File name:

account_invoice_may2019.zip

Full analysis: https://app.any.run/tasks/8942470c-f218-44c2-b139-6d11387f6e6c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 20, 2019, 12:31:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

3F91C575BE180FF8A9E801AA8C479AC0

SHA1:

6AD0A0A26880A011803894D17EA21244A464D192

SHA256:

87A7EAE0D1963BF42E84394F8670FF8B667EDE6ED4B9520FC85E003EAE4B7D38

SSDEEP:

1536:hHmZanqqFYWL8muVFCgQ/XuWbIg4FjbUK2ZVs8pkgcQZT9iTzWfpMs1b:hHmZaqq2g8nV8D/+WbIgM3yrVkg/Zeze

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • wprgxyeqd79.exe (PID: 3132)
      • rtegre.exe (PID: 3172)
    • Loads dropped or rewritten executable

      • WinRAR.exe (PID: 3372)
      • EXCEL.EXE (PID: 3048)
      • wprgxyeqd79.exe (PID: 3132)
      • rtegre.exe (PID: 3172)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3048)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3048)
    • Stealing of credential data

      • rtegre.exe (PID: 3172)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 3372)
    • Executable content was dropped or overwritten

      • wprgxyeqd79.exe (PID: 3132)
    • Loads DLL from Mozilla Firefox

      • rtegre.exe (PID: 3172)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3048)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3048)
    • Dropped object may contain Bitcoin addresses

      • EXCEL.EXE (PID: 3048)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:05:16 11:01:11
ZipCRC: 0xf5295efb
ZipCompressedSize: 88686
ZipUncompressedSize: 179200
ZipFileName: account_invoice_may2019.xls
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs excel.exe wprgxyeqd79.exe rtegre.exe

Process information

PID
CMD
Path
Indicators
Parent process
3048"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
3132C:\Users\Public\wprgxyeqd79.exeC:\Users\Public\wprgxyeqd79.exe
EXCEL.EXE
User:
admin
Company:
Miranda IM
Integrity Level:
MEDIUM
Description:
Tile Textheight Clipbook Mostly Wading
Exit code:
0
Version:
8.7.56.236
Modules
Images
c:\users\public\wprgxyeqd79.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3172C:\Users\Public\rtegre.exeC:\Users\Public\rtegre.exe
EXCEL.EXE
User:
admin
Company:
x264 project
Integrity Level:
MEDIUM
Description:
Nkcreatestaticmapping Aboriginal Year
Exit code:
0
Version:
5.7.3.790
Modules
Images
c:\users\public\rtegre.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3372"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\account_invoice_may2019.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
1 045
Read events
993
Write events
45
Delete events
7

Modification events

(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3372) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\account_invoice_may2019.zip
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3372) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3372) WinRAR.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:EXCELFiles
Value:
1320419345
(PID) Process:(3048) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:+s=
Value:
2B733D00E80B0000010000000000000000000000
Executable files
5
Suspicious files
1
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3048EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR337C.tmp.cvr
MD5:
SHA256:
3172rtegre.exeC:\Users\admin\AppData\Local\Temp\{8BC2BF45-ABFD-43A2-8DDD-71C75AF9BA15}\1870088882.dll
MD5:
SHA256:
3172rtegre.exeC:\Users\admin\AppData\Local\Temp\{8BC2BF45-ABFD-43A2-8DDD-71C75AF9BA15}\log
MD5:
SHA256:
3048EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\ananas[1].exeexecutable
MD5:
SHA256:
3372WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3372.3927\account_invoice_may2019.xlsdocument
MD5:
SHA256:
3048EXCEL.EXEC:\Users\Public\wprgxyeqd79.exeexecutable
MD5:
SHA256:
3172rtegre.exeC:\Users\admin\AppData\Local\Temp\{8BC2BF45-ABFD-43A2-8DDD-71C75AF9BA15}\tempsqlite
MD5:
SHA256:
3048EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\pasmmm[1].exeexecutable
MD5:
SHA256:
3048EXCEL.EXEC:\Users\Public\rtegre.exeexecutable
MD5:
SHA256:
3132wprgxyeqd79.exeC:\Users\admin\AppData\Local\Temp\1D86.tmpexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
26
DNS requests
3
Threats
62

