File name:

SHIPPING DOCUMENTS 03 21 2019.PDF.Z

Full analysis: https://app.any.run/tasks/cc629681-abf7-46f2-b659-fd95a4855171
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: March 21, 2019, 12:21:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
rat
remcos
keylogger
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

8C4A748B0179DB4D2FCE7393745ABC53

SHA1:

806EFFFC4155285A1E418F59C171006F43C2D30F

SHA256:

43FC843B3960612E474AD0E9FD6270E4A298BD8820E1470763D0C8C54728CB1D

SSDEEP:

12288:dAbfuNhQ2+5B92dQBWd4JlvQbCEIwmSUktLe3ptHQJs1LJdR+eNr+XmhfKIt62Jr:ybfEO2+Z2dQBWdcvQeTnSUkepFQOR+eh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 928)
      • bns.exe (PID: 696)
      • bns.exe (PID: 4016)
    • Detected logs from REMCOS RAT

      • RegSvcs.exe (PID: 2672)
    • Changes the autorun value in the registry

      • bns.exe (PID: 4016)
    • REMCOS RAT was detected

      • RegSvcs.exe (PID: 2672)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 928)
      • WinRAR.exe (PID: 1844)
    • Drop AutoIt3 executable file

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 928)
    • Application launched itself

      • bns.exe (PID: 696)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 2672)
    • Connects to unusual port

      • RegSvcs.exe (PID: 2672)
    • Writes files like Keylogger logs

      • RegSvcs.exe (PID: 2672)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 928)
      • bns.exe (PID: 696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe shipping documents 03 21 2019.exe bns.exe no specs bns.exe #REMCOS regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
696"C:\Users\admin\AppData\Local\Temp\14404544\bns.exe" bfm=gse C:\Users\admin\AppData\Local\Temp\14404544\bns.exeSHIPPING DOCUMENTS 03 21 2019.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\14404544\bns.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
928"C:\Users\admin\AppData\Local\Temp\Rar$EXa1844.39425\SHIPPING DOCUMENTS 03 21 2019.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1844.39425\SHIPPING DOCUMENTS 03 21 2019.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1844.39425\shipping documents 03 21 2019.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1844"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SHIPPING DOCUMENTS 03 21 2019.PDF.Z.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
2672"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
bns.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
4016C:\Users\admin\AppData\Local\Temp\14404544\bns.exe C:\Users\admin\AppData\Local\Temp\14404544\JJXOOC:\Users\admin\AppData\Local\Temp\14404544\bns.exe
bns.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\14404544\bns.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
Total events
799
Read events
779
Write events
20
Delete events
0

Modification events

(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1844) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SHIPPING DOCUMENTS 03 21 2019.PDF.Z.rar
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
56
Unknown types
0

Dropped files

PID
Process
Filename
Type
1844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1844.39425\SHIPPING DOCUMENTS 03 21 2019.exeexecutable
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\hnv.icotext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\wdu.txttext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\pgq.jpgtext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\ina.jpgtext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\bfm=gsetext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\hno.dattext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\nto.bmptext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\img.icmtext
MD5:
SHA256:
928SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\FileConstants.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
15
Threats
7

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2672
RegSvcs.exe
105.112.33.61:2404
plus11.duckdns.org
Celtel Nigeria Limited t.a ZAIN
NG
unknown
2672
RegSvcs.exe
105.112.37.181:2404
plus12.duckdns.org
Celtel Nigeria Limited t.a ZAIN
NG
malicious

DNS requests

Domain
IP
Reputation
plus11.duckdns.org
  • 105.112.33.61
malicious
plus12.duckdns.org
  • 105.112.37.181
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
plus11.ddns.net
  • 105.112.33.61
malicious
plus11.hopto.org
  • 105.112.33.61
malicious

Threats

PID
Process
Class
Message
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1072
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info