File name:

vir.7z

Full analysis: https://app.any.run/tasks/2405717a-90bf-479d-a588-d071d92337bf
Verdict: Malicious activity
Analysis date: February 02, 2022, 10:17:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

DABFA9FDCC98A90D3F4D7DE7A0CA2FFE

SHA1:

A2FC70B146ADB4F993B40C27ADAD3FAB211635C6

SHA256:

5E4DC8B261092D2C18A7421BC7F0A725ECDFE987BE4D8ED401ECBFDEF3D8455B

SSDEEP:

49152:YGS91Gb3W90pID6a7znQU58iupunmWrBQvDJBDqf188hsuTqMQHiwSqp8:wG7k6kxQU5cpuDWNBD+87uTeHJSv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 2456)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3512)
    • Application was dropped or rewritten from another process

      • VirusOrg.Neshta.A.exe (PID: 3476)
      • Sality.exe (PID: 3716)
      • WormOrg.Win32.Parite.A.exe (PID: 3840)
      • WormOrg.Win32.Parite.A.exe (PID: 1772)
      • VirusOrg.Win32.Virut.A.exe (PID: 2248)
      • Sality.exe (PID: 2456)
    • Changes Security Center notification settings

      • Sality.exe (PID: 3716)
    • Changes firewall settings

      • Sality.exe (PID: 3716)
    • Application was injected by another process

      • DllHost.exe (PID: 3140)
      • Dwm.exe (PID: 1176)
      • ctfmon.exe (PID: 612)
      • Explorer.EXE (PID: 1108)
      • taskeng.exe (PID: 2040)
      • WerFault.exe (PID: 2808)
      • conhost.exe (PID: 2988)
      • csrss.exe (PID: 668)
      • wininit.exe (PID: 640)
    • Runs injected code in another process

      • Sality.exe (PID: 3716)
      • VirusOrg.Win32.Virut.A.exe (PID: 2248)
    • UAC/LUA settings modification

      • Sality.exe (PID: 3716)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 2456)
      • WinRAR.exe (PID: 1104)
      • DllHost.exe (PID: 3140)
      • Sality.exe (PID: 3716)
      • WormOrg.Win32.Parite.A.exe (PID: 3840)
      • WormOrg.Win32.Parite.A.exe (PID: 1772)
      • Sality.exe (PID: 2456)
      • VirusOrg.Win32.Virut.A.exe (PID: 2248)
    • Checks supported languages

      • WinRAR.exe (PID: 2456)
      • WinRAR.exe (PID: 1104)
      • VirusOrg.Neshta.A.exe (PID: 3476)
      • DllHost.exe (PID: 3140)
      • Sality.exe (PID: 3716)
      • WormOrg.Win32.Parite.A.exe (PID: 1772)
      • conhost.exe (PID: 2988)
      • Dwm.exe (PID: 1176)
      • WormOrg.Win32.Parite.A.exe (PID: 3840)
      • Sality.exe (PID: 2456)
      • VirusOrg.Win32.Virut.A.exe (PID: 2248)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2456)
      • Sality.exe (PID: 3716)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2456)
      • Sality.exe (PID: 3716)
    • Creates files in the Windows directory

      • VirusOrg.Neshta.A.exe (PID: 3476)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2456)
      • Sality.exe (PID: 3716)
    • Changes default file association

      • VirusOrg.Neshta.A.exe (PID: 3476)
    • Executes application which crashes

      • Explorer.EXE (PID: 1108)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1108)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 2456)
      • VirusOrg.Neshta.A.exe (PID: 3476)
      • Sality.exe (PID: 3716)
      • WormOrg.Win32.Parite.A.exe (PID: 1772)
      • ntvdm.exe (PID: 292)
      • WormOrg.Win32.Parite.A.exe (PID: 3840)
      • ntvdm.exe (PID: 2516)
      • VirusOrg.Win32.Virut.A.exe (PID: 2248)
      • Sality.exe (PID: 2456)
    • Dropped object may contain TOR URL's

      • WinRAR.exe (PID: 2456)
    • Checks supported languages

      • WerFault.exe (PID: 2808)
      • ntvdm.exe (PID: 292)
      • ntvdm.exe (PID: 2516)
    • Reads the computer name

