analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

samples.zip

Full analysis: https://app.any.run/tasks/63f0b77c-8b12-493b-8384-30ed6ad32048
Verdict: Malicious activity
Analysis date: May 21, 2022, 06:28:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract
MD5:

E0207D00D32A56337FF0C32A2D72E1A5

SHA1:

806E01680C9484171AABCEFA6875B19ED2E2C9D1

SHA256:

3EF430653F3F0F44F3038D5E24108B5DC37A2899A31B96C48BF33F2CE6FEFF0C

SSDEEP:

24576:NpWIXS6eUw6Fqb0m6gQYTnR/qVbASxYAEjSt:NvlkE6f6SRkgc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
      • smvohluj.exe (PID: 3900)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1236)
      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • sbnvyybh.exe (PID: 2400)
      • lugdbbmp.exe (PID: 1396)
      • smvohluj.exe (PID: 3900)
    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
  • SUSPICIOUS

    • Reads the computer name

      • sbnvyybh.exe (PID: 2408)
      • WinRAR.exe (PID: 2920)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • smvohluj.exe (PID: 3900)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
    • Checks supported languages

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • sbnvyybh.exe (PID: 2400)
      • smvohluj.exe (PID: 3900)
      • lugdbbmp.exe (PID: 1396)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
    • Creates files in the user directory

      • sbnvyybh.exe (PID: 2408)
  • INFO

    • Manual execution by user

      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • lugdbbmp.exe (PID: 1396)
      • smvohluj.exe (PID: 3900)
      • sbnvyybh.exe (PID: 2400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: MilageAorta
ZipUncompressedSize: 1957
ZipCompressedSize: 1958
ZipCRC: 0x00000000
ZipModifyDate: 2016:03:23 05:59:01
ZipCompression: Unknown (99)
ZipBitFlag: 0x0001
ZipRequiredVersion: 819
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs sbnvyybh.exe smvohluj.exe no specs lugdbbmp.exe no specs lugdbbmp.exe smvohluj.exe sbnvyybh.exe

Process information

PID
CMD
Path
Indicators
Parent process
2920"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\samples.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
1236"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
2408"C:\Users\admin\Desktop\sbnvyybh.exe" C:\Users\admin\Desktop\sbnvyybh.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
2696"C:\Users\admin\Desktop\smvohluj.exe" C:\Users\admin\Desktop\smvohluj.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
2840"C:\Users\admin\Desktop\lugdbbmp.exe" C:\Users\admin\Desktop\lugdbbmp.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
1396"C:\Users\admin\Desktop\lugdbbmp.exe" C:\Users\admin\Desktop\lugdbbmp.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
3900"C:\Users\admin\Desktop\smvohluj.exe" C:\Users\admin\Desktop\smvohluj.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
2400"C:\Users\admin\Desktop\sbnvyybh.exe" C:\Users\admin\Desktop\sbnvyybh.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
Total events
1 360
Read events
1 338
Write events
22
Delete events
0

Modification events

(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2920) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\samples.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
8
Suspicious files
11
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\MilageAortabinary
MD5:CFC171E42ED3FD73502424F37A55DC53
SHA256:FB9D867602C98514D139443643A5371A6DB00680D8E2EA074F710F7104C3B3C6
2400sbnvyybh.exeC:\Users\admin\AppData\Local\Temp\nsg78CD.tmpbinary
MD5:514D9131FB386B22C64AE2568236228B
SHA256:CD87C85597A5358EE4FE7929BEF1D094814688348F57CF42933E43FB7DF0EF52
2408sbnvyybh.exeC:\Users\admin\AppData\Roaming\villeinage.dllexecutable
MD5:981CA3E408F1AC942D579924F9BAEF2D
SHA256:D97837B33D086BD98D43315F92CABA3A7B0F14078CDE2C3F0D2238B48E85C646
1396lugdbbmp.exeC:\Users\admin\AppData\Local\Temp\nsa5F49.tmpbinary
MD5:514D9131FB386B22C64AE2568236228B
SHA256:CD87C85597A5358EE4FE7929BEF1D094814688348F57CF42933E43FB7DF0EF52
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\nsyAD6F.tmpbinary
MD5:514D9131FB386B22C64AE2568236228B
SHA256:CD87C85597A5358EE4FE7929BEF1D094814688348F57CF42933E43FB7DF0EF52
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\smvohluj.exeexecutable
MD5:99F21BA5B02B3085C683EA831D79DC79
SHA256:0D522EFE19E7B336621D954F511D546FE0B04D94E0FC022D3970E07B05E40428
2408sbnvyybh.exeC:\Users\admin\AppData\Local\Temp\nsa66B.tmpbinary
MD5:514D9131FB386B22C64AE2568236228B
SHA256:CD87C85597A5358EE4FE7929BEF1D094814688348F57CF42933E43FB7DF0EF52
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\Warsawbinary
MD5:C2A126B2DD4FB7C6FBE19EB7064F214D
SHA256:832A180722326FC82EDD6F1B4C066CE7AF16BDCD5D5288B1A9C78964386BF5D7
2408sbnvyybh.exeC:\Users\admin\AppData\Roaming\MilageAortabinary
MD5:CFC171E42ED3FD73502424F37A55DC53
SHA256:FB9D867602C98514D139443643A5371A6DB00680D8E2EA074F710F7104C3B3C6
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\lugdbbmp.exeexecutable
MD5:99F21BA5B02B3085C683EA831D79DC79
SHA256:0D522EFE19E7B336621D954F511D546FE0B04D94E0FC022D3970E07B05E40428
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info