File name:

New Order 56438.img.zip

Full analysis: https://app.any.run/tasks/6081d261-791d-4040-afe7-e9a1a88ba9e7
Verdict: Malicious activity
Analysis date: May 20, 2019, 07:52:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F04C1E0F58067022B5FC6D70DF121A33

SHA1:

898855C780497DA45FF5F7788D6496FBA7009367

SHA256:

747AFC81586CC0482CC95BC8D9DD4C9B21321FDC884F65FD8031B339E59CCD16

SSDEEP:

24576:OSqBh4jRnSZE0E4HA9B75u8e36AWqKWSOFkbKBFWR3w:Rqv4j1SZE0g3lTAWpOCbK6g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • New Order 56438.exe (PID: 2592)
      • New Order 56438.exe (PID: 2184)
      • New Order 56438.exe (PID: 4056)
      • New Order 56438.exe (PID: 2220)
      • New Order 56438.exe (PID: 2260)
      • New Order 56438.exe (PID: 2368)
      • New Order 56438.exe (PID: 3836)
      • New Order 56438.exe (PID: 2436)
      • New Order 56438.exe (PID: 1352)
      • New Order 56438.exe (PID: 2164)
      • New Order 56438.exe (PID: 3068)
      • New Order 56438.exe (PID: 3452)
      • New Order 56438.exe (PID: 3532)
      • New Order 56438.exe (PID: 3648)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3996)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3996)
    • Application launched itself

      • New Order 56438.exe (PID: 2592)
      • New Order 56438.exe (PID: 2436)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3024)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 3424)
      • OUTLOOK.EXE (PID: 3996)
      • WinRAR.exe (PID: 2780)
      • New Order 56438.exe (PID: 2592)
      • WinRAR.exe (PID: 3432)
      • WinRAR.exe (PID: 3024)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0003
ZipCompression: Deflated
ZipModifyDate: 2019:05:20 10:16:19
ZipCRC: 0x3f2cbcb1
ZipCompressedSize: 826176
ZipUncompressedSize: 825909
ZipFileName: e91703e5c37c84160b9c38cca289c6e6.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
20
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winrar.exe no specs outlook.exe winrar.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs winrar.exe no specs winrar.exe new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1352"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.2988\users\dc\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2164"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.2988\users\dc\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2184"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2220"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2260"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2368"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
2436"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.2988\users\dc\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2592"C:\Users\admin\Desktop\New Order 56438.exe" C:\Users\admin\Desktop\New Order 56438.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order 56438.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2780"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New Order 56438.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\New Order 56438.img.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
Total events
3 216
Read events
2 728
Write events
469
Delete events
19

Modification events

(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\New Order 56438.img.zip
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
1
Suspicious files
2
Text files
24
Unknown types
1

Dropped files

PID
Process
Filename
Type
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2964.28833\e91703e5c37c84160b9c38cca289c6e6.zip
MD5:
SHA256:
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3424.30818\e91703e5c37c84160b9c38cca289c6e6
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRBC74.tmp.cvr
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpBFB1.tmp
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\YWTROU9J\New Order 56438 (2).img\:Zone.Identifier:$DATA
MD5:
SHA256:
2780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2780.36436\Users\DC\Desktop\New Order 56438.exe
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\YWTROU9J\New Order 56438.imgcompressed
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\YWTROU9J\New Order 56438 (2).imgcompressed
MD5:
SHA256:
3024WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.2988\Users\DC\Desktop\New Order 56438.exeexecutable
MD5:
SHA256:
3996OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3996
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3996
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info