URL:

https://www.mediafire.com/file/psah91yvt6ux3yv/Pago_vencido.7z/file

Full analysis: https://app.any.run/tasks/8f122873-2b7f-4d5d-8af2-8ee9469cdca8
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: March 31, 2020, 11:49:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
netwire
rat
Indicators:
MD5:

B1D63599F99C828B4F7331656EE07DC0

SHA1:

E6E21724F80B247C0BB372DE949F5BF57CD34581

SHA256:

5ABCDEF83E59E3927C59E85950E5A395DFE60C28E16D250824486B084D06EAEB

SSDEEP:

3:N8DSLw3eGUonPFTKO7pHg:2OLw3eGxTK8pA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Pago vencido.exe (PID: 3196)
      • Pago vencido.exe (PID: 3036)
      • Host.exe (PID: 1724)
      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 2944)
      • Pago vencido.exe (PID: 2784)
      • Pago vencido.exe (PID: 3580)
    • Changes the autorun value in the registry

      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 3580)
    • NETWIRE was detected

      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 3580)
    • Connects to CnC server

      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 3580)
      • Host.exe (PID: 3780)
    • Changes settings of System certificates

      • Pago vencido.exe (PID: 3036)
      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 3580)
      • Pago vencido.exe (PID: 2792)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • Pago vencido.exe (PID: 3036)
      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 3580)
    • Application launched itself

      • Pago vencido.exe (PID: 3196)
      • Host.exe (PID: 1724)
      • Pago vencido.exe (PID: 2944)
      • Pago vencido.exe (PID: 2784)
    • Creates files in the user directory

      • Pago vencido.exe (PID: 3036)
      • Pago vencido.exe (PID: 2792)
    • Executable content was dropped or overwritten

      • Pago vencido.exe (PID: 3036)
      • msdt.exe (PID: 2220)
      • WinRAR.exe (PID: 3912)
      • WinRAR.exe (PID: 572)
    • Starts itself from another location

      • Pago vencido.exe (PID: 3036)
    • Executed via COM

      • sdiagnhost.exe (PID: 2696)
    • Uses IPCONFIG.EXE to discover IP address

      • sdiagnhost.exe (PID: 2696)
    • Adds / modifies Windows certificates

      • Pago vencido.exe (PID: 3036)
      • Host.exe (PID: 3780)
      • Pago vencido.exe (PID: 2792)
      • Pago vencido.exe (PID: 3580)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2564)
      • iexplore.exe (PID: 3252)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2564)
    • Application launched itself

      • iexplore.exe (PID: 2564)
    • Changes internet zones settings

      • iexplore.exe (PID: 2564)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3252)
    • Creates files in the user directory

      • iexplore.exe (PID: 2564)
      • iexplore.exe (PID: 3252)
      • opera.exe (PID: 2244)
    • Manual execution by user

      • opera.exe (PID: 2244)
      • explorer.exe (PID: 3852)
      • Pago vencido.exe (PID: 2784)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2564)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2564)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
19
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start iexplore.exe iexplore.exe msdt.exe sdiagnhost.exe no specs ipconfig.exe no specs route.exe no specs makecab.exe no specs winrar.exe pago vencido.exe no specs pago vencido.exe host.exe no specs #NETWIRE host.exe pago vencido.exe no specs opera.exe #NETWIRE pago vencido.exe explorer.exe no specs winrar.exe pago vencido.exe no specs #NETWIRE pago vencido.exe

