File name:

6306868794.bin.zip

Full analysis: https://app.any.run/tasks/b6bb7953-73ef-4365-ae20-a7be063aa48a
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: September 11, 2019, 08:31:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
opendir
ransomware
stop
rat
azorult
loader
.meds
meds
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B63A1D3001CC1A5BCC2104ECB8EB5D53

SHA1:

D04EBC24CC00EA67870C9EEF92DE7C5ADF4C65D5

SHA256:

56B423E8F7E99CE24A6250507B1AC9E4476837A32F0518EBC5474EAEB9ECAA78

SSDEEP:

12288:OZVZvijaJxMV5DH6Asfuez5GxNmHUguf4OkEokPhuDIX7dCjBb3RcN7VI:2iGJxMV5ThsGeFykCf4OIiusXhCh3RcM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Application was dropped or rewritten from another process

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
      • 4.exe (PID: 3388)
    • Loads the Task Scheduler COM API

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • AZORULT was detected

      • 4.exe (PID: 3388)
    • Downloads executable files from the Internet

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • STOP was detected

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • Connects to CnC server

      • 4.exe (PID: 3388)
  • SUSPICIOUS

    • Changes tracing settings of the file or console

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Uses ICACLS.EXE to modify access control list

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2736)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 2572)
    • Application launched itself

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
    • Creates files in the user directory

      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
  • INFO

    • Manual execution by user

      • rundll32.exe (PID: 2252)
      • c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe (PID: 3668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2019:09:10 17:44:24
ZipCRC: 0xe53107ea
ZipCompressedSize: 715335
ZipUncompressedSize: 1007104
ZipFileName: c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe rundll32.exe no specs c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe icacls.exe no specs #STOP c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe #AZORULT 4.exe

Process information

PID
CMD
Path
Indicators
Parent process
2252"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286exeC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2572"C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe" --Admin IsNotAutoStart IsNotTaskC:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winhttp.dll
2736"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\6306868794.bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3388"C:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exe" C:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exe
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3668"C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe" C:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winhttp.dll
3700icacls "C:\Users\admin\AppData\Local\d176e5c1-96af-483e-8645-568277966c39" /deny *S-1-1-0:(OI)(CI)(DE,DC)C:\Windows\system32\icacls.exec2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
Total events
998
Read events
909
Write events
89
Delete events
0

Modification events

(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2736) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\6306868794.bin.zip
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2736) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
3
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\geo[1].json
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\geo[1].json
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\get[1].php
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\4[1].exe
MD5:
SHA256:
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\d176e5c1-96af-483e-8645-568277966c39\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeexecutable
MD5:E15E3CFA542459E8D87E8BFDF70A38A1
SHA256:C2716FCC735A4F1B9FCE29CB1DC20A26969B71F615E2B119E9680F015379D286
2736WinRAR.exeC:\Users\admin\Desktop\c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286executable
MD5:E15E3CFA542459E8D87E8BFDF70A38A1
SHA256:C2716FCC735A4F1B9FCE29CB1DC20A26969B71F615E2B119E9680F015379D286
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Local\a8b9b2db-96a0-49c1-a068-9e8cef2dbf18\4.exeexecutable
MD5:
SHA256:
2572c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\SystemID\PersonalID.txttext
MD5:
SHA256:
3668c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
10
DNS requests
3
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
200
8.208.13.6:80
http://dell1.ug/files/cost/4.exe
US
executable
228 Kb
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/3.exe
US
html
214 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin.exe
US
html
222 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin1.exe
US
html
223 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/5.exe
US
html
214 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
200
8.208.13.6:80
http://dell1.ug/hosuhf37t5iqy3guygg6w4guiner/37tiuywgw/get.php?pid=2485E9F082250E269EA0EF635E0D382D&first=true
US
text
560 b
malicious
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
GET
404
8.208.13.6:80
http://dell1.ug/files/cost/updatewin2.exe
US
html
223 b
malicious
3388
4.exe
POST
200
194.87.238.60:80
http://dell2.ug/1/index.php
RU
text
4 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3668
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
77.123.139.189:443
api.2ip.ua
Volia
UA
unknown
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
77.123.139.189:443
api.2ip.ua
Volia
UA
unknown
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
8.208.13.6:80
dell1.ug
Level 3 Communications, Inc.
US
malicious
3388
4.exe
194.87.238.60:80
dell2.ug
JSC Mediasoft ekspert
RU
malicious

DNS requests

Domain
IP
Reputation
api.2ip.ua
  • 77.123.139.189
shared
dell1.ug
  • 8.208.13.6
malicious
dell2.ug
  • 194.87.238.60
  • 194.67.206.210
  • 149.154.71.140
  • 176.113.82.144
malicious

Threats

PID
Process
Class
Message
1060
svchost.exe
A Network Trojan was detected
ET POLICY External IP Address Lookup DNS Query
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Potential Dridex.Maldoc Minimal Executable Request
2572
c2716fcc735a4f1b9fce29cb1dc20a26969b71f615e2b119e9680f015379d286.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
1 ETPRO signatures available at the full report
No debug info