analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

6306868794.bin.zip

Full analysis: https://app.any.run/tasks/b6bb7953-73ef-4365-ae20-a7be063aa48a
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: September 11, 2019, 08:31:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
opendir
ransomware
stop
rat
azorult
loader
.meds
meds
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B63A1D3001CC1A5BCC2104ECB8EB5D53

SHA1:

D04EBC24CC00EA67870C9EEF92DE7C5ADF4C65D5

SHA256:

56B423E8F7E99CE24A6250507B1AC9E4476837A32F0518EBC5474EAEB9ECAA78

SSDEEP:

12288:OZVZvijaJxMV5DH6Asfuez5GxNmHUguf4OkEokPhuDIX7dCjBb3RcN7VI:2iGJxMV5ThsGeFykCf4OIiusXhCh3RcM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
      • 4.exe (PID: 3388)
    • Changes the autorun value in the registry

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Loads the Task Scheduler COM API

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • STOP was detected

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • AZORULT was detected

      • 4.exe (PID: 3388)
    • Connects to CnC server

      • 4.exe (PID: 3388)
    • Downloads executable files from the Internet

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2736)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • Changes tracing settings of the file or console

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Uses ICACLS.EXE to modify access control list

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Creates files in the user directory

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Application launched itself

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
  • INFO

    • Manual execution by user

      • rundll32.exe (PID: 2252)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286
ZipUncompressedSize: 1007104
ZipCompressedSize: 715335
ZipCRC: 0xe53107ea
ZipModifyDate: 2019:09:10 17:44:24
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe rundll32.exe no specs c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe icacls.exe no specs #STOP c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe #AZORULT 4.exe

Process information

PID
CMD
Path
Indicators
Parent process
2736"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\6306868794.bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2252"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286exeC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3668"C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe" C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3700icacls "C:\Users\admin\AppData\Local\d176e5c1-96af-483e-8645-568277966c39" /deny *S-1-1-0:(OI)(CI)(DE,DC)C:\Windows\system32\icacls.exec2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2572"C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe" --Admin IsNotAutoStart IsNotTaskC:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Integrity Level:
HIGH
3388"C:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exe" C:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exe
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Total events
998
Read events
909
Write events
89
Delete events
0

Modification events

(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2736) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\6306868794.bin.zip
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
3
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\geo[1].json
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\geo[1].json
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\get[1].php
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\4[1].exe
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exeexecutable
MD5:37CC975A1257BF260308FE30E1D3E7EE
SHA256:CBC5C6867C6CAEAA956CCF8828D1618422DC87B21FD3A78653A0C601B29533A8
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\SystemID\PersonalID.txttext
MD5:A3FFFCE7F3883000803421BF5B26E1B0
SHA256:7E5F6DFE2DCB1EF15B593F1B4A0C53FC9E2E96A940156DAB9D6283AC40809D50
2736WinRAR.exeC:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286executable
MD5:E15E3CFA542459E8D87E8BFDF70A38A1
SHA256:C2716FCC735A4F1B9FCE29CB1DC20A26969B71F615E2B119E9680F015379D286
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\d176e5c1-96af-483e-8645-568277966c39\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeexecutable
MD5:E15E3CFA542459E8D87E8BFDF70A38A1
SHA256:C2716FCC735A4F1B9FCE29CB1DC20A26969B71F615E2B119E9680F015379D286
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
10
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin1.exe
US
html
223 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin2.exe
US
html
223 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/3.exe
US
html
214 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
200
8.208.13.6:80
http://dell1.ug/files/cost/4.exe
US
executable
228 Kb
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
200
8.208.13.6:80
http://dell1.ug/hosuhf37t5iqy3guygg6w4guiner/37tiuywgw/get.php?pid=2485E9F082250E269EA0EF635E0D382D&first=true
US
text
560 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin.exe
US
html
222 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/5.exe
US
html
214 b
malicious
3388
4.exe
POST
200
194.87.238.60:80
http://dell2.ug/1/index.php
RU
text
4 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
77.123.139.189:443
api.2ip.ua
Volia
UA
unknown
3668
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
77.123.139.189:443
api.2ip.ua
Volia
UA
unknown
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
8.208.13.6:80
dell1.ug
Level 3 Communications, Inc.
US
malicious
3388
4.exe
194.87.238.60:80
dell2.ug
JSC Mediasoft ekspert
RU
malicious

DNS requests

Domain
IP
Reputation
api.2ip.ua
  • 77.123.139.189
shared
dell1.ug
  • 8.208.13.6
malicious
dell2.ug
  • 194.87.238.60
  • 194.67.206.210
  • 149.154.71.140
  • 176.113.82.144
malicious

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET POLICY External IP Address Lookup DNS Query
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
1 ETPRO signatures available at the full report
No debug info