analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

О заказе.zip

Full analysis: https://app.any.run/tasks/6ca8b778-62f5-442e-915c-5706e884013c
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 17, 2019, 13:03:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
troldesh
shade
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

1C4433ADB5200E1115C17648174C1B73

SHA1:

23E5AF7C6452A750090D9F5349E66AE8AF529179

SHA256:

4756557BC6760532A36C8708E7EB528A1B3565A95F72BB12281A6EC373EEB1A1

SSDEEP:

192:zMOWViDAdeV08CxpJWLC/K9kytDBAro6Bw2+wgE:zMOGisde62LC/mIrLZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • radABC99.tmp (PID: 3084)
    • Changes the autorun value in the registry

      • radABC99.tmp (PID: 3084)
    • TROLDESH was detected

      • radABC99.tmp (PID: 3084)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 2812)
      • WinRAR.exe (PID: 3736)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 4076)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 4076)
    • Executes scripts

      • WinRAR.exe (PID: 1876)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3320)
      • radABC99.tmp (PID: 3084)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2820)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3320)
    • Creates files in the program directory

      • radABC99.tmp (PID: 3084)
  • INFO

    • Manual execution by user

      • OUTLOOK.EXE (PID: 4076)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 4076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0003
ZipCompression: Deflated
ZipModifyDate: 2019:07:17 15:47:04
ZipCRC: 0x039b8b0a
ZipCompressedSize: 7424
ZipUncompressedSize: 7440
ZipFileName: 4493cefcba6d7955c53d6b3b53df4b69.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
8
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs outlook.exe winrar.exe no specs winrar.exe no specs wscript.exe cmd.exe no specs #TROLDESH radabc99.tmp

Process information

PID
CMD
Path
Indicators
Parent process
2812"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\О заказе.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2744"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIb2812.14763\4493cefcba6d7955c53d6b3b53df4b69.zipC:\Program Files\WinRAR\WinRAR.exeWinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
4076"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\4493cefcba6d7955c53d6b3b53df4b69.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3736"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2LBNCU50\Заказ.zip"C:\Program Files\WinRAR\WinRAR.exeOUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1876"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa3736.21538\docx.zipC:\Program Files\WinRAR\WinRAR.exeWinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3320"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa1876.22256\Информация о заказе.2019-07-16.docx.js" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2820"C:\Windows\System32\cmd.exe" /c C:\Users\admin\AppData\Local\Temp\radABC99.tmpC:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3084C:\Users\admin\AppData\Local\Temp\radABC99.tmpC:\Users\admin\AppData\Local\Temp\radABC99.tmp
cmd.exe
User:
admin
Company:
QIHU 360 SOFTWARE CO. LIMITED
Integrity Level:
MEDIUM
Description:
360 Patch Up
Version:
8, 6, 0, 1003
Total events
3 450
Read events
2 951
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
4
Text files
26
Unknown types
1

Dropped files

PID
Process
Filename
Type
2744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2744.16025\4493cefcba6d7955c53d6b3b53df4b69
MD5:
SHA256:
4076OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRBF75.tmp.cvr
MD5:
SHA256:
4076OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2LBNCU50\Заказ (2).zip\:Zone.Identifier:$DATA
MD5:
SHA256:
3084radABC99.tmpC:\Users\admin\AppData\Local\Temp\6893A5D897\state.tmp
MD5:
SHA256:
4076OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:C2B9AFFAA2C938742A149E5FA915830A
SHA256:84E642698563426EC2E7DB004D9C7A446BA1E9D962B872D31183F2745EAC0F34
2812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2812.14763\4493cefcba6d7955c53d6b3b53df4b69.zipcompressed
MD5:EE53EC89058C1D23ABBDF77B1CD4D9F1
SHA256:C2F2FD69FDD932E98BCAF8DBD30CB61EA77B9AE5FB221F433DBBCF0FA8D45FF0
3736WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3736.21538\docx.zipcompressed
MD5:DF33FFBA23A23B2CDBA91DB92B32B245
SHA256:62ACB0EB434D17842199C6EBB01FD47667FB7456708199290C1A2AF90F552399
3320WScript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\1c[1].jpgexecutable
MD5:22279FE757AD953E3EB1C22291AD2E18
SHA256:DD1690BBC16C2B44DA6F2291E14AB3635F90291A34109744A05E2C82489B3555
3320WScript.exeC:\Users\admin\AppData\Local\Temp\radABC99.tmpexecutable
MD5:22279FE757AD953E3EB1C22291AD2E18
SHA256:DD1690BBC16C2B44DA6F2291E14AB3635F90291A34109744A05E2C82489B3555
3084radABC99.tmpC:\ProgramData\Windows\csrss.exeexecutable
MD5:22279FE757AD953E3EB1C22291AD2E18
SHA256:DD1690BBC16C2B44DA6F2291E14AB3635F90291A34109744A05E2C82489B3555
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4076
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3320
WScript.exe
69.161.145.22:443
jenniferwaugh.com
In2net Network Inc.
CA
unknown
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3084
radABC99.tmp
208.83.223.34:80
Applied Operations, LLC
US
malicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
jenniferwaugh.com
  • 69.161.145.22
unknown

Threats

No threats detected
No debug info