analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

25b19ccb8487e73956f0831c466dd7d8.zip

Full analysis: https://app.any.run/tasks/1f932c3c-a828-41bf-8538-7ac23f5299d5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 25, 2022, 00:30:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
encrypted
exploit
CVE-2017-11882
loader
trojan
lokibot
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

15BFAC3228F0871C5CA3E94BCE0C9F12

SHA1:

1637CF465B3C1562D3943F7E7DAFFCB50ED74431

SHA256:

70E49CA547F49E30F03D9C0DD12A232799EEF6B4A089C0DD2813F3DFEB5A238A

SSDEEP:

3072:wjqgzAS4iNgYi/XMYiuHkbvF9U44AqQLzX+rYMHyivEBns8dr7xi:mqgzYiNxi/cYebt9AAqQfXTUpgs8/i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 3612)
    • Drops executable file immediately after starts

      • vbc.exe (PID: 3204)
    • Steals credentials from Web Browsers

      • vbc.exe (PID: 572)
    • Application was dropped or rewritten from another process

      • vbc.exe (PID: 3204)
      • vbc.exe (PID: 572)
    • Loads dropped or rewritten executable

      • vbc.exe (PID: 3204)
    • Connects to CnC server

      • vbc.exe (PID: 572)
    • LOKIBOT was detected

      • vbc.exe (PID: 572)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 572)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2256)
      • EQNEDT32.EXE (PID: 3612)
      • vbc.exe (PID: 572)
      • vbc.exe (PID: 3204)
    • Starts Microsoft Office Application

      • rundll32.exe (PID: 3068)
    • Reads default file associations for system extensions

      • rundll32.exe (PID: 3068)
    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 2256)
    • Reads the computer name

      • WinRAR.exe (PID: 2256)
      • EQNEDT32.EXE (PID: 3612)
      • vbc.exe (PID: 3204)
      • vbc.exe (PID: 572)
    • Reads the date of Windows installation

      • rundll32.exe (PID: 3068)
    • Executed via COM

      • EQNEDT32.EXE (PID: 3612)
    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 3612)
      • vbc.exe (PID: 3204)
      • vbc.exe (PID: 572)
    • Drops a file with too old compile date

      • EQNEDT32.EXE (PID: 3612)
      • vbc.exe (PID: 572)
    • Loads DLL from Mozilla Firefox

      • vbc.exe (PID: 572)
    • Application launched itself

      • vbc.exe (PID: 3204)
    • Drops a file with a compile date too recent

      • vbc.exe (PID: 3204)
    • Creates files in the user directory

      • vbc.exe (PID: 572)
  • INFO

    • Reads the computer name

      • rundll32.exe (PID: 3068)
      • EXCEL.EXE (PID: 1200)
    • Checks supported languages

      • rundll32.exe (PID: 3068)
      • EXCEL.EXE (PID: 1200)
    • Changes default file association

      • rundll32.exe (PID: 3068)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 1200)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2022:01:25 02:29:29
ZipCRC: 0x1a376c21
ZipCompressedSize: 184656
ZipUncompressedSize: 191576
ZipFileName: 25b19ccb8487e73956f0831c466dd7d8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs rundll32.exe no specs excel.exe no specs eqnedt32.exe vbc.exe #LOKIBOT vbc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\25b19ccb8487e73956f0831c466dd7d8.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3068"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Rar$DIb2256.30365\25b19ccb8487e73956f0831c466dd7d8C:\Windows\system32\rundll32.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1200"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" "C:\Users\admin\AppData\Local\Temp\Rar$DIb2256.30365\25b19ccb8487e73956f0831c466dd7d8"C:\Program Files\Microsoft Office\Office14\EXCEL.EXErundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3612"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
Modules
Images
c:\program files\common files\microsoft shared\equation\eqnedt32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3204"C:\Users\Public\vbc.exe" C:\Users\Public\vbc.exe
EQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\public\vbc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
572"C:\Users\Public\vbc.exe" C:\Users\Public\vbc.exe
vbc.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\public\vbc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
9 855
Read events
9 554
Write events
288
Delete events
13

