File name:

a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gz

Full analysis: https://app.any.run/tasks/4d688c6c-6944-4bb0-8397-4bf89640c967
Verdict: Malicious activity
Analysis date: July 17, 2019, 09:25:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
obfuscated
Indicators:
MIME: application/gzip
File info: gzip compressed data, max compression, from Unix
MD5:

5EEA5FABF76A530F312707A366279AE5

SHA1:

5FCA1ED8E1C011D77C2C5727D6B456B0D30FF67C

SHA256:

3E68B6BA847447B908572C81CBD53A1BB6BB665F5DF0CB88325697D17B7A75D8

SSDEEP:

6144:gMOhDqaB9/OMC7PUIRwD2EXiZ/3Kka4aW3ig/vL7fTopjK0yCePQgRWr1hU7rMBO:DaX/OSyESZ/6ka03L7fTqTgw1hQMBIxr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TNT invoice.exe (PID: 2740)
      • filename.exe (PID: 2300)
      • filename.exe (PID: 632)
    • Detected artifact of a known obfuscator

      • TNT invoice.exe (PID: 2740)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3892)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • TNT invoice.exe (PID: 2740)
      • WinRAR.exe (PID: 2800)
    • Starts itself from another location

      • TNT invoice.exe (PID: 2740)
    • Executes scripts

      • TNT invoice.exe (PID: 2740)
    • Application launched itself

      • filename.exe (PID: 2300)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: (none)
ModifyDate: 0000:00:00 00:00:00
ExtraFlags: Maximum Compression
OperatingSystem: Unix
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winrar.exe tnt invoice.exe wscript.exe filename.exe no specs filename.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exefilename.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Exit code:
0
Version:
8.02.0009
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2300"C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exeTNT invoice.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Exit code:
0
Version:
8.02.0009
Modules
Images
c:\users\admin\subfolder\filename.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2740"C:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exe
WinRAR.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Exit code:
0
Version:
8.02.0009
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2800.9697\tnt invoice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
2800"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.ace"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3548"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3892"C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
TNT invoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 120
Read events
1 085
Write events
35
Delete events
0

Modification events

(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3548) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gz.z
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3548) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
Executable files
2
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3548WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3548.8181\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gzcompressed
MD5:
SHA256:
2300filename.exeC:\Users\admin\AppData\Local\Temp\~DFBB7B631D4EC40D50.TMPbinary
MD5:
SHA256:
2740TNT invoice.exeC:\Users\admin\subfolder\filename.exeexecutable
MD5:
SHA256:
2800WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exeexecutable
MD5:
SHA256:
2740TNT invoice.exeC:\Users\admin\subfolder\filename.vbstext
MD5:
SHA256:
2740TNT invoice.exeC:\Users\admin\AppData\Local\Temp\~DF08FC2030A4FABEE4.TMPbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info