analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

New Order 56438.img.zip

Full analysis: https://app.any.run/tasks/6081d261-791d-4040-afe7-e9a1a88ba9e7
Verdict: Malicious activity
Analysis date: May 20, 2019, 07:52:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F04C1E0F58067022B5FC6D70DF121A33

SHA1:

898855C780497DA45FF5F7788D6496FBA7009367

SHA256:

747AFC81586CC0482CC95BC8D9DD4C9B21321FDC884F65FD8031B339E59CCD16

SSDEEP:

24576:OSqBh4jRnSZE0E4HA9B75u8e36AWqKWSOFkbKBFWR3w:Rqv4j1SZE0g3lTAWpOCbK6g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • New Order 56438.exe (PID: 4056)
      • New Order 56438.exe (PID: 2184)
      • New Order 56438.exe (PID: 2592)
      • New Order 56438.exe (PID: 2220)
      • New Order 56438.exe (PID: 2260)
      • New Order 56438.exe (PID: 3836)
      • New Order 56438.exe (PID: 2368)
      • New Order 56438.exe (PID: 3068)
      • New Order 56438.exe (PID: 3648)
      • New Order 56438.exe (PID: 1352)
      • New Order 56438.exe (PID: 2436)
      • New Order 56438.exe (PID: 3452)
      • New Order 56438.exe (PID: 2164)
      • New Order 56438.exe (PID: 3532)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3996)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3996)
    • Application launched itself

      • New Order 56438.exe (PID: 2592)
      • New Order 56438.exe (PID: 2436)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3024)
  • INFO

    • Manual execution by user

      • OUTLOOK.EXE (PID: 3996)
      • WinRAR.exe (PID: 3424)
      • New Order 56438.exe (PID: 2592)
      • WinRAR.exe (PID: 2780)
      • WinRAR.exe (PID: 3024)
      • WinRAR.exe (PID: 3432)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0003
ZipCompression: Deflated
ZipModifyDate: 2019:05:20 10:16:19
ZipCRC: 0x3f2cbcb1
ZipCompressedSize: 826176
ZipUncompressedSize: 825909
ZipFileName: e91703e5c37c84160b9c38cca289c6e6.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
20
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winrar.exe no specs outlook.exe winrar.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs winrar.exe no specs winrar.exe new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\New Order 56438.img.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3424"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\e91703e5c37c84160b9c38cca289c6e6.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3996"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\e91703e5c37c84160b9c38cca289c6e6.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2780"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New Order 56438.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2592"C:\Users\admin\Desktop\New Order 56438.exe" C:\Users\admin\Desktop\New Order 56438.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4056"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2184"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2220"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2260"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2368"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
3 216
Read events
2 728
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
24
Unknown types
1

Dropped files

PID
Process
Filename
Type
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2964.28833\e91703e5c37c84160b9c38cca289c6e6.zip
MD5:
SHA256:
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3424.30818\e91703e5c37c84160b9c38cca289c6e6
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRBC74.tmp.cvr
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpBFB1.tmp
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\YWTROU9J\New Order 56438 (2).img\:Zone.Identifier:$DATA
MD5:
SHA256:
2780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2780.36436\Users\DC\Desktop\New Order 56438.exe
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:2354ECABAB8A43C16C2A314A1377C1D3
SHA256:DC0826650BD1679DDC4B9B7D7B52CBB4CA7D532A8B6590A0EADC888D8C22E207
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_B050A19238126D4FA1B740126472576D.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\YWTROU9J\New Order 56438 (2).imgcompressed
MD5:54B048C3167E3F1655351DB6AA292BAF
SHA256:9A69826A8A12403DAF6CB790B8CCA5CA75DAE99DDEF691C76453618EE10882F1
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_RssRule_2_E6ADA5E0F7DC724D89048C959A040F8B.datxml
MD5:D8B37ED0410FB241C283F72B76987F18
SHA256:31E68049F6B7F21511E70CD7F2D95B9CF1354CF54603E8F47C1FC40F40B7A114
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3996
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3996
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info