File name: | Contract#4115.iso |
Full analysis: | https://app.any.run/tasks/8ccd8e73-383c-4bb7-9562-34a418f3ef33 |
Verdict: | Malicious activity |
Threats: | Qbot is a banking Trojan — a malware designed to collect banking information from victims. Qbot targets organizations mostly in the US. It is equipped with various sophisticated evasion and info-stealing functions and worm-like functionality, and a strong persistence mechanism. |
Analysis date: | October 04, 2022, 22:49:01 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-iso9660-image |
File info: | ISO 9660 CD-ROM filesystem data 'CD_ROM' |
MD5: | 255E8EB50654B3413D3025AB46C112C7 |
SHA1: | BBAFF6350C529B92BD6030B010D5F9698A0F6E7B |
SHA256: | 5140F0D1ED4BF989558F4DB7E1F385AE4DE5E9082E7203F36505E3F6BE4FD728 |
SSDEEP: | 24576:X2j1do5WFEJ4B38MPwFOHrwcwjHmvwiK7Jb0y/cT5SL8uj3HH:X5lJI3BwFOHrwcwjHmvwiKb1/cT5S53n |
.iso | | | ISO 9660 CD image (27.6) |
---|---|---|
.atn | | | Photoshop Action (27.1) |
.gmc | | | Game Music Creator Music (6.1) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3232 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Contract#4115.iso" | C:\Program Files\WinRAR\WinRAR.exe | Explorer.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
3884 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\system32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211) Modules
| |||||||||||||||
1488 | C:\Windows\Explorer.EXE | C:\Windows\Explorer.EXE | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1388 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Contract#4115\publish\millivoltAuthentic.vbs" | C:\Windows\System32\WScript.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
3820 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\Contract#4115\publish\muscularityPearlwort.cmd" rund" | C:\Windows\system32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2084 | rundll32 publish\adversary.dat,DllRegisterServer | C:\Windows\system32\rundll32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3260 | "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\Contract#4115\publish\adversary.dll | C:\Windows\system32\rundll32.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
416 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Contract#4115\publish\millivoltAuthentic.vbs" | C:\Windows\System32\WScript.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
1568 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\Contract#4115\publish\muscularityPearlwort.cmd" rund" | C:\Windows\system32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2200 | rundll32 publish\adversary.dat,DllRegisterServer | C:\Windows\system32\rundll32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
3232 | WinRAR.exe | C:\Users\admin\Desktop\Contract#4115\Contract.lnk | lnk | |
MD5:8D89AD1A6E4A5BDC87EA50243C52A285 | SHA256:CCCE762623F3769E4587168540E7C734D4A3F2703FAE0A3671A7D0ACAEC4CDB9 | |||
3232 | WinRAR.exe | C:\Users\admin\Desktop\Contract#4115\publish\muscularityPearlwort.cmd | text | |
MD5:4F44A509D0D4D6289196D007A98E09B0 | SHA256:D813CF52ADAA76F61A01D2F48CB9F2565011F52860E57242A8A20BA2E9FF0CC2 | |||
1488 | Explorer.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Contract#4115.iso.lnk | lnk | |
MD5:6DB4048C5C8100B124C3512FEC97C712 | SHA256:5BCD02CB1C7B4B24A5E055C8B61118826CC31DA8EE67453E305B204EF78DF8A5 | |||
1488 | Explorer.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-ms | automaticdestinations-ms | |
MD5:ED2DA4E4892D6FF901787C7BF8EE653C | SHA256:37E27D4F8C0EA5AF5E2A0B6838C78215DBF19192F87715377A655B936DCC35DB | |||
1488 | Explorer.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms | automaticdestinations-ms | |
MD5:388C0ACDE4B472D8FE866359B3BDEF45 | SHA256:0331064CB3EED00A671603438A1D3A3D3EFB6D9EAC84194AEE6D9E08543A88C1 | |||
3232 | WinRAR.exe | C:\Users\admin\Desktop\Contract#4115\publish\millivoltAuthentic.vbs | text | |
MD5:9F87D3709936AC2566304FEE09CC5BF5 | SHA256:F3ADF5363951C623CD8A456F06C1EBCAEBB0E344383C45D4CB434C7D38F77D1F | |||
3232 | WinRAR.exe | C:\Users\admin\Desktop\Contract#4115\publish\purge.jpg | image | |
MD5:0B9167D578DDD702BB820640ED0F1A95 | SHA256:A11B700BABDC7B22BDAA833790716B432E82C9E196AAAAB344BD6D4EFEB7E94C | |||
1488 | Explorer.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\millivoltAuthentic.vbs.lnk | lnk | |
MD5:3E1BF9F7223C5DBC42D0FAD3CB255553 | SHA256:68F9326895ED9C63D7F7158AE28A23E497AC10832477827589B36A27DC05F2F1 | |||
3232 | WinRAR.exe | C:\Users\admin\Desktop\Contract#4115\publish\grandparents.txt | text | |
MD5:045925086490CB719CECC322E1B05603 | SHA256:9FE812C674791B472E17F062C9F94200D558FC6FC85F851CCE0E06B4EECF3EEF | |||
1488 | Explorer.EXE | C:\Users\admin\Desktop\Contract#4115\publish\adversary.dll | executable | |
MD5:30F49310CDDD30D2EE78F3CE0AC99CF3 | SHA256:E59E68973EE13A5A7525E73E48D6837AB85C9C3B129FB8DF9B9519C6B3EBA472 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 192.168.100.2:53 | — | — | — | whitelisted |
Domain | IP | Reputation |
---|---|---|
www.microsoft.com |
| whitelisted |