File name:

Comprobante_PDF_2019_597EWS_FISCAL.js.zip

Full analysis: https://app.any.run/tasks/e00c46e7-3216-48cd-a2b9-4d828fe28799
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 25, 2019, 17:40:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

4D8114132B293F890F95FC8866A1F345

SHA1:

1B9BDE89BE7174F3B22335D8A5C7DFB0DA22C498

SHA256:

7E13BAE6DD60EE5C887A0AA864E469BDEDDD22C80DC64C9B5A124CB667BA8E34

SSDEEP:

3072:3k63wqARxiVoAsZ854hDHOa639wLbTyIhuJzBT:3k4wqARoVoAsuKhDHOa6NYz0pl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • GoogleUpdate.exe (PID: 1584)
      • workexpress.exe (PID: 3132)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 2484)
  • SUSPICIOUS

    • Executes scripts

      • WinRAR.exe (PID: 680)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 680)
      • WScript.exe (PID: 2484)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2019:04:25 11:22:18
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Comprobante_PDF_2019_597EWS_FISCAL.js/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe wscript.exe googleupdate.exe no specs workexpress.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Comprobante_PDF_2019_597EWS_FISCAL.js.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1584"C:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exeWinRAR.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Installer
Exit code:
2147942402
Version:
1.3.33.23
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa680.7731\comprobante_pdf_2019_597ews_fiscal.js\ghjts3556er\googleupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2484"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa680.6853\Comprobante_PDF_2019_597EWS_FISCAL.js.js" C:\Windows\System32\WScript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2492"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa680.9403\Comprobante_PDF_2019_597EWS_FISCAL.js.js" C:\Windows\System32\WScript.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3132C:\Users\Public\workexpress.exeC:\Users\Public\workexpress.exe
WScript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\public\workexpress.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
568
Read events
536
Write events
32
Delete events
0

Modification events

(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(680) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Comprobante_PDF_2019_597EWS_FISCAL.js.zip
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(680) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\wshext.dll,-4804
Value:
JScript Script File
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
2
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:
SHA256:
2484WScript.exeC:\Users\Public\USEBDGY217\idtext
MD5:
SHA256:
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa680.9403\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:
SHA256:
2484WScript.exeC:\Users\Public\workexpress.exeexecutable
MD5:
SHA256:
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa680.6853\Comprobante_PDF_2019_597EWS_FISCAL.js.jstext
MD5:
SHA256:
2484WScript.exeC:\Users\Public\USEBDGY217\idwtext
MD5:AB6CA5A78CD39BF8699287B535E72595
SHA256:49B7905B38FE9A56996F8340BCEDBF62F50A6AA572A70C9BE031090E3905FE5E
680WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa680.7731\Comprobante_PDF_2019_597EWS_FISCAL.js\GHJTS3556ER\GoogleUpdate.exeexecutable
MD5:79B804E8A81BFD9C6A3749B4F3EE86E2
SHA256:BFBDD26604FC653E01976EF23C92CF7ADB59F9E80F47350F1A72B7876BBED60A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
2
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2484
WScript.exe
GET
217.182.43.137:80
http://resortscancunv34zxpro.com.mx/cancun/portomarques.jpg
FR
malicious
2484
WScript.exe
GET
200
217.182.43.137:80
http://resortscancunv34zxpro.com.mx/cancun/portomarques.jpg
FR
executable
5.56 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2484
WScript.exe
217.182.43.137:80
resortscancunv34zxpro.com.mx
OVH SAS
FR
suspicious
3132
workexpress.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
resortscancunv34zxpro.com.mx
  • 217.182.43.137
malicious
iplogger.org
  • 88.99.66.31
shared

Threats

PID
Process
Class
Message
2484
WScript.exe
Potential Corporate Privacy Violation
ET POLICY Suspicious EXE Download Content-Type image/jpeg
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS WinHttpRequest Downloading EXE
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from WinHttpRequest non-exe extension
2484
WScript.exe
A Network Trojan was detected
ET TROJAN Windows Executable Downloaded With Image Content-Type Header
2484
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
2484
WScript.exe
Potential Corporate Privacy Violation
ET POLICY Suspicious EXE Download Content-Type image/jpeg
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS WinHttpRequest Downloading EXE
2484
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from WinHttpRequest non-exe extension
2484
WScript.exe
A Network Trojan was detected
ET TROJAN Windows Executable Downloaded With Image Content-Type Header
2484
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
2 ETPRO signatures available at the full report
No debug info