analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Comprobante_PDF_2019_597EWS_FISCAL.js.zip

Full analysis: https://app.any.run/tasks/e00c46e7-3216-48cd-a2b9-4d828fe28799
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 25, 2019, 17:40:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

4D8114132B293F890F95FC8866A1F345

SHA1:

1B9BDE89BE7174F3B22335D8A5C7DFB0DA22C498

SHA256:

7E13BAE6DD60EE5C887A0AA864E469BDEDDD22C80DC64C9B5A124CB667BA8E34

SSDEEP:

3072:3k63wqARxiVoAsZ854hDHOa639wLbTyIhuJzBT:3k4wqARoVoAsuKhDHOa6NYz0pl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • workexpress.exe (PID: 3132)
      • GoogleUpdate.exe (PID: 1584)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 2484)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 680)
      • WScript.exe (PID: 2484)
    • Executes scripts

      • WinRAR.exe (PID: 680)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Comprobante_PDF_2019_597EWS_FISCAL.js/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2019:04:25 11:22:18
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe wscript.exe googleupdate.exe no specs workexpress.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Comprobante_PDF_2019_597EWS_FISCAL.js.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2484"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa680.6853\Comprobante_PDF_2019_597EWS_FISCAL.js.js" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1584"C:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exeWinRAR.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Installer
Exit code:
2147942402
Version:
1.3.33.23
3132C:\Users\Public\workexpress.exeC:\Users\Public\workexpress.exe
WScript.exe
User:
admin
Integrity Level:
MEDIUM
2492"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa680.9403\Comprobante_PDF_2019_597EWS_FISCAL.js.js" C:\Windows\System32\WScript.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Total events
568
Read events
536
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2484WScript.exeC:\Users\Public\USEBDGY217\idtext
MD5:7C7C1BEB869A049BC5162064FD1363AA
SHA256:C8E7A5012ADC8D4DF957B5BD466288922EC0617D9E59BC3D77D6F4BF44C6E6E7
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:8FC46DEF898C0C145286863BD064CDFF
SHA256:CCD4CF95F3CD3EC15CB316539BDFE7453E298EADABB6B59847A45702D6FA83CE
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa680.9403\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:8FC46DEF898C0C145286863BD064CDFF
SHA256:CCD4CF95F3CD3EC15CB316539BDFE7453E298EADABB6B59847A45702D6FA83CE
2484WScript.exeC:\Users\Public\workexpress.exeexecutable
MD5:1CB5823F3F39F6FDFB67021E48F8822C
SHA256:A2A1EEA337FFDFCDC614D31FF1373586AD156552F14467C0C0606582C43F948F
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa680.6853\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:8FC46DEF898C0C145286863BD064CDFF
SHA256:CCD4CF95F3CD3EC15CB316539BDFE7453E298EADABB6B59847A45702D6FA83CE
2484WScript.exeC:\Users\Public\USEBDGY217\idwtext
MD5:AB6CA5A78CD39BF8699287B535E72595
SHA256:49B7905B38FE9A56996F8340BCEDBF62F50A6AA572A70C9BE031090E3905FE5E
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exeexecutable
MD5:79B804E8A81BFD9C6A3749B4F3EE86E2
SHA256:BFBDD26604FC653E01976EF23C92CF7ADB59F9E80F47350F1A72B7876BBED60A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2484
WScript.exe
GET
217.182.43.137:80
http://resortscancunv34zxpro.com.mx/cancun/portomarques.jpg
FR
malicious
2484
WScript.exe
GET
200
217.182.43.137:80
http://resortscancunv34zxpro.com.mx/cancun/portomarques.jpg
FR
executable
5.56 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3132
workexpress.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
2484
WScript.exe
217.182.43.137:80
resortscancunv34zxpro.com.mx
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
resortscancunv34zxpro.com.mx
  • 217.182.43.137
malicious
iplogger.org
  • 88.99.66.31
shared

Threats

PID
Process
Class
Message
2484
WScript.exe
Potential Corporate Privacy Violation
ET POLICY Suspicious EXE Download Content-Type image/jpeg
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS WinHttpRequest Downloading EXE
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from WinHttpRequest non-exe extension
2484
WScript.exe
A Network Trojan was detected
ET TROJAN Windows Executable Downloaded With Image Content-Type Header
2484
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
2484
WScript.exe
Potential Corporate Privacy Violation
ET POLICY Suspicious EXE Download Content-Type image/jpeg
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS WinHttpRequest Downloading EXE
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from WinHttpRequest non-exe extension
2484
WScript.exe
A Network Trojan was detected
ET TROJAN Windows Executable Downloaded With Image Content-Type Header
2484
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
2 ETPRO signatures available at the full report
No debug info