Modification events

(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2256) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\25b19ccb8487e73956f0831c466dd7d8.zip
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2256) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
5
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
1200EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR7D6C.tmp.cvr
MD5:
SHA256:
2256WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2256.30365\25b19ccb8487e73956f0831c466dd7d8binary
MD5:CC71F02AFFDCA6EB95B260961813FAEC
SHA256:FE03E8000C006AAF85BB2B5D66DB9A0E52818EAAA4A6DC7BA62AD7092921538D
3612EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\vbc[1].exeexecutable
MD5:07553298F0F744325B03796D803F0ADD
SHA256:B09BB399AF831A5F9A93C1D8CEFC60F44446041EFDE040B69A9227A1C165F32D
3204vbc.exeC:\Users\admin\AppData\Local\Temp\4wvyp1z1zbuoebinary
MD5:AC9BB14EBF2E60050FE7E37A1922F1D6
SHA256:30A778444A4BBF1F1DEA683EDA05E45F07A6BD92A35E2CEF95C59BC2A63AC74B
3204vbc.exeC:\Users\admin\AppData\Local\Temp\nsb8B87.tmp\oeehnelp.dllexecutable
MD5:A155FF4F885FEFA034C552948C1A547B
SHA256:D487D0B227DA052DCAD03BFCC3AB3E7ABB59241BD890FFEFFC0696C1BFAF8075
572vbc.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
3204vbc.exeC:\Users\admin\AppData\Local\Temp\bvpqmvrsrbinary
MD5:0C07CB2FC47DA3FF32FC2D12250D63E5
SHA256:F1CB4FDC58771BEA6621BB51B3A660E23336EEA9F1B391C10FC3F1BC3387B8A1
3612EQNEDT32.EXEC:\Users\Public\vbc.exeexecutable
MD5:07553298F0F744325B03796D803F0ADD
SHA256:B09BB399AF831A5F9A93C1D8CEFC60F44446041EFDE040B69A9227A1C165F32D
3204vbc.exeC:\Users\admin\AppData\Local\Temp\nsb8B86.tmpbinary
MD5:59042BF43688CCADA253D4E15947D979
SHA256:6DC37C2DB642DEBA85B797D2AD0A80EAB6B4876A90070BF5CC8AAD90CB32A2F1
1200EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD25F7C3.emfemf
MD5:84DCD04CFF5966E8AF859F7EDBA4E7F7
SHA256:F89691C4E8111C5E1D317F9C9D318FA665461814A85E58F1A8AA0995ABA2D9C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3612
EQNEDT32.EXE
GET
200
107.173.229.131:80
http://107.173.229.131/300/vbc.exe
US
executable
243 Kb
malicious
572
vbc.exe
POST
404
104.21.12.125:80
http://mangeruio.ir/oluwa/five/fre.php
US
malicious
572
vbc.exe
POST
404
104.21.12.125:80
http://mangeruio.ir/oluwa/five/fre.php
US
malicious
572
vbc.exe
POST
404
104.21.12.125:80
http://mangeruio.ir/oluwa/five/fre.php
US
malicious
572
vbc.exe
POST
404
104.21.12.125:80
http://mangeruio.ir/oluwa/five/fre.php
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
572
vbc.exe
104.21.12.125:80
mangeruio.ir
Cloudflare Inc
US
malicious
3612
EQNEDT32.EXE
107.173.229.131:80
ColoCrossing
US
malicious

DNS requests

Domain
IP
Reputation
mangeruio.ir
  • 104.21.12.125
  • 172.67.194.126
malicious

Threats

PID
Process
Class
Message
3612
EQNEDT32.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3612
EQNEDT32.EXE
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
3612
EQNEDT32.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
3612
EQNEDT32.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3612
EQNEDT32.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2
3612
EQNEDT32.EXE
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
572
vbc.exe
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
572
vbc.exe
A Network Trojan was detected
ET TROJAN LokiBot Checkin
572
vbc.exe
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1
572
vbc.exe
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2
4 ETPRO signatures available at the full report
No debug info