| File name: | 6573540920197120.zip |
| Full analysis: | https://app.any.run/tasks/1ff0a054-0a08-439a-b480-7929bb871b4e |
| Verdict: | Malicious activity |
| Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
| Analysis date: | August 30, 2019, 07:41:43 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | CFE73E9B7C4FAAC0A5BD9645A067E41D |
| SHA1: | B747E6F25329204D4D64392F66EEAE16DD66BB78 |
| SHA256: | 78F18651ABC3FF1E18D60095C2AD1F3C2E16F4192ADF969B95FA718128E6EE8C |
| SSDEEP: | 1536:tD67zkBnIoq2LsZAffnoQKkodE8trjaDiSv9/K/sfMUqtu/q4SwnkFeRQpXnMn0R:tz3q2LsCf/oQFoOyr+DiTeGj4SwkgRq7 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 1980:00:00 00:00:00 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | 96746 |
| ZipUncompressedSize: | 188416 |
| ZipFileName: | d12100599ef8bf6d65b49159a00713e7e147d19d387af087e7313fa3a5ef473b |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 504 | WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\wscript.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 1680 | cmd.exe /C WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\cmd.exe | — | 33616.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2252 | cmd.exe /C WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\cmd.exe | — | 33616.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2332 | cmd.exe /C WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\cmd.exe | — | 33616.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2424 | C:\Users\admin\146829395\systozs.exe | C:\Users\admin\146829395\systozs.exe | dd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2704 | WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\wscript.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2844 | WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\wscript.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3016 | C:\Users\admin\AppData\Local\Temp\33616.exe | C:\Users\admin\AppData\Local\Temp\33616.exe | systozs.exe | ||||||||||||
User: admin Company: Jerry Jiang Integrity Level: MEDIUM Description: SortAndLife Application Exit code: 0 Version: 1, 0, 0, 1 Modules
| |||||||||||||||
| 3048 | "C:\Windows\System32\wuapp.exe" -c "C:\ProgramData\FeSdavbMaL\cfgi" | C:\Windows\System32\wuapp.exe | 33616.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Update Application Launcher Exit code: 0 Version: 7.5.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3140 | cmd.exe /C WScript "C:\ProgramData\FeSdavbMaL\r.vbs" | C:\Windows\system32\cmd.exe | — | 33616.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\6573540920197120.zip | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop | |||
| (PID) Process: | (3536) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3016 | 33616.exe | C:\ProgramData\FeSdavbMaL\cfgmgr.exe | — | |
MD5:— | SHA256:— | |||
| 2424 | systozs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\2[1] | binary | |
MD5:— | SHA256:— | |||
| 3536 | WinRAR.exe | C:\Users\admin\Desktop\d12100599ef8bf6d65b49159a00713e7e147d19d387af087e7313fa3a5ef473b | executable | |
MD5:— | SHA256:— | |||
| 3724 | dd.exe | C:\Users\admin\146829395\systozs.exe | executable | |
MD5:— | SHA256:— | |||
| 3016 | 33616.exe | C:\ProgramData\FeSdavbMaL\cfgi | text | |
MD5:— | SHA256:— | |||
| 2424 | systozs.exe | C:\Users\admin\AppData\Local\Temp\33616.exe | binary | |
MD5:— | SHA256:— | |||
| 3308 | wscript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kBBcUBIbha.url | text | |
MD5:— | SHA256:— | |||
| 2424 | systozs.exe | C:\Users\admin\AppData\Local\Temp\15442.exe | binary | |
MD5:— | SHA256:— | |||
| 2424 | systozs.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\4[1] | binary | |
MD5:— | SHA256:— | |||
| 3016 | 33616.exe | C:\ProgramData\FeSdavbMaL\r.vbs | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2424 | systozs.exe | GET | — | 185.176.27.132:80 | http://185.176.27.132/4 | GB | — | — | malicious |
2424 | systozs.exe | GET | 200 | 185.176.27.132:80 | http://185.176.27.132/t.php?new=1 | GB | — | — | malicious |
2424 | systozs.exe | GET | — | 7.5.7.7:80 | http://thaus.top/t.php?new=1 | US | — | — | malicious |
2424 | systozs.exe | GET | — | 185.176.27.132:80 | http://185.176.27.132/2 | GB | — | — | malicious |
2424 | systozs.exe | GET | 200 | 185.176.27.132:80 | http://185.176.27.132/2 | GB | binary | 2.20 Mb | malicious |
2424 | systozs.exe | GET | 404 | 35.225.160.245:80 | http://aeifaeifhutuhuhusl.cc/t.php?new=1 | US | html | 290 b | malicious |
2424 | systozs.exe | GET | 200 | 185.176.27.132:80 | http://185.176.27.132/4 | GB | binary | 184 Kb | malicious |
2424 | systozs.exe | GET | 404 | 208.100.26.251:80 | http://urusurofhsorhfuuhl.cc/t.php?new=1 | US | html | 178 b | malicious |
2424 | systozs.exe | GET | 404 | 185.176.27.132:80 | http://185.176.27.132/6 | GB | html | 178 b | malicious |
2424 | systozs.exe | GET | 404 | 185.176.27.132:80 | http://185.176.27.132/5 | GB | html | 178 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2424 | systozs.exe | 185.176.27.132:80 | — | — | GB | malicious |
2424 | systozs.exe | 208.100.26.251:80 | urusurofhsorhfuuhl.cc | Steadfast | US | suspicious |
2424 | systozs.exe | 35.225.160.245:80 | aeifaeifhutuhuhusl.cc | — | US | malicious |
2424 | systozs.exe | 7.5.7.7:80 | thaus.top | — | US | suspicious |
3016 | 33616.exe | 185.176.27.132:80 | — | — | GB | malicious |
3048 | wuapp.exe | 185.176.27.132:4545 | — | — | GB | malicious |
Domain | IP | Reputation |
|---|---|---|
urusurofhsorhfuuhk.su |
| malicious |
aeifaeifhutuhuhusk.su |
| unknown |
rzhsudhugugfugugsk.su |
| unknown |
bfagzzezgaegzgfaik.su |
| unknown |
eaeuafhuaegfugeudk.su |
| unknown |
aeufuaehfiuehfuhfk.su |
| malicious |
daedagheauehfuuhfk.su |
| unknown |
aeoughaoheguaoehdk.su |
| unknown |
eguaheoghouughahsk.su |
| unknown |
huaeokaefoaeguaehk.su |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
2424 | systozs.exe | Misc Attack | ET DROP Dshield Block Listed Source group 1 |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
1060 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |