File name:

Trojan;Win32.Malgent!MTB.zip

Full analysis: https://app.any.run/tasks/5cbd8ff3-c400-40ac-ae16-18012e85ff06
Verdict: Malicious activity
Analysis date: June 20, 2024, 22:02:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

5C1B7D49200CE0272838D7B5E934AC8D

SHA1:

6C45A549331C39A560A831F7EF279408D696DE0A

SHA256:

7A7CF91F73E69D9B831CC8A48EE5B58659F4F69D6265EB0E6E75DC047BF0EA48

SSDEEP:

98304:usVk1VujdIAuDqVIGycyenCw1G/+/ayzqHjgWdSl1wnNQFNeYvQmHfDycE8ArGbn:gGOwwOM4jS/ZMhrrblkMrzF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3428)
      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • sg.tmp (PID: 964)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
    • Executable content was dropped or overwritten

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • sg.tmp (PID: 964)
    • Starts application with an unusual extension

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
    • Process drops legitimate windows executable

      • sg.tmp (PID: 964)
    • The process drops C-runtime libraries

      • sg.tmp (PID: 964)
    • Creates file in the systems drive root

      • SSDmanagement.exe (PID: 268)
    • Reads the Internet Settings

      • WMIC.exe (PID: 3844)
      • WMIC.exe (PID: 4016)
      • WMIC.exe (PID: 1608)
      • WMIC.exe (PID: 3324)
      • WMIC.exe (PID: 2000)
    • Uses WMIC.EXE to obtain data on the base board management (motherboard or system board)

      • SSDmanagement.exe (PID: 268)
    • Uses WMIC.EXE to obtain operating system information

      • SSDmanagement.exe (PID: 268)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 3844)
    • Uses WMIC.EXE to obtain CPU information

      • SSDmanagement.exe (PID: 268)
    • Uses WMIC.EXE to obtain BIOS management information

      • SSDmanagement.exe (PID: 268)
  • INFO

    • Checks supported languages

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • sg.tmp (PID: 964)
      • SSDmanagement.exe (PID: 268)
    • Manual execution by a user

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
    • Reads the computer name

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • sg.tmp (PID: 964)
      • SSDmanagement.exe (PID: 268)
    • Create files in a temporary directory

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • sg.tmp (PID: 964)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3428)
    • Reads the machine GUID from the registry

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
      • SSDmanagement.exe (PID: 268)
    • UPX packer has been detected

      • Trojan;Win32.Malgent!MTB.exe (PID: 3856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:06:20 16:58:58
ZipCRC: 0x7e8af884
ZipCompressedSize: 12669513
ZipUncompressedSize: 12939911
ZipFileName: Trojan;Win32.Malgent!MTB.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe THREAT trojan;win32.malgent!mtb.exe cmd.exe no specs sg.tmp ssdmanagement.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
268"C:\Users\admin\AppData\Local\Temp\~1347193478775578046\SSDmanagement.exe" C:\Users\admin\AppData\Local\Temp\~1347193478775578046\SSDmanagement.exeTrojan;Win32.Malgent!MTB.exe
User:
admin
Integrity Level:
HIGH
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\~1347193478775578046\ssdmanagement.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\users\admin\appdata\local\temp\~1347193478775578046\diskinfo.dll
c:\windows\system32\user32.dll
9647zG_exe x "C:\Users\admin\Desktop\Trojan;Win32.Malgent!MTB.exe" -y -aoa -o"C:\Users\admin\AppData\Local\Temp\~1347193478775578046" C:\Users\admin\AppData\Local\Temp\~1512130915225489763~\sg.tmp
Trojan;Win32.Malgent!MTB.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\~1512130915225489763~\sg.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1608wmic baseboard get manufacturerC:\Windows\System32\wbem\WMIC.exeSSDmanagement.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2000wmic bios get smbiosbiosversionC:\Windows\System32\wbem\WMIC.exeSSDmanagement.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3324wmic baseboard get productC:\Windows\System32\wbem\WMIC.exeSSDmanagement.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3336cmd.exe /c setC:\Windows\System32\cmd.exeTrojan;Win32.Malgent!MTB.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3428"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan;Win32.Malgent!MTB.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3844wmic os get captionC:\Windows\System32\wbem\WMIC.exeSSDmanagement.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3856"C:\Users\admin\Desktop\Trojan;Win32.Malgent!MTB.exe" C:\Users\admin\Desktop\Trojan;Win32.Malgent!MTB.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\trojan;win32.malgent!mtb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
4016wmic cpu get nameC:\Windows\System32\wbem\WMIC.exeSSDmanagement.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
4 273
Read events
4 251
Write events
22
Delete events
0

