analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gz

Full analysis: https://app.any.run/tasks/4d688c6c-6944-4bb0-8397-4bf89640c967
Verdict: Malicious activity
Analysis date: July 17, 2019, 09:25:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
obfuscated
Indicators:
MIME: application/gzip
File info: gzip compressed data, max compression, from Unix
MD5:

5EEA5FABF76A530F312707A366279AE5

SHA1:

5FCA1ED8E1C011D77C2C5727D6B456B0D30FF67C

SHA256:

3E68B6BA847447B908572C81CBD53A1BB6BB665F5DF0CB88325697D17B7A75D8

SSDEEP:

6144:gMOhDqaB9/OMC7PUIRwD2EXiZ/3Kka4aW3ig/vL7fTopjK0yCePQgRWr1hU7rMBO:DaX/OSyESZ/6ka03L7fTqTgw1hQMBIxr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TNT invoice.exe (PID: 2740)
      • filename.exe (PID: 2300)
      • filename.exe (PID: 632)
    • Detected artifact of a known obfuscator

      • TNT invoice.exe (PID: 2740)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3892)
  • SUSPICIOUS

    • Executes scripts

      • TNT invoice.exe (PID: 2740)
    • Executable content was dropped or overwritten

      • TNT invoice.exe (PID: 2740)
      • WinRAR.exe (PID: 2800)
    • Starts itself from another location

      • TNT invoice.exe (PID: 2740)
    • Application launched itself

      • filename.exe (PID: 2300)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: (none)
ModifyDate: 0000:00:00 00:00:00
ExtraFlags: Maximum Compression
OperatingSystem: Unix
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winrar.exe tnt invoice.exe wscript.exe filename.exe no specs filename.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3548"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2800"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.ace"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2740"C:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exe
WinRAR.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Exit code:
0
Version:
8.02.0009
3892"C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
TNT invoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2300"C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exeTNT invoice.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Exit code:
0
Version:
8.02.0009
632C:\Users\admin\subfolder\filename.exe" C:\Users\admin\subfolder\filename.exefilename.exe
User:
admin
Company:
CollapseVERTEBRARIA
Integrity Level:
MEDIUM
Description:
CollapseLORISIFORM
Version:
8.02.0009
Total events
1 120
Read events
1 085
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3548WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3548.8181\a5661e831abc2363809297cdb03b78878dd34e0dd6ed8f97889c3217800ee4a0.bin.gzcompressed
MD5:58377D9C803AAB3FE55ADF09981244A3
SHA256:A5661E831ABC2363809297CDB03B78878DD34E0DD6ED8F97889C3217800EE4A0
2740TNT invoice.exeC:\Users\admin\subfolder\filename.exeexecutable
MD5:F3B27B2E08F5C44CE3520F33F07D7B6D
SHA256:E4AFCA527D24EDEAEA3A8565CA6C37F0AA3DFAB112D2C9000CD32A8CF12D2E06
2740TNT invoice.exeC:\Users\admin\AppData\Local\Temp\~DF08FC2030A4FABEE4.TMPbinary
MD5:9547E7D8CCCA92A4B2027780BB8EC67D
SHA256:7A5DE12164E9EC7D669DD7F55E517E56013D8ACF04651E84A1C0CA854E3DAF3E
2800WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2800.9697\TNT invoice.exeexecutable
MD5:F3B27B2E08F5C44CE3520F33F07D7B6D
SHA256:E4AFCA527D24EDEAEA3A8565CA6C37F0AA3DFAB112D2C9000CD32A8CF12D2E06
2740TNT invoice.exeC:\Users\admin\subfolder\filename.vbstext
MD5:28CCC5014300EF75E2038CDBDCB1F0C8
SHA256:5C43264EAE271C2309DD1399B2AD54239C86305C92AA1A7C6610E46648A11EC7
2300filename.exeC:\Users\admin\AppData\Local\Temp\~DFBB7B631D4EC40D50.TMPbinary
MD5:9547E7D8CCCA92A4B2027780BB8EC67D
SHA256:7A5DE12164E9EC7D669DD7F55E517E56013D8ACF04651E84A1C0CA854E3DAF3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info