File name:

Bandook v1.35.rar

Full analysis: https://app.any.run/tasks/8f1a0c9c-0aca-47e5-8de4-b0939e95e31f
Verdict: Malicious activity
Analysis date: May 03, 2018, 15:09:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

425BBD854E4EB273D101DF90862617D2

SHA1:

C9AEBE6B1D5F1D6BEDF4188FA6B980AE3A01A2C1

SHA256:

30EB4DC3C46CECEBA84384B6A89DA8D12CD00D8D9BC9E4E1CBC97610FC496BE1

SSDEEP:

98304:Ign0wDXWq+Ijscsz9hGDGPTFccqYEWeX4uLDW5s7LH:z0wDXWrCDGPpccTCIuLDW5QH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application loaded dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1360)
    • Actions looks like stealing of personal data

      • 7zFM.exe (PID: 2872)
    • Application was dropped or rewritten from another process

      • Bandook v1.35.exe.exe (PID: 2108)
      • Bandook.exe (PID: 3936)
      • BANDOOK V1.35.EXE (PID: 3312)
      • ali.exe (PID: 2216)
    • Changes the autorun value in the registry

      • ali.exe (PID: 2216)
  • SUSPICIOUS

    • Starts itself from another location

      • Bandook.exe (PID: 3936)
    • Starts Internet Explorer

      • ali.exe (PID: 2216)
    • Creates files in the Windows directory

      • Bandook.exe (PID: 3936)
  • INFO

    • Dropped object may contain URL's

      • 7zFM.exe (PID: 2872)
      • BANDOOK V1.35.EXE (PID: 3312)
      • Bandook.exe (PID: 3936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 320
UncompressedSize: 511
OperatingSystem: Win32
ModifyDate: 2006:07:02 11:49:02
PackingMethod: Normal
ArchivedFileName: nfascripts\destroy.nfa
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start 7zfm.exe searchprotocolhost.exe no specs bandook v1.35.exe.exe bandook v1.35.exe PhotoViewer.dll no specs bandook.exe ali.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1360"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2096"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exeali.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2108"C:\Users\admin\Desktop\asdf\Bandook v1.35.exe.exe" C:\Users\admin\Desktop\asdf\Bandook v1.35.exe.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\asdf\bandook v1.35.exe.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2216C:\Windows\system32\ali.exeC:\Windows\system32\ali.exe
Bandook.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ali.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2592C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2872"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\admin\AppData\Local\Temp\Bandook v1.35.rar"C:\Program Files\7-Zip\7zFM.exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip File Manager
Exit code:
0
Version:
16.04
Modules
Images
c:\program files\7-zip\7zfm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3312"C:\Users\admin\AppData\Local\Temp\BANDOOK V1.35.EXE" C:\Users\admin\AppData\Local\Temp\BANDOOK V1.35.EXE
Bandook v1.35.exe.exe
User:
admin
Company:
Nuclear Winter Crew
Integrity Level:
MEDIUM
Description:
Bandook FWB++ RAT
Exit code:
0
Version:
1.3.5.0
Modules
Images
c:\users\admin\appdata\local\temp\bandook v1.35.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3936"C:\Users\admin\Desktop\asdf\Bandook.exe" C:\Users\admin\Desktop\asdf\Bandook.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\asdf\bandook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
1 548
Read events
1 516
Write events
32
Delete events
0

Modification events

(PID) Process:(2872) 7zFM.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\91\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2872) 7zFM.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\91\52C64B7E
Operation:writeName:@C:\Program Files\Common Files\System\wab32res.dll,-4602
Value:
Contact file
(PID) Process:(2872) 7zFM.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\91\52C64B7E
Operation:writeName:@"C:\Program Files\Windows Journal\Journal.exe",-3072
Value:
Journal Document
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Operation:writeName:Classes
Value:
.bmp
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Operation:writeName:~reserved~
Value:
0800000000000600
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Width
Value:
318
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Height
Value:
288
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:CopyHistory
Value:
43003A005C00550073006500720073005C00610064006D0069006E005C004400650073006B0074006F0070005C0061007300640066005C000000
(PID) Process:(2872) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM\Columns
Operation:writeName:7-Zip.Rar
Value:
0100000004000000010000000400000001000000A00000000700000001000000640000000800000001000000640000000C00000001000000640000000A00000001000000640000000B00000001000000640000000900000001000000640000000F00000001000000640000000D00000001000000640000000E00000001000000640000001000000001000000640000001100000001000000640000001300000001000000640000001700000001000000640000001600000001000000640000002100000001000000640000001F0000000100000064000000200000000100000064000000
(PID) Process:(1360) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\91\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
16
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
28727zFM.exeC:\Users\admin\Desktop\asdf
MD5:
SHA256:
28727zFM.exeC:\Users\admin\Desktop\asdf\nfascripts\olmert.nfatext
MD5:E2294C4DF34C893038B252732FFFC98E
SHA256:35429B047C12159CD069FD6093DCFA1A0D3ABDE8BF0690D897FC3607B479E8BF
28727zFM.exeC:\Users\admin\Desktop\asdf\Bandook v1.35.exe.exeexecutable
MD5:
SHA256:
28727zFM.exeC:\Users\admin\Desktop\asdf\nfascripts\pcterrorist.nfatext
MD5:8302FE259CA77C4B22E08F6DB54DCC30
SHA256:1048E32F1D6E4451828FDE8D07434BEBDDC1928E45F39D62EC524DB8B061AB3B
28727zFM.exeC:\Users\admin\Desktop\asdf\nfascripts\Icons.nfatext
MD5:DC9C2CA9FFA5EA0FD2A1B8E44FE12B7C
SHA256:92218310DFD24A25C40817A8AFA0E8F4F4FA92ADE1F41D24EE3A2C59EBB93A0E
28727zFM.exeC:\Users\admin\Desktop\asdf\nfascripts\Hot news.nfatext
MD5:6A8A865CD4CE41D405ED9B06C9223F6B
SHA256:20ADB7CC60CFFB5F940DE1D0A8009C6BBB003E178C7B0999AD923672D7A8A4B2
28727zFM.exeC:\Users\admin\Desktop\asdf\Plugins\script.nfatext
MD5:D634402678FFC995966D5992E984EA64
SHA256:3F7CDEAC6931ED5AD62F19681D1BBC9E5C4538AC516CB8FB5CF63F844DE9DAE9
28727zFM.exeC:\Users\admin\Desktop\asdf\Plugins\nfa.bndkexecutable
MD5:B709BECB4F8EC6BC7AB81E071B113690
SHA256:B6AC220C5713C85BCE298B7406E284ADB5E3E6ECCE80AC56C1E3ED99EB9BCB96
28727zFM.exeC:\Users\admin\Desktop\asdf\nfascripts\fuckfuckfuck.nfatext
MD5:D373FDD7C7839D9BA3279A61ED25C4D0
SHA256:44CA0393675CE91BA1AF516AF2507534FC60FE3E997C0CA8698BCB6007EACB20
28727zFM.exeC:\Users\admin\Desktop\asdf\Plugins\rar.bndkexecutable
MD5:584B88FA605E69ABE4232463E35EC061
SHA256:F0D2CE024DA3AECCAAFD8A625192771236CEA50E677E935EF30F4BF264666B94
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
Bandook v1.35.exe.exe
C:\Users\admin\AppData\Local\Temp\BANDOOK V1.35.EXE
Bandook v1.35.exe.exe
C:\Users\admin\AppData\Local\Temp\DJACK.ICO