File name:

34c9f32c54d87c42ba9c93881a7e5c5f.zip

Full analysis: https://app.any.run/tasks/966e83f6-b6ad-4ac7-8f33-42cbd3c85c90
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 20, 2019, 19:06:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
maldoc-8
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

9EA05944984C004E276FB8973E67140F

SHA1:

30AFE087FBCA51A0C64CA22CC5A1B2CFB5118BDF

SHA256:

4053D2B6D2C553B091F42D90D6750BAD3265EA28824AAE523B4CC252EBBF334F

SSDEEP:

6144:rgaVIL797aZksoyKB1CygPu7ExmUULSr7jVEpa/IU+fzjcp4nIo:rgaVIL7t6ksoL1C3P8ExmUULk5EEknnJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • wprgxyeqd79.exe (PID: 1480)
      • rher.exe (PID: 2788)
    • Loads dropped or rewritten executable

      • DllHost.exe (PID: 3492)
      • WinRAR.exe (PID: 2796)
      • WINWORD.EXE (PID: 3292)
      • wprgxyeqd79.exe (PID: 1480)
      • DllHost.exe (PID: 3024)
      • SearchFilterHost.exe (PID: 3396)
      • OSPPSVC.EXE (PID: 3040)
      • DllHost.exe (PID: 964)
      • WinRAR.exe (PID: 3648)
      • rher.exe (PID: 2788)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3292)
    • Loads the Task Scheduler COM API

      • OSPPSVC.EXE (PID: 3040)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3292)
    • Stealing of credential data

      • rher.exe (PID: 2788)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • wprgxyeqd79.exe (PID: 1480)
    • Loads DLL from Mozilla Firefox

      • rher.exe (PID: 2788)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 3292)
      • WinRAR.exe (PID: 3648)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3292)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2019:05:20 21:03:11
ZipCRC: 0xd2db937e
ZipCompressedSize: 317807
ZipUncompressedSize: 317910
ZipFileName: 34c9f32c54d87c42ba9c93881a7e5c5f
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
10
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winrar.exe no specs winword.exe wprgxyeqd79.exe Thumbnail Cache Out of Proc Server no specs Thumbnail Cache Out of Proc Server no specs searchfilterhost.exe no specs Thumbnail Cache Out of Proc Server no specs rher.exe osppsvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
964C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1480C:\Users\Public\wprgxyeqd79.exeC:\Users\Public\wprgxyeqd79.exe
WINWORD.EXE
User:
admin
Company:
AMS Software
Integrity Level:
MEDIUM
Description:
Hackers Reach Activestate Left
Exit code:
0
Modules
Images
c:\users\public\wprgxyeqd79.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2788C:\Users\Public\rher.exeC:\Users\Public\rher.exe
WINWORD.EXE
User:
admin
Company:
x264 project
Integrity Level:
MEDIUM
Description:
Nkcreatestaticmapping Aboriginal Year
Exit code:
0
Version:
5.7.3.790
Modules
Images
c:\users\public\rher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2796"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\34c9f32c54d87c42ba9c93881a7e5c5f.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3024C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3040"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXEservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Software Protection Platform Service
Exit code:
0
Version:
14.0.0370.400 (longhorn(wmbla).090811-1833)
Modules
Images
c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3292"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\Invoice_ref052019.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3396"C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520 C:\Windows\system32\SearchFilterHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Search Filter Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchfilterhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3492C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3648"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\34c9f32c54d87c42ba9c93881a7e5c5f.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
1 832
Read events
1 438
Write events
387
Delete events
7

Modification events

(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2796) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\34c9f32c54d87c42ba9c93881a7e5c5f.zip
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
5
Suspicious files
2
Text files
3
Unknown types
5

