File name: | Sample1.zip |
Full analysis: | https://app.any.run/tasks/eeaf93ca-fd56-4549-ab3a-42c1ce8b51cd |
Verdict: | Malicious activity |
Analysis date: | August 13, 2019, 18:24:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 8AD556C4C812EE26B292781455F9D10C |
SHA1: | D571C861BCB4E64BD407452066674EF91D8F8CCA |
SHA256: | 9186846918AFFF4DE7365241CCF02893D70BD1B9B8A42833D5FDA1B38B04A165 |
SSDEEP: | 1536:yYSLP6Q9T/auGpohF7j9pHESg+UzieXHWBJ9v5yEC:yVLPJT/auGqY+eXHWBBC |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | aac8a6719be8a2a521ebbdce6ae8e8b628864a2240b8be81c5093f1fdaa6d2f4.bin |
---|---|
ZipUncompressedSize: | 105984 |
ZipCompressedSize: | 54336 |
ZipCRC: | 0x40180e1b |
ZipModifyDate: | 2019:08:13 18:22:02 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0001 |
ZipRequiredVersion: | 788 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2976 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Sample1.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
3504 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\ayy.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3564 | "C:\Windows\System32\wbem\wmic.exe" process list /format:"aRyZUbk.pdf" | C:\Windows\System32\wbem\wmic.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 2147614729 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2976 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2976.19322\aac8a6719be8a2a521ebbdce6ae8e8b628864a2240b8be81c5093f1fdaa6d2f4.bin | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR3E17.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\Desktop\aRyZUbk.pdf | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:BF5190F8289D6BF67AD3F1DFC9FFC77C | SHA256:7C4163D0118D50C17F74FBB366E9FDEB063E1DE71C5137F36D4A89468E2C3217 | |||
3504 | WINWORD.EXE | C:\Users\admin\Desktop\~$ayy.doc | pgc | |
MD5:3D36AC74873831F3E90372AB53967D49 | SHA256:6A52340BA6A42E7A310A847751D55A6D9E6221F8DAFD2FECD5747EEC41B043AF | |||
3504 | WINWORD.EXE | C:\Users\admin\Desktop\aRyZUbk.pdf.xsl | xml | |
MD5:DDA3B796A206B3E0212AC72CBA846DAE | SHA256:503F162805AE5BD6FDA0F4EAB8173A06169D8D568B103172BB6329A3B67F051A | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:DF0D0B8620CE4D0B09A7EFA5FD1EB4D6 | SHA256:2E184D863A647956A98D572FF7B00910AF25E9D5252FDD8CF12E30DFB5214CF7 | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:884C4F83359ACA01DB7C4FC4C9CFAA9B | SHA256:906877644AFFCC24531FAD0059E6B368BED2EB8616D8F69DA0F03E6B7291DE9D | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\ayy.doc.LNK | lnk | |
MD5:73F42408C6C6A11D0A2ED52A0F5C522A | SHA256:559D58CFAED8EC4C79A5C9069656589EF38436C01ECADC7A63D23E54FC7B51BD |
Domain | IP | Reputation |
---|---|---|
m2048javon18.com |
| malicious |