analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FACTURA SEPTIEMBRE.7z

Full analysis: https://app.any.run/tasks/1f0df02c-226a-4266-94ef-cb931dbd939a
Verdict: Malicious activity
Analysis date: September 12, 2019, 21:59:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

349C137732E3513559EF1F2CBA5C9D18

SHA1:

5C0A6A1FF8CA28495212E73C1088137271E26208

SHA256:

811F01B8E2459EC7EF9F03E0BB4F27A7CDD272EE7F25D623B5EF12BA8E13A007

SSDEEP:

6144:Qx6E0v2apIyGqZVHhODmVJFjRqIg8Hs+g8qUt4:Qx6vCkfHl7BJg8MI4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • FACTURA SEPTIEMBRE 7655.exe (PID: 3208)
      • FACTURA SEPTIEMBRE 7655.exe (PID: 3992)
      • Host.exe (PID: 3272)
      • Host.exe (PID: 704)
    • Changes the autorun value in the registry

      • Host.exe (PID: 704)
  • SUSPICIOUS

    • Application launched itself

      • FACTURA SEPTIEMBRE 7655.exe (PID: 3208)
      • Host.exe (PID: 3272)
    • Starts itself from another location

      • FACTURA SEPTIEMBRE 7655.exe (PID: 3992)
    • Creates files in the user directory

      • FACTURA SEPTIEMBRE 7655.exe (PID: 3992)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3376)
      • FACTURA SEPTIEMBRE 7655.exe (PID: 3992)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
5
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe factura septiembre 7655.exe no specs factura septiembre 7655.exe host.exe no specs host.exe

Process information

PID
CMD
Path
Indicators
Parent process
3376"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\FACTURA SEPTIEMBRE.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3208"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.12285\FACTURA SEPTIEMBRE 7655.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.12285\FACTURA SEPTIEMBRE 7655.exeWinRAR.exe
User:
admin
Company:
Drissinagolohypotension
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.06.0007
3992"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.12285\FACTURA SEPTIEMBRE 7655.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.12285\FACTURA SEPTIEMBRE 7655.exe
FACTURA SEPTIEMBRE 7655.exe
User:
admin
Company:
Drissinagolohypotension
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.06.0007
3272"C:\Users\admin\AppData\Roaming\Install\Host.exe"C:\Users\admin\AppData\Roaming\Install\Host.exeFACTURA SEPTIEMBRE 7655.exe
User:
admin
Company:
Drissinagolohypotension
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.06.0007
704"C:\Users\admin\AppData\Roaming\Install\Host.exe"C:\Users\admin\AppData\Roaming\Install\Host.exe
Host.exe
User:
admin
Company:
Drissinagolohypotension
Integrity Level:
MEDIUM
Version:
1.06.0007
Total events
437
Read events
423
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3376WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3376.12285\FACTURA SEPTIEMBRE 7655.exeexecutable
MD5:A4EACA7260054EAAB8DA203E880789D5
SHA256:8DA73D104CCE24ADD1159E275469A9E5BD80EE087DDAC34CFAB9EA48546F02AE
3992FACTURA SEPTIEMBRE 7655.exeC:\Users\admin\AppData\Roaming\Install\Host.exeexecutable
MD5:A4EACA7260054EAAB8DA203E880789D5
SHA256:8DA73D104CCE24ADD1159E275469A9E5BD80EE087DDAC34CFAB9EA48546F02AE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
704
Host.exe
185.165.153.219:32002
wow1234.duckdns.org
NL
malicious

DNS requests

Domain
IP
Reputation
wow1234.duckdns.org
  • 185.165.153.219
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info