Modification events

(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3428) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trojan;Win32.Malgent!MTB.zip
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
28
Suspicious files
22
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translate\tr_zh.qmqm
MD5:7C11E17325929CDC570CB1D2EDC6D389
SHA256:13121E9DBCC396D2E971248939B0DDC94E32B0CECC132C61EB7B39CEB550F461
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_cs.qmqm
MD5:987E045E06AEBA29A8E05A074E6BDB91
SHA256:86E174EFF79F096D81146860DD5CA9E946C643A3464C7DA8919C972747B8DF09
3428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3428.25344\Trojan;Win32.Malgent!MTB.exeexecutable
MD5:DB2B4EFA11A04CE3A785D706CB231D2A
SHA256:7A752283EB17BE491A2411AE9D95D11D436D3310CF0FCA01BE49ED484A7C0280
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_bg.qmbinary
MD5:6BCB7BF161BBE019CFAEEE7D331E3E79
SHA256:47F5749032C655F8399563728B8E5591B796AABABB631D0BCA9F18D74F4ED6F0
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_ca.qmqm
MD5:26534ADF1704EA33CCB83381F36A2CD0
SHA256:EF196C601EF5A0AF8C77FA62601EE1630ED919CEF048B903BA48FFDEAB246D3C
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_ar.qmqm
MD5:E7EC8B6E07D62634777DBCB47BD611D3
SHA256:820EB8876A61022B371D557EEBD83A99A3872C6E93ACBF3E98026DFCB3CE8EFB
3856Trojan;Win32.Malgent!MTB.exeC:\Users\admin\AppData\Local\Temp\~1512130915225489763~\sg.tmpexecutable
MD5:7C4718943BD3F66EBDB47CCCA72C7B1E
SHA256:4CC32D00338FC7B206A7C052297ACF9AC304AE7DE9D61A2475A116959C1524FC
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translate\tr_en.qmqm
MD5:0559D0F7BAFA379F711E7D075360710A
SHA256:E29C40C8458C4186C4D4594D86A529563143C2C3CE8B4A0B208F021051A80730
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_fr.qmqm
MD5:37F2AC5CF8EA04844351AE0BCF8420FB
SHA256:7D40EAA90D9094CE548A41482B496EC494396A82361D4F3D031756118ED042D2
964sg.tmpC:\Users\admin\AppData\Local\Temp\~1347193478775578046\translations\qt_fi.qmqm
MD5:0B44082DA39139369BD1AEBCC8405D32
SHA256:F5C11AE3FED658E009079377D3D81F39DB5EC0A6B4207CD9AC0993181D5B89D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
11
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1372
svchost.exe
GET
200
23.15.179.146:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1372
svchost.exe
GET
200
72.247.166.29:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
1060
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fbe613066ac7852b
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1372
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1372
svchost.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
23.15.179.146:80
crl.microsoft.com
Akamai International B.V.
FR
whitelisted
1372
svchost.exe
72.247.166.29:80
www.microsoft.com
AKAMAI-AS
FR
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 23.15.179.146
  • 23.15.179.154
whitelisted
www.microsoft.com
  • 72.247.166.29
whitelisted

Threats

No threats detected
No debug info