analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

asd.zip

Full analysis: https://app.any.run/tasks/4ecf695d-d9c3-4b7a-956f-bbef273391ef
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 19, 2019, 11:56:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
phorpiex
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F8B588E89E952D86D784653EFCE78F3C

SHA1:

CC4D9F15A321F68C8CBAF90E8F0C292B4F943A77

SHA256:

5A29A80E99884FFC14968BCA48A025AC4F88A3AD59774436B911EFDACF9B8E87

SSDEEP:

6144:zqB7J+VM7VlposGX/ibNyle8+4ACpHDOGvygU8zJ4z0F:gV+e7VlZGqEp+opiJKf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 123.exe (PID: 2844)
      • sysinii.exe (PID: 3600)
      • 22411.exe (PID: 3696)
    • Changes the autorun value in the registry

      • 123.exe (PID: 2844)
    • PHORPIEX was detected

      • sysinii.exe (PID: 3600)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 123.exe (PID: 2844)
      • sysinii.exe (PID: 3600)
    • Starts itself from another location

      • 123.exe (PID: 2844)
      • sysinii.exe (PID: 3600)
    • Creates files in the user directory

      • sysinii.exe (PID: 3600)
    • Reads Internet Cache Settings

      • sysinii.exe (PID: 3600)
  • INFO

    • Manual execution by user

      • 123.exe (PID: 2844)
      • NOTEPAD.EXE (PID: 2872)
      • explorer.exe (PID: 3580)
      • WinRAR.exe (PID: 364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: d9edee0541b9a5baf2cb2b1915aef1d034efd4edd4b3c030b508669da1e2aaf2
ZipUncompressedSize: 428032
ZipCompressedSize: 215278
ZipCRC: 0x00000000
ZipModifyDate: 1980:00:00 00:00:00
ZipCompression: Unknown (99)
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs 123.exe #PHORPIEX sysinii.exe 22411.exe no specs explorer.exe no specs notepad.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2852"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\asd.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2844"C:\Users\admin\Desktop\123.exe" C:\Users\admin\Desktop\123.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DTConverter Application
Exit code:
0
Version:
2.1
3600C:\Users\admin\1528814089\sysinii.exeC:\Users\admin\1528814089\sysinii.exe
123.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DTConverter Application
Version:
2.1
3696C:\Users\admin\AppData\Local\Temp\22411.exeC:\Users\admin\AppData\Local\Temp\22411.exesysinii.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DTConverter Application
Exit code:
0
Version:
2.1
3580"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2872"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Roaming\winsvcs.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
364"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\asd.zip" C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Total events
979
Read events
916
Write events
63
Delete events
0

Modification events

(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2852) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\asd.zip
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2852) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
2
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2852WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2852.20224\d9edee0541b9a5baf2cb2b1915aef1d034efd4edd4b3c030b508669da1e2aaf2
MD5:
SHA256:
3600sysinii.exeC:
MD5:
SHA256:
364WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb364.33451\d9edee0541b9a5baf2cb2b1915aef1d034efd4edd4b3c030b508669da1e2aaf2
MD5:
SHA256:
3600sysinii.exeC:\Users\admin\AppData\Local\Temp\22411.exebinary
MD5:A68EAA0662E4A5E3153E1247FA47DF72
SHA256:BAE3517E024988E722E24B678E6EF9817542E3BCC38959DFF5C1238AB3CA79EF
3600sysinii.exeC:\Users\admin\AppData\Local\Temp\33076.exebinary
MD5:85570676E8CBEE02571AA011F60EAC50
SHA256:9EB3E8D48791074DA1BB296CEBB8AEC890E165A4307E219380D15D90D80002DC
3600sysinii.exeC:\Users\admin\AppData\Local\Temp\17135.exebinary
MD5:85570676E8CBEE02571AA011F60EAC50
SHA256:9EB3E8D48791074DA1BB296CEBB8AEC890E165A4307E219380D15D90D80002DC
3600sysinii.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\3[1]binary
MD5:85570676E8CBEE02571AA011F60EAC50
SHA256:9EB3E8D48791074DA1BB296CEBB8AEC890E165A4307E219380D15D90D80002DC
3600sysinii.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\2[1]binary
MD5:A68EAA0662E4A5E3153E1247FA47DF72
SHA256:BAE3517E024988E722E24B678E6EF9817542E3BCC38959DFF5C1238AB3CA79EF
2844123.exeC:\Users\admin\1528814089\sysinii.exeexecutable
MD5:36A8BF060F86867226C4268B41965E48
SHA256:D9EDEE0541B9A5BAF2CB2B1915AEF1D034EFD4EDD4B3C030B508669DA1E2AAF2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
5
DNS requests
120
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3600
sysinii.exe
GET
7.5.0.4:80
http://thaus.top/t.php?new=1
US
malicious
3600
sysinii.exe
GET
185.176.27.132:80
http://185.176.27.132/3
GB
malicious
3600
sysinii.exe
GET
185.176.27.132:80
http://185.176.27.132/2
GB
malicious
3600
sysinii.exe
GET
7.5.0.4:80
http://thaus.top/1
US
malicious
3600
sysinii.exe
GET
200
185.176.27.132:80
http://185.176.27.132/3
GB
binary
1.28 Mb
malicious
3600
sysinii.exe
GET
200
185.176.27.132:80
http://185.176.27.132/2
GB
binary
418 Kb
malicious
3600
sysinii.exe
GET
404
185.176.27.132:80
http://185.176.27.132/6
GB
html
178 b
malicious
3600
sysinii.exe
GET
404
185.176.27.132:80
http://185.176.27.132/t.php?new=1
GB
html
178 b
malicious
3600
sysinii.exe
GET
404
185.176.27.132:80
http://185.176.27.132/8
GB
html
178 b
malicious
3600
sysinii.exe
GET
404
185.176.27.132:80
http://185.176.27.132/5
GB
html
178 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3600
sysinii.exe
185.176.27.132:80
GB
malicious
3600
sysinii.exe
7.5.0.4:80
thaus.top
US
suspicious

DNS requests

Domain
IP
Reputation
urusurofhsorhfuuhr.su
unknown
aeifaeifhutuhuhusr.su
unknown
rzhsudhugugfugugsr.su
unknown
bfagzzezgaegzgfair.su
unknown
eaeuafhuaegfugeudr.su
unknown
aeufuaehfiuehfuhfr.su
unknown
daedagheauehfuuhfr.su
unknown
aeoughaoheguaoehdr.su
unknown
eguaheoghouughahsr.su
unknown
huaeokaefoaeguaehr.su
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
3600
sysinii.exe
Misc Attack
ET DROP Dshield Block Listed Source group 1
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
4 ETPRO signatures available at the full report
No debug info