Dropped files

PID
Process
Filename
Type
3292WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA83E.tmp.cvr
MD5:
SHA256:
2788rher.exeC:\Users\admin\AppData\Local\Temp\{B5DA22E1-24B2-46CC-A05B-7745B8B22357}\365187467.dll
MD5:
SHA256:
2788rher.exeC:\Users\admin\AppData\Local\Temp\{B5DA22E1-24B2-46CC-A05B-7745B8B22357}\CJIxD.exe
MD5:
SHA256:
3292WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
2796WinRAR.exeC:\Users\admin\Desktop\34c9f32c54d87c42ba9c93881a7e5c5fcompressed
MD5:
SHA256:
3292WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:
SHA256:
3648WinRAR.exeC:\Users\admin\Desktop\Invoice_ref052019.docdocument
MD5:
SHA256:
3292WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Invoice_ref052019.doc.LNKlnk
MD5:
SHA256:
3292WINWORD.EXEC:\Users\admin\Desktop\~$voice_ref052019.docpgc
MD5:
SHA256:
3292WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\pasmmm[1].exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
34
DNS requests
6
Threats
74

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2788
rher.exe
GET
131.188.40.189:80
http://131.188.40.189/tor/status-vote/current/consensus
DE
malicious
2788
rher.exe
GET
66.111.2.131:9030
http://66.111.2.131:9030/tor/status-vote/current/consensus
US
suspicious
2788
rher.exe
GET
180.150.226.99:80
http://180.150.226.99/tor/server/fp/365f393040aa2979dc01d102f5052cad048f42f7
KR
malicious
2788
rher.exe
GET
77.55.212.215:80
http://77.55.212.215/tor/server/fp/365f393040aa2979dc01d102f5052cad048f42f7
PL
suspicious
2788
rher.exe
GET
185.100.85.147:80
http://185.100.85.147/tor/server/fp/365f393040aa2979dc01d102f5052cad048f42f7
RO
suspicious
2788
rher.exe
GET
179.48.248.17:80
http://179.48.248.17/tor/server/fp/86cdd0d92ab972538416a382d99666736cddf141
CR
suspicious
2788
rher.exe
GET
51.15.56.122:80
http://51.15.56.122/tor/server/fp/9ac272d5c5bf479b56f062b91b89d6fe3740185d
NL
suspicious
2788
rher.exe
GET
95.216.14.222:80
http://95.216.14.222/tor/server/fp/86cdd0d92ab972538416a382d99666736cddf141
DE
suspicious
2788
rher.exe
GET
171.25.193.78:80
http://171.25.193.78/tor/server/fp/f98e806a87f0f7306f17199fd704782d3634d4af
SE
suspicious
2788
rher.exe
GET
200.122.181.101:80
http://200.122.181.101/tor/server/fp/f6f59b64b2494f29899e8072bcb0e6b3e070a917
CR
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2788
rher.exe
185.100.85.147:80
Flokinet Ltd
RO
suspicious
2788
rher.exe
185.163.45.212:443
MivoCloud SRL
MD
suspicious
95.216.14.222:80
Hetzner Online GmbH
DE
suspicious
2788
rher.exe
179.48.248.17:80
Racknation S.A.
CR
suspicious
2788
rher.exe
129.6.15.28:13
time-a.nist.gov
National Bureau of Standards
US
unknown
2788
rher.exe
88.196.252.84:443
Telia Eesti AS
EE
suspicious
2788
rher.exe
51.15.56.122:80
Online S.a.s.
NL
suspicious
2788
rher.exe
185.22.153.24:443
LLC Baxet
RU
unknown
2788
rher.exe
171.25.193.78:80
Foreningen for digitala fri- och rattigheter
SE
suspicious
2788
rher.exe
200.122.181.101:80
RADIOGRAFICA COSTARRICENSE
CR
suspicious

DNS requests

Domain
IP
Reputation
kentona.su
  • 47.245.58.124
malicious
api.ipify.org
  • 54.243.147.226
shared
time-a.nist.gov
  • 129.6.15.28
whitelisted

Threats

PID
Process
Class
Message
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2788
rher.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 122
2788
rher.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 550
2788
rher.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2788
rher.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2788
rher.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2788
rher.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2788
rher.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
No debug info