| download: | File_pass1234.7z |
| Full analysis: | https://app.any.run/tasks/bfbfd744-5e63-4aab-b337-f1834d648281 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 19, 2023, 08:31:42 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 228119EE4C65CB1007F6A059D9B9EA04 |
| SHA1: | FFF65D55391A3AABD4262886CBABF87F6F2600FD |
| SHA256: | 540B52866F994DC6C92ED34BB9E3D7F9ED6183CE5AD09DAA9C0704DA733AE060 |
| SSDEEP: | 98304:O3vnS3jwpt1B1ODe16f/dqDlvgYCrBBkTRuRs4hI5z:OKMnODe16f/dqZvawRuRjqz |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1440 | C:\Windows\system32\RAServer.exe /offerraupdate | C:\Windows\System32\raserver.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2448 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\File_pass1234.7z" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 2496 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb2448.551\File.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb2448.551\File.exe | WinRAR.exe | ||||||||||||
User: admin Company: MPC-HC Team Integrity Level: HIGH Description: MPC-HC (x64) Exit code: 0 Version: 1.9.23 (a8e9113b5) Modules
| |||||||||||||||
| 2508 | C:\Windows\system32\RAServer.exe /offerraupdate | C:\Windows\System32\raserver.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2740 | "C:\Users\admin\Desktop\File.exe" | C:\Users\admin\Desktop\File.exe | explorer.exe | ||||||||||||
User: admin Company: MPC-HC Team Integrity Level: HIGH Description: MPC-HC (x64) Exit code: 0 Version: 1.9.23 (a8e9113b5) Modules
| |||||||||||||||
| 2972 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb2448.551\File.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb2448.551\File.exe | — | WinRAR.exe | |||||||||||
User: admin Company: MPC-HC Team Integrity Level: MEDIUM Description: MPC-HC (x64) Exit code: 3221226540 Version: 1.9.23 (a8e9113b5) Modules
| |||||||||||||||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\14C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2448 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2448.551\File.exe | — | |
MD5:— | SHA256:— | |||
| 2448 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2448.1491\File.exe | — | |
MD5:— | SHA256:— | |||
| 2496 | File.exe | C:\Windows\System32\GroupPolicy\gpt.ini | text | |
MD5:39DFFC602ED934569F26BE44EC645814 | SHA256:B57A88E5B1ACF3A784BE88B87FA3EE1F0991CB7C1C66DA423F3595FFC6E0C5C2 | |||
| 2496 | File.exe | C:\Windows\System32\GroupPolicy\Machine\Registry.pol | binary | |
MD5:CDFD60E717A44C2349B553E011958B85 | SHA256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F | |||
| 2496 | File.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\0FJG430T.txt | text | |
MD5:1F53143555FF466F69C98B6ED18CE414 | SHA256:0F2C1F86DD11D68BA6C96534732AE8F57323124EAC967ECFD0CC1F626C908B87 | |||
| 2496 | File.exe | C:\Users\admin\Pictures\Minor Policy\7GYslHBw3ezh2EIVbi5ZRi2E.exe | executable | |
MD5:A80A71FA1BB88E7708609F4D287FD266 | SHA256:365CBD4B53AD81CD83207C6E760DF0BA183DECCB997C88EA9E46DA2F827C2056 | |||
| 2496 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\photo221[1].exe | executable | |
MD5:8BC0F9A464D40D9DF7D79790A414A0E0 | SHA256:BA78E7BD378AC34115266A5AB0543D6944723FCAD4C596DBA9A8BAB5968E9BB5 | |||
| 2496 | File.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:8AE33739D4BFFE20CBD2D8EB10A92406 | SHA256:1935F47FAC25B080267A029CFB3B7C99863D56E23D1E2463F7273DEDAB5F22AC | |||
| 2496 | File.exe | C:\Users\admin\Pictures\Minor Policy\DMztWI8DpbTKYm92dxw0rv89.exe | executable | |
MD5:EE0516A44D6E7CC5E2BEF2CA0E5CF461 | SHA256:8DC7D4261B9EA7463AE129A04C13BEB905D7A5722B03C90EA57E0A81C04F0880 | |||
| 2496 | File.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\BXR0X7MX.txt | text | |
MD5:E6249403B037D3941C71BB4140497313 | SHA256:9B9D05D7468FBD9B64A08E6F6D6909F63218664F47A3B126AD88CDC9892BA3EA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2496 | File.exe | HEAD | — | 194.169.175.124:80 | http://194.169.175.124:3002/ | US | — | — | malicious |
2496 | File.exe | GET | — | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
2496 | File.exe | HEAD | 200 | 83.97.73.131:80 | http://83.97.73.131/gallery/photo221.exe | unknown | — | — | malicious |
2496 | File.exe | GET | — | 83.97.73.131:80 | http://83.97.73.131/gallery/photo221.exe | unknown | — | — | malicious |
2496 | File.exe | HEAD | 200 | 188.114.97.3:80 | http://ji.jahhaega2qq.com/m/p0aw25.exe | US | — | — | malicious |
2496 | File.exe | GET | 200 | 188.114.97.3:80 | http://ji.jahhaega2qq.com/m/p0aw25.exe | US | executable | 417 Kb | malicious |
2496 | File.exe | POST | 200 | 208.67.104.60:80 | http://208.67.104.60/api/firegate.php | US | text | 108 b | malicious |
2496 | File.exe | POST | 200 | 208.67.104.60:80 | http://208.67.104.60/api/firegate.php | US | text | 108 b | malicious |
2496 | File.exe | GET | 200 | 163.123.143.4:80 | http://163.123.143.4/download/Service32.exe | unknown | executable | 5.11 Mb | malicious |
2496 | File.exe | GET | 200 | 45.9.74.80:80 | http://45.9.74.80/undoo.exe | SC | executable | 772 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2496 | File.exe | 208.67.104.60:80 | — | Delis LLC | US | malicious |
2496 | File.exe | 104.26.8.59:443 | api.myip.com | CLOUDFLARENET | US | suspicious |
2740 | File.exe | 94.142.138.113:80 | — | Network Management Ltd | RU | malicious |
2496 | File.exe | 172.67.75.163:443 | api.myip.com | CLOUDFLARENET | US | suspicious |
2496 | File.exe | 87.240.132.78:80 | vk.com | VKontakte Ltd | RU | suspicious |
2496 | File.exe | 87.240.129.133:80 | vk.com | VKontakte Ltd | RU | malicious |
2496 | File.exe | 87.240.132.67:80 | vk.com | VKontakte Ltd | RU | suspicious |
2496 | File.exe | 93.186.225.194:80 | vk.com | VKontakte Ltd | RU | suspicious |
Domain | IP | Reputation |
|---|---|---|
api.myip.com |
| suspicious |
teredo.ipv6.microsoft.com |
| whitelisted |
ipinfo.io |
| shared |
vk.com |
| whitelisted |
dns.msftncsi.com |
| shared |
hugersi.com |
| suspicious |
ji.jahhaega2qq.com |
| malicious |
bitbucket.org |
| shared |
bbuseruploads.s3.amazonaws.com |
| shared |
x.ss2.us |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2496 | File.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 39 |
2496 | File.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) |
2496 | File.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
2496 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2496 | File.exe | Generic Protocol Command Decode | SURICATA HTTP Unexpected Request body |
2496 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
2496 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2496 | File.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2496 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2496 | File.exe | Generic Protocol Command Decode | SURICATA HTTP Unexpected Request body |