiter.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
796NET STOP AVPCCC:\Windows\System32\net.exeOpaserv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
848NET STOP PERSFWC:\Windows\System32\net.exeOpaserv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
1112C:\Windows\system32\net1 STOP SWEEPSRV.SYSC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
1188"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
1448C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
1504"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
1572C:\Windows\system32\net1 STOP AVPCCC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
Total events
4 069
Read events
4 048
Write events
21
Delete events
0

Modification events

(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Win32.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
17
Suspicious files
1
Text files
1 553
Unknown types
1

Dropped files

PID
Process
Filename
Type
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Net-Worm.Win32.Opaserv\Opaserv.exeexecutable
MD5:71C981D4F5316C3AD1DEEFE48FDDB94A
SHA256:DE709DACAC623C637448DC91F6DFD441A49C89372AF2C53E2027E4AF5310B95D
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Joke.Win32.FakePetya\FakePetya.exeexecutable
MD5:C01399C30E8744681251164FAE8DCA01
SHA256:4146805A52DB2D4FDB1183BB45F0CD4D90CF184CBD0D5EC2CF370E2FA2813CD7
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.Win32.Antares\Antares.exeexecutable
MD5:EDD7A751B4676DCD2065D7D44DD4C902
SHA256:5BC2D85780A31474C02E92A9A5EA73A82C8EEAFE483197CDDF1D2FFEE473266B
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.Sevgi\Sevgi.exeexecutable
MD5:B28505A8050446AF4638319060E006E9
SHA256:750E37D1FDD64E9EA015272A0DB6720AC9A8D803DC0CAAD29D0653756A8E5B17
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.IconDance\IconDance.exeexecutable
MD5:7AD8C84DEA7BD1E9CBB888734DB28961
SHA256:A4B6E53453D1874A6F78F0D7AA14DFAFBA778062F4B85B42B4C1001E1FC17095
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.VBS.Karma\karma.vbstext
MD5:1B2FD919726C83AA8D47BF7F3C523628
SHA256:F29077CE315731F78BD1DBA3FF166A155D7D4CA5581455B28349D91266F5C9E0
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.Win32.Winfig\Winfig.exeexecutable
MD5:C82B6D5A8496064ABB5E66A26AA6717B
SHA256:50AED187373623BE982BCAC479CF729F08BF945B0976ECC48BC4047FF67A938D
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Trojan.Win32.Alerta\Alerta.exeexecutable
MD5:E8ED8AAF35E6059BA28504C19FF50BAB
SHA256:2D2A22DB20A44474AFBD7B0E6488690BAD584DCAE9789A5DB776CC1A00B98728
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Joke.Win32.Badgame\not-virus_Joke.Win32.Badgame.exeexecutable
MD5:EBFBD478A8CFC0FB645B8559973690CB
SHA256:62C99EA25FEA9D3E5917114ADA0406A333B1506697BD2BC28E9D676655232A59
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Win32\Win32\Virus.VBS.Karma\Readme.txttext
MD5:93A258C5DA185B408B40CC0CCD84F4B4
SHA256:EA3A3D3CF7CAB9043145DCE2B3EA7584CCB12CB03C1F862C4FC83E65A11FCC50
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
23.207.104.5:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133545871188280000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
224.0.0.252:5355
unknown
23.207.104.5:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
JP
unknown

DNS requests

Domain
IP
Reputation
query.prod.cms.rt.microsoft.com
  • 23.207.104.5
whitelisted

Threats

No threats detected
No debug info