analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PCToaster.bin.zip

Full analysis: https://app.any.run/tasks/0ffa12dd-7f59-47c4-b2f8-c54eccc8d174
Verdict: Malicious activity
Analysis date: July 12, 2020, 14:24:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

777B743BF77996D93708078516BCBFB0

SHA1:

D4B84EF7349E01DD89DFF3B3C1EC611ADF159C66

SHA256:

598ADEE81BAA3D9A1E22F56037A64758E0BEF6C1D1AF7FEFDCA031DF8EA11C37

SSDEEP:

1536:0C5bWsBUBfMHMPJVlo8LSy0IwzIoAblEZB6rxw:0AUV0uO7BA5EZEW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PCToaster.exe (PID: 2232)
      • PCToaster.exe (PID: 3444)
  • SUSPICIOUS

    • Executed via COM

      • vdsldr.exe (PID: 2400)
    • Executes JAVA applets

      • PCToaster.exe (PID: 2232)
    • Low-level read access rights to disk partition

      • vds.exe (PID: 3160)
    • Uses ATTRIB.EXE to modify file attributes

      • javaw.exe (PID: 1860)
    • Executed as Windows Service

      • vds.exe (PID: 3160)
  • INFO

    • Manual execution by user

      • PCToaster.exe (PID: 3444)
      • PCToaster.exe (PID: 2232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: PCToaster.bin
ZipUncompressedSize: 421699
ZipCompressedSize: 62375
ZipCRC: 0xbb833465
ZipModifyDate: 2020:05:15 12:24:12
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
10
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs pctoaster.exe no specs pctoaster.exe javaw.exe no specs attrib.exe no specs diskpart.exe no specs vdsldr.exe no specs vds.exe no specs takeown.exe no specs takeown.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3276"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\PCToaster.bin.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3444"C:\Users\admin\Desktop\PCToaster.exe" C:\Users\admin\Desktop\PCToaster.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2232"C:\Users\admin\Desktop\PCToaster.exe" C:\Users\admin\Desktop\PCToaster.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
1860"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\Desktop\PCToaster.exe"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exePCToaster.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
2888attrib +h C:\Users\admin\Desktop\scr.txtC:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3660diskpart /s C:\Users\admin\Desktop\scr.txtC:\Windows\system32\diskpart.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DiskPart
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2400C:\Windows\System32\vdsldr.exe -EmbeddingC:\Windows\System32\vdsldr.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Virtual Disk Service Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3160C:\Windows\System32\vds.exeC:\Windows\System32\vds.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Virtual Disk Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2716takeown /f V:\Boot /rC:\Windows\system32\takeown.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1352takeown /f V:\Recovery /rC:\Windows\system32\takeown.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
355
Read events
333
Write events
22
Delete events
0

Modification events

(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3276) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3276) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\PCToaster.bin.zip
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3276WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3276.24338\PCToaster.bin
MD5:
SHA256:
1860javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:2A9DBC86693595F45FABFBE7CA9ACA74
SHA256:CDDC189C3271B4C96A13666CD815DE3115ED26E7C938EB6ECCB3EE4DF5D365AA
1860javaw.exeC:\Users\admin\Desktop\scr.txttext
MD5:AD1869D6F0B2B809394605D3E73EEB74
SHA256:7E9CDE40095F2A877375CB30FECD4F64CF328E3AB11BAED5242F73CBB94BD394
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info