Process information

PID
CMD
Path
Indicators
Parent process
272"C:\Windows\system32\ROUTE.EXE" printC:\Windows\system32\ROUTE.EXEsdiagnhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Route Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\route.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
572"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Pago vencido.7z"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
852"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddfC:\Windows\system32\makecab.exesdiagnhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Cabinet Maker
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\makecab.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1724"C:\Users\admin\AppData\Roaming\Install\Host.exe" C:\Users\admin\AppData\Roaming\Install\Host.exePago vencido.exe
User:
admin
Company:
WONDErware
Integrity Level:
MEDIUM
Description:
acredul
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\install\host.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2220 -modal 393678 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\admin\AppData\Local\Temp\NDFC750.tmp -ep NetworkDiagnosticsWebC:\Windows\system32\msdt.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Diagnostics Troubleshooting Wizard
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msdt.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2244"C:\Program Files\Opera\opera.exe" C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
2564"C:\Program Files\Internet Explorer\iexplore.exe" https://www.mediafire.com/file/psah91yvt6ux3yv/Pago_vencido.7z/fileC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2696C:\Windows\System32\sdiagnhost.exe -EmbeddingC:\Windows\System32\sdiagnhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Scripted Diagnostics Native Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sdiagnhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2784"C:\Users\admin\Downloads\Pago vencido.exe" C:\Users\admin\Downloads\Pago vencido.exeexplorer.exe
User:
admin
Company:
WONDErware
Integrity Level:
MEDIUM
Description:
acredul
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\downloads\pago vencido.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2792"C:\Users\admin\AppData\Local\Temp\Rar$EXa3912.33194\Pago vencido.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3912.33194\Pago vencido.exe
Pago vencido.exe
User:
admin
Company:
WONDErware
Integrity Level:
MEDIUM
Description:
acredul
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\system32\mfc40.dll
c:\users\admin\appdata\local\temp\rar$exa3912.33194\pago vencido.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt40.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
22 917
Read events
2 957
Write events
13 368
Delete events
6 592

Modification events

(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
2428543976
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30803794
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A1000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2564) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
7
Suspicious files
60
Text files
40
Unknown types
15

Dropped files

PID
Process
Filename
Type
3252iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabA89C.tmp
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarA89D.tmp
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9Bbinary
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dder
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\errorPageStrings[1]text
MD5:
SHA256:
2564iexplore.exeC:\Users\admin\AppData\Local\Temp\NDFC750.tmpbinary
MD5:
SHA256:
3252iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9Bder
MD5:
SHA256:
2220msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_6cc096a0-4bdf-4650-9d44-bf52a72c14dc\InteractiveRes.ps1text
MD5:25B8543DBF571F040118423BC3C7A75E
SHA256:D78E6291D6F27AC6FEBDCF0A4D5A34521E7F033AF8875E026DF21BA7513AB64A
2696sdiagnhost.exeC:\Users\admin\AppData\Local\Temp\tmpD123.tmp\route.print.txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
44
DNS requests
26
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2564
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2244
opera.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
564 b
whitelisted
3252
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECECUTgfQsc%2BcBwNBMQNWQl0M%3D
US
der
471 b
whitelisted
2564
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1052
svchost.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/GTSGIAG3/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBT27bBjYjKBmjX2jXWgnQJKEapsrQQUd8K4UJpndnaxLcKG0IOgfqZ%2BuksCCCR1UqpKNfC0
US
binary
5 b
whitelisted
2564
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2564
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
824
svchost.exe
104.16.202.237:443
Cloudflare Inc
US
unknown
3252
iexplore.exe
151.139.128.14:80
ocsp.usertrust.com
Highwinds Network Group, Inc.
US
suspicious
2564
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3252
iexplore.exe
104.16.203.237:443
Cloudflare Inc
US
unknown
2564
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2564
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3252
iexplore.exe
104.16.202.237:443
Cloudflare Inc
US
unknown
2564
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3780
Host.exe
104.16.202.237:443
Cloudflare Inc
US
unknown
3036
Pago vencido.exe
199.91.152.142:443
download1642.mediafire.com
MediaFire, LLC
US
unknown

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 185.244.30.160
shared
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crl.usertrust.com
  • 151.139.128.14
whitelisted
download1358.mediafire.com
  • 205.196.123.46
malicious
ocsp.sectigo.com
  • 151.139.128.14
whitelisted
iecvlist.microsoft.com
  • 72.21.81.200
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2792
Pago vencido.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
3580
Pago vencido.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3780
Host.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
4 ETPRO signatures available at the full report
No debug info