analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

New Order 56438.img.zip

Full analysis: https://app.any.run/tasks/ed17e606-46c7-4f16-ac41-865b909e0680
Verdict: Malicious activity
Analysis date: May 20, 2019, 07:45:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F04C1E0F58067022B5FC6D70DF121A33

SHA1:

898855C780497DA45FF5F7788D6496FBA7009367

SHA256:

747AFC81586CC0482CC95BC8D9DD4C9B21321FDC884F65FD8031B339E59CCD16

SSDEEP:

24576:OSqBh4jRnSZE0E4HA9B75u8e36AWqKWSOFkbKBFWR3w:Rqv4j1SZE0g3lTAWpOCbK6g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • New Order 56438.exe (PID: 2000)
      • New Order 56438.exe (PID: 932)
      • New Order 56438.exe (PID: 1344)
      • New Order 56438.exe (PID: 1464)
      • New Order 56438.exe (PID: 3476)
      • New Order 56438.exe (PID: 2468)
      • New Order 56438.exe (PID: 3656)
      • New Order 56438.exe (PID: 2864)
      • New Order 56438.exe (PID: 1348)
      • New Order 56438.exe (PID: 1152)
      • New Order 56438.exe (PID: 2816)
      • New Order 56438.exe (PID: 3908)
      • New Order 56438.exe (PID: 2932)
      • New Order 56438.exe (PID: 1500)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3132)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3132)
    • Application launched itself

      • New Order 56438.exe (PID: 1344)
      • New Order 56438.exe (PID: 2864)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2860)
  • INFO

    • Manual execution by user

      • OUTLOOK.EXE (PID: 3132)
      • WinRAR.exe (PID: 2844)
      • WinRAR.exe (PID: 2860)
      • New Order 56438.exe (PID: 1344)
      • New Order 56438.exe (PID: 2864)
      • WinRAR.exe (PID: 1020)
    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2844)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0003
ZipCompression: Deflated
ZipModifyDate: 2019:05:20 10:16:19
ZipCRC: 0x3f2cbcb1
ZipCompressedSize: 826176
ZipUncompressedSize: 825909
ZipFileName: e91703e5c37c84160b9c38cca289c6e6.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
19
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs outlook.exe winrar.exe new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs new order 56438.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2956"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\New Order 56438.img.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2844"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\e91703e5c37c84160b9c38cca289c6e6.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3132"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\Desktop\e91703e5c37c84160b9c38cca289c6e6.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2860"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New Order 56438.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1344"C:\Users\admin\Desktop\New Order 56438.exe" C:\Users\admin\Desktop\New Order 56438.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2000"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
932"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1464"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2468"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3476"C:\Users\admin\Desktop\New Order 56438.exe"C:\Users\admin\Desktop\New Order 56438.exeNew Order 56438.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
2 604
Read events
2 154
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
24
Unknown types
2

Dropped files

PID
Process
Filename
Type
2956WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2956.37450\e91703e5c37c84160b9c38cca289c6e6.zip
MD5:
SHA256:
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR245.tmp.cvr
MD5:
SHA256:
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp44A.tmp
MD5:
SHA256:
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\VDC3F7YO\New Order 56438 (2).img\:Zone.Identifier:$DATA
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2860.45331\Users\DC\Desktop\New Order 56438.exe
MD5:
SHA256:
3132OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:DEC80A5CECEAA18CEE66429161C090EC
SHA256:A92F45B53698640583EDC8DF2DCE47DC7B11BF0F39BD100E56FE2396777476C1
2844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2844.38972\e91703e5c37c84160b9c38cca289c6e6eml
MD5:E91703E5C37C84160B9C38CCA289C6E6
SHA256:6AC1651F5E62740F086053C1B6E7BA73870BDE981A5A498A18021C16A164CEDF
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\VDC3F7YO\New Order 56438 (2).imgcompressed
MD5:54B048C3167E3F1655351DB6AA292BAF
SHA256:9A69826A8A12403DAF6CB790B8CCA5CA75DAE99DDEF691C76453618EE10882F1
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_6986D12797707E41B9210E0FB6166F5C.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
3132OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_F5C7CDFC84BC8248AA04C9011409690A.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3132
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info