File name:

samples.zip

Full analysis: https://app.any.run/tasks/63f0b77c-8b12-493b-8384-30ed6ad32048
Verdict: Malicious activity
Analysis date: May 21, 2022, 06:28:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract
MD5:

E0207D00D32A56337FF0C32A2D72E1A5

SHA1:

806E01680C9484171AABCEFA6875B19ED2E2C9D1

SHA256:

3EF430653F3F0F44F3038D5E24108B5DC37A2899A31B96C48BF33F2CE6FEFF0C

SSDEEP:

24576:NpWIXS6eUw6Fqb0m6gQYTnR/qVbASxYAEjSt:NvlkE6f6SRkgc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1236)
      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
      • smvohluj.exe (PID: 3900)
    • Application was dropped or rewritten from another process

      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • smvohluj.exe (PID: 3900)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
      • smvohluj.exe (PID: 3900)
    • Checks supported languages

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • smvohluj.exe (PID: 3900)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2920)
      • sbnvyybh.exe (PID: 2408)
    • Creates files in the user directory

      • sbnvyybh.exe (PID: 2408)
  • INFO

    • Manual execution by user

      • sbnvyybh.exe (PID: 2408)
      • smvohluj.exe (PID: 2696)
      • lugdbbmp.exe (PID: 2840)
      • lugdbbmp.exe (PID: 1396)
      • sbnvyybh.exe (PID: 2400)
      • smvohluj.exe (PID: 3900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: MilageAorta
ZipUncompressedSize: 1957
ZipCompressedSize: 1958
ZipCRC: 0x00000000
ZipModifyDate: 2016:03:23 05:59:01
ZipCompression: Unknown (99)
ZipBitFlag: 0x0001
ZipRequiredVersion: 819
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs sbnvyybh.exe smvohluj.exe no specs lugdbbmp.exe no specs lugdbbmp.exe smvohluj.exe sbnvyybh.exe

Process information

PID
CMD
Path
Indicators
Parent process
1236"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1396"C:\Users\admin\Desktop\lugdbbmp.exe" C:\Users\admin\Desktop\lugdbbmp.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\desktop\lugdbbmp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\sechost.dll
2400"C:\Users\admin\Desktop\sbnvyybh.exe" C:\Users\admin\Desktop\sbnvyybh.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\sbnvyybh.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2408"C:\Users\admin\Desktop\sbnvyybh.exe" C:\Users\admin\Desktop\sbnvyybh.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\desktop\sbnvyybh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
2696"C:\Users\admin\Desktop\smvohluj.exe" C:\Users\admin\Desktop\smvohluj.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\desktop\smvohluj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2840"C:\Users\admin\Desktop\lugdbbmp.exe" C:\Users\admin\Desktop\lugdbbmp.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\desktop\lugdbbmp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
2920"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\samples.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3900"C:\Users\admin\Desktop\smvohluj.exe" C:\Users\admin\Desktop\smvohluj.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\desktop\smvohluj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\shell32.dll
Total events
1 360
Read events
1 338
Write events
22
Delete events
0

Modification events

(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2920) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\samples.zip
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2920) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
8
Suspicious files
11
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2408sbnvyybh.exeC:\Users\admin\AppData\Roaming\Warsawbinary
MD5:
SHA256:
2408sbnvyybh.exeC:\Users\admin\AppData\Roaming\4WNBmv3executable
MD5:
SHA256:
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\lugdbbmp.exeexecutable
MD5:
SHA256:
1396lugdbbmp.exeC:\Users\admin\AppData\Local\Temp\nsa5F49.tmpbinary
MD5:
SHA256:
2408sbnvyybh.exeC:\Users\admin\AppData\Roaming\MilageAortabinary
MD5:
SHA256:
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\nsyAD6F.tmpbinary
MD5:
SHA256:
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\villeinage.dllexecutable
MD5:
SHA256:
2696smvohluj.exeC:\Users\admin\AppData\Local\Temp\nsr850.tmpbinary
MD5:
SHA256:
2408sbnvyybh.exeC:\Users\admin\AppData\Local\Temp\nsa66B.tmpbinary
MD5:
SHA256:
2920WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2920.19201\Warsawbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info