      • WerFault.exe (PID: 2808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
20
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start inject inject inject inject inject inject inject winrar.exe no specs winrar.exe searchprotocolhost.exe no specs virusorg.neshta.a.exe sality.exe ctfmon.exe explorer.exe dwm.exe taskeng.exe Thumbnail Cache Class Factory for Out of Proc Server wormorg.win32.parite.a.exe ntvdm.exe no specs ntvdm.exe werfault.exe conhost.exe wormorg.win32.parite.a.exe sality.exe virusorg.win32.virut.a.exe wininit.exe csrss.exe

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Windows\system32\ntvdm.exe" -i2 C:\Windows\system32\ntvdm.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
612C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
640wininit.exeC:\Windows\system32\wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Start-Up Application
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
668%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\system32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
1104"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\vir.7z"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1108C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1176"C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
1772"C:\Users\admin\Desktop\Neshta???\WormOrg.Win32.Parite.A.exe" C:\Users\admin\Desktop\Neshta???\WormOrg.Win32.Parite.A.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\desktop\neshta???\wormorg.win32.parite.a.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2040taskeng.exe {D0F9F501-9242-4B74-B2E9-F518725CD611}C:\Windows\system32\taskeng.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Engine
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskeng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2248"C:\Users\admin\Desktop\Neshta???\VirusOrg.Win32.Virut.A.exe" C:\Users\admin\Desktop\Neshta???\VirusOrg.Win32.Virut.A.exe
Explorer.EXE
User:
admin
Company:
ELEMENTAL SOFT
Integrity Level:
HIGH
Description:
ChiyoGanbaru
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\neshta???\virusorg.win32.virut.a.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
16 654
Read events
12 423
Write events
4 231
Delete events
0

Modification events

(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1104) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\vir.7z
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
9
Suspicious files
12
Text files
5
Unknown types
25

Dropped files

PID
Process
Filename
Type
2456WinRAR.exeC:\Users\admin\Desktop\Neshta???\WormOrg.Floxif.A.dllexecutable
MD5:836DBCE15F1DFAAD3DF9F28B24047B41
SHA256:EDA99D18EC436BE103B42766916E27AE66E444AA2E48436F9A249C93EFB50829
2456WinRAR.exeC:\Users\admin\Desktop\Neshta???\VirusOrg.Win32.Virut.A.exeexecutable
MD5:606A95B422C08C106744A6E312413AAB
SHA256:D6C9D4F03B0E7404132B1382CAFABA4F59DCB62106160B66488B02E16BE26874
1104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1104.21588\Virut?????.zipcompressed
MD5:6C48B8BE5B8A29506EAA045E265849A2
SHA256:82DB3D2C2CECC18A178261ED0349F6D378BAD2E1C86AF547F6D51143FA156B83
1108Explorer.EXEC:\Users\admin\Desktop\Sality????.zipcompressed
MD5:4B716BCAEE813564CEC74065AC305BA6
SHA256:6A438DB46E6AF2936495E44D01D46A8D31385798522B12E7481E514067DB51FD
1108Explorer.EXEC:\Users\admin\Desktop\Floxif????.zipcompressed
MD5:0E2B0BD28A8FB318894F4AC2DC2A2C6A
SHA256:778CB81FF7519706D2A0932936CA9DFE820BB92FD599728A965BA36CF672C59F
1108Explorer.EXEC:\Users\admin\Desktop\Parite????.zipcompressed
MD5:6C5A08CBCA9629A5C20AABE74C798604
SHA256:341B08D5522A8916314648219EEA375C2D8DECAA26053ACA5E24DFFCA2BBFB86
2456WinRAR.exeC:\Users\admin\Desktop\Neshta???\Sality.exeexecutable
MD5:55BFEE3915AE84F38FDA750587868AE7
SHA256:2E73CBA234FF1F2DE0A0EA8C61B002215ED6AC10EC79ADD2B21FA9862B38AABC
1104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1104.21588\Floxif????.zipcompressed
MD5:0E2B0BD28A8FB318894F4AC2DC2A2C6A
SHA256:778CB81FF7519706D2A0932936CA9DFE820BB92FD599728A965BA36CF672C59F
1104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1104.21588\Parite????.zipcompressed
MD5:6C5A08CBCA9629A5C20AABE74C798604
SHA256:341B08D5522A8916314648219EEA375C2D8DECAA26053ACA5E24DFFCA2BBFB86
3476VirusOrg.Neshta.A.exeC:\MSOCache\All Users\{90140000-006E-040C-0000-0000000FF1CE}-C\DW20.EXEatn
MD5:885455EE948E2CC8EF2CFD9F2FEA572C
SHA256:AB7EC60B102ABEAEFC347A96DC443FEE562873413D0C3EAEFB254C8E3DB6A181
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info