analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.zip

Full analysis: https://app.any.run/tasks/159a8b5b-0029-4d72-b500-89136743d4d2
Verdict: Malicious activity
Analysis date: July 12, 2020, 19:28:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

2448D32F7822C7E2568F98CF471ED4CC

SHA1:

26E131BDB54E83B44584982E328243DE0E1C9D99

SHA256:

561EA5C9BA256F8A217B12DE76412EA35A6902D0919669649CED334E920C62A0

SSDEEP:

12288:pWTL7So2EcqqkL0VHxd7KqJSiEs/CUkzF2CtVQpkE:pWX+XpqqRt7XJSDUkZdaj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 2352)
      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 3644)
    • Actions looks like stealing of personal data

      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 2352)
  • SUSPICIOUS

    • Application launched itself

      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 3644)
    • Reads Environment values

      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 2352)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 184)
  • INFO

    • Manual execution by user

      • f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe (PID: 3644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76
ZipUncompressedSize: 613888
ZipCompressedSize: 485274
ZipCRC: 0x886346a9
ZipModifyDate: 2020:07:11 12:32:26
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe no specs f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe

Process information

PID
CMD
Path
Indicators
Parent process
184"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3644"C:\Users\admin\Desktop\f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe" C:\Users\admin\Desktop\f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exeexplorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
HotelManagementSystemRoom
Exit code:
0
Version:
1.0.0.0
2352"{path}"C:\Users\admin\Desktop\f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe
f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
HotelManagementSystemRoom
Version:
1.0.0.0
Total events
525
Read events
487
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
184WinRAR.exeC:\Users\admin\Desktop\f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76executable
MD5:5989BAA4AB5E9DBD5B44A166385DA339
SHA256:F4119900C427B8DB4429DE992F650B4A833A31DF5AA565BC2614F2D4E49D5B76
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2352
f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe
67.21.94.15:587
mail.mehatinfo.com
Sharktech
US
suspicious

DNS requests

Domain
IP
Reputation
mail.mehatinfo.com
  • 67.21.94.15
suspicious

Threats

PID
Process
Class
Message
2352
f4119900c427b8db4429de992f650b4a833a31df5aa565bc2614f2d4e49d5b76.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info