analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Swift_copy_32887392.doc.iso

Full analysis: https://app.any.run/tasks/8184fd04-e198-4c35-8132-55ba968dac32
Verdict: Malicious activity
Analysis date: April 15, 2019, 14:35:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'Swift_copy_32887392'
MD5:

03C609826F1A74B147F2C3869D052122

SHA1:

51BAF66173E49F1844C8DCFB087AAF186D32E674

SHA256:

7BAA3FE37108FF70961A55F5730A056E36B4BBC69018B406E24A6072DA8FA5B9

SSDEEP:

24576:TAHnh+eWsN3skA4RV1Hom2KXMmHagKkxHZ2ihSsaP5:eh+ZkldoPK8Yag0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Swift_copy_32887392.exe (PID: 1832)
      • Swift_copy_32887392.exe (PID: 1256)
      • Swift_copy_32887392.exe (PID: 2804)
      • Swift_copy_32887392.exe (PID: 2268)
      • Swift_copy_32887392.exe (PID: 2820)
      • Swift_copy_32887392.exe (PID: 932)
      • Swift_copy_32887392.exe (PID: 2792)
      • Swift_copy_32887392.exe (PID: 2728)
      • Swift_copy_32887392.exe (PID: 2304)
      • Swift_copy_32887392.exe (PID: 1944)
      • Swift_copy_32887392.exe (PID: 2316)
      • Swift_copy_32887392.exe (PID: 3524)
      • Swift_copy_32887392.exe (PID: 2808)
      • Swift_copy_32887392.exe (PID: 3132)
  • SUSPICIOUS

    • Application launched itself

      • Swift_copy_32887392.exe (PID: 2804)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1388)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iso | ISO 9660 CD image (27.6)
.atn | Photoshop Action (27.1)
.gmc | Game Music Creator Music (6.1)

EXIF

Composite

VolumeSize: 1290 kB

ISO

VolumeModifyDate: 2019:04:15 08:29:48.00+03:00
VolumeCreateDate: 2019:04:15 08:29:48.00+03:00
Software: PowerISO
RootDirectoryCreateDate: 2019:04:15 08:29:48+03:00
VolumeBlockSize: 2048
VolumeBlockCount: 645
VolumeName: Swift_copy_32887392
System: Win32
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
16
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start rundll32.exe no specs winrar.exe swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs swift_copy_32887392.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3040"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Swift_copy_32887392.doc.isoC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1388"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Swift_copy_32887392.doc.iso"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2804"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2820"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1832"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1256"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2268"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1944"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2792"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeSwift_copy_32887392.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
932"C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.26389\Swift_copy_32887392.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1388.26389\Swift_copy_32887392.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
899
Read events
808
Write events
91
Delete events
0

Modification events

(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\isoburn.exe,-350
Value:
Disc Image File
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids
Operation:writeName:Windows.IsoFile
Value:
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@%SystemRoot%\System32\isoburn.exe,-352
Value:
Windows Disc Image Burner
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\isoburn.exe
Value:
Windows Disc Image Burner
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\WinRAR\WinRAR.exe
Value:
WinRAR archiver
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:Key:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1388.26389\Swift_copy_32887392.exeexecutable
MD5:7428CDF72D8725D69099EFDAACDA3EBA
SHA256:930598C3CD51DF9499D83C6CB5B5746F0A25A5E521A6E796E9D3ECCC5055EA3E
1388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1388.49928\Swift_copy_32887392.exeexecutable
MD5:7428CDF72D8725D69099EFDAACDA3EBA
SHA256:930598C3CD51DF9499D83C6CB5B5746F0A25A5E521A6E796E9D3ECCC5055EA3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info