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3172
rtegre.exe
GET
51.89.6.40:80
http://51.89.6.40/tor/server/fp/592031cfdba17dd46e1e365e6c60ad1f81655033
GB
suspicious
3172
rtegre.exe
GET
104.251.250.115:80
http://104.251.250.115/tor/server/fp/495985474f547b5d97acb2941c7aed048d7e7e14
US
suspicious
3172
rtegre.exe
GET
50.31.252.28:80
http://50.31.252.28/tor/server/fp/99339f3e68bccc1391bf14c821d80766fe0c5956
JP
suspicious
3172
rtegre.exe
GET
178.32.223.22:80
http://178.32.223.22/tor/server/fp/9ba84e8c90083676f86c7427c8d105925f13716c
FR
suspicious
3172
rtegre.exe
GET
91.213.8.89:80
http://91.213.8.89/tor/server/fp/c5d55d11f26c52a6bfee8dd23c250548aa67e9ac
UA
suspicious
3172
rtegre.exe
GET
154.35.175.225:80
http://154.35.175.225/tor/status-vote/current/consensus
US
malicious
3172
rtegre.exe
GET
199.115.114.70:80
http://199.115.114.70/tor/server/fp/333a7738ccf02ec7041934924f0f5ed9a063a9c3
US
suspicious
3172
rtegre.exe
GET
212.47.254.236:80
http://212.47.254.236/tor/server/fp/132632816204671cd7bc0a884c53df4fd3d7bf66
FR
suspicious
3172
rtegre.exe
GET
145.239.91.37:80
http://145.239.91.37/tor/server/fp/0ad5dc3c47cad362e5682f7fbd5e2e28b2d49899
PL
suspicious
3172
rtegre.exe
GET
51.89.139.63:80
http://51.89.139.63/tor/server/fp/b3cf08e9df70d46bbeb5165a42d087db352275dd
GB
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3048
EXCEL.EXE
47.245.58.124:443
kentona.su
US
suspicious
3172
rtegre.exe
154.35.175.225:80
Rethem Hosting LLC
US
malicious
3172
rtegre.exe
50.16.229.140:443
api.ipify.org
Amazon.com, Inc.
US
malicious
3172
rtegre.exe
93.95.100.166:443
JSC Mediasoft ekspert
RU
suspicious
3172
rtegre.exe
91.213.8.89:80
PE Ivanov Vitaliy Sergeevich
UA
suspicious
3172
rtegre.exe
129.6.15.28:13
time-a.nist.gov
National Bureau of Standards
US
unknown
3172
rtegre.exe
50.31.252.28:80
Hosting Services, Inc.
JP
suspicious
3172
rtegre.exe
199.115.114.70:80
Leaseweb USA, Inc.
US
suspicious
3172
rtegre.exe
46.28.110.244:80
WEDOS Internet, a.s.
CZ
suspicious
3172
rtegre.exe
199.249.230.70:80
Quintex Alliance Consulting
US
suspicious

DNS requests

Domain
IP
Reputation
kentona.su
  • 47.245.58.124
malicious
api.ipify.org
  • 50.16.229.140
  • 23.21.121.219
  • 54.204.36.156
  • 107.22.215.20
  • 50.19.247.198
  • 54.225.171.237
  • 54.243.198.12
  • 54.243.147.226
shared
time-a.nist.gov
  • 129.6.15.28
whitelisted

Threats

PID
Process
Class
Message
1056
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
3172
rtegre.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 161
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3172
rtegre.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 682
3172
rtegre.exe
Potential Corporate Privacy Violation
ET P2P Tor Get Server Request
1 ETPRO signatures available at the full report
No debug info