File name:

MALWARE AUTOIT.zip

Full analysis: https://app.any.run/tasks/12dead5a-fcc4-49ef-b6c6-30996b4930e0
Verdict: Malicious activity
Analysis date: November 27, 2019, 13:59:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

5008CB06095838FCC9510E8354BECDA0

SHA1:

DCC8FF439C64B6F00E4B0AD307C2456EECA0011D

SHA256:

91C2382D91BE44CC8E52D7D991C5EA888426DAB8319F972A6E28ABCF3FDD1ACD

SSDEEP:

12288:uJgygeDr33GkdDcJbbbiS74M6T/aMNVTCymuYSEH8M+33H:gpgefWScJXbi3DaMN9eu4+33H

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MicrosoftSecurity.exe (PID: 2912)
      • MicrosoftSecurity.exe (PID: 3824)
      • MicrosoftSecurity.exe (PID: 3028)
    • Changes the autorun value in the registry

      • MicrosoftSecurity.exe (PID: 3028)
      • MicrosoftSecurity.exe (PID: 3824)
  • SUSPICIOUS

    • Drop AutoIt3 executable file

      • WinRAR.exe (PID: 2172)
      • MicrosoftSecurity.exe (PID: 2912)
      • MicrosoftSecurity.exe (PID: 3824)
      • MicrosoftSecurity.exe (PID: 3028)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2172)
      • MicrosoftSecurity.exe (PID: 2912)
      • MicrosoftSecurity.exe (PID: 3824)
      • MicrosoftSecurity.exe (PID: 3028)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • MicrosoftSecurity.exe (PID: 2912)
      • MicrosoftSecurity.exe (PID: 3824)
      • MicrosoftSecurity.exe (PID: 3028)
    • Uses NETSH.EXE for network configuration

      • MicrosoftSecurity.exe (PID: 3824)
      • MicrosoftSecurity.exe (PID: 3028)
    • Starts CMD.EXE for commands execution

      • MicrosoftSecurity.exe (PID: 2912)
    • Creates files in the program directory

      • MicrosoftSecurity.exe (PID: 3824)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 1856)
      • cmd.exe (PID: 388)
      • MicrosoftSecurity.exe (PID: 2912)
      • cmd.exe (PID: 3524)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 2019:03:11 18:10:05
ZipCRC: 0x61baa77c
ZipCompressedSize: 237395
ZipUncompressedSize: 237320
ZipFileName: Microsoft.a3x
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
10
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winrar.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs microsoftsecurity.exe microsoftsecurity.exe cmd.exe no specs microsoftsecurity.exe netsh.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
388"C:\WINDOWS\system32\cmd.exe" /c start ..\Microsoft\MicrosoftSecurity.exe /AutoIt3ExecuteScript ..\Microsoft\Microsoft.a3x explorer String("%") & ChrW(25+42) & String("D") & ChrW(39+-2) & exitC:\WINDOWS\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
592"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\MicrosoftSecurity\MicrosoftSecurity.exe" "MicrosoftSecurity.exe" ENABLEC:\Windows\System32\netsh.exeMicrosoftSecurity.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1856"C:\WINDOWS\system32\cmd.exe" /c start ..\Microsoft\MicrosoftSecurity.exe /AutoIt3ExecuteScript ..\Microsoft\Microsoft.a3x explorer String("%") & ChrW(25+42) & String("D") & ChrW(39+-2) & exitC:\WINDOWS\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1944"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\MicrosoftSecurity\MicrosoftSecurity.exe" "MicrosoftSecurity.exe" ENABLEC:\Windows\System32\netsh.exeMicrosoftSecurity.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2172"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\MALWARE AUTOIT.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2600"C:\Windows\System32\cmd.exe" /c start C:\MicrosoftSecurity/MicrosoftSecurity.exe C:\MicrosoftSecurity/Microsoft.a3xC:\Windows\System32\cmd.exeMicrosoftSecurity.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2912"C:\Users\admin\Desktop\MicrosoftSecurity.exe" C:\Users\admin\Desktop\Microsoft.a3xC:\Users\admin\Desktop\MicrosoftSecurity.exe
explorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 8, 1
Modules
Images
c:\users\admin\desktop\microsoftsecurity.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3028C:\MicrosoftSecurity/MicrosoftSecurity.exe C:\MicrosoftSecurity/Microsoft.a3xC:\MicrosoftSecurity\MicrosoftSecurity.exe
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 8, 1
Modules
Images
c:\microsoftsecurity\microsoftsecurity.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
3524"C:\WINDOWS\system32\cmd.exe" /c start C:\MicrosoftSecurity\MicrosoftSecurity.exe C:\MicrosoftSecurity\Microsoft.a3x & exitC:\WINDOWS\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9059
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3824"C:\MicrosoftSecurity\MicrosoftSecurity.exe" /AutoIt3ExecuteScript C:\MicrosoftSecurity\Microsoft.a3xC:\MicrosoftSecurity\MicrosoftSecurity.exe
MicrosoftSecurity.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 8, 1
Modules
Images
c:\microsoftsecurity\microsoftsecurity.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
Total events
1 197
Read events
1 069
Write events
128
Delete events
0

Modification events

(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2172) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\MALWARE AUTOIT.zip
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2172) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2912) MicrosoftSecurity.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2912) MicrosoftSecurity.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
4
Suspicious files
0
Text files
24
Unknown types
57

Dropped files

PID
Process
Filename
Type
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2172.17958\MicrosoftUpdate.lnk
MD5:
SHA256:
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2172.17958\My Music.lnk
MD5:
SHA256:
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2172.17958\My Pictures.lnk
MD5:
SHA256:
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2172.17958\My Reports.lnk
MD5:
SHA256:
2172WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2172.17958\Statments.lnk
MD5:
SHA256:
2912MicrosoftSecurity.exeC:\Users\admin\AppData\Local\Temp\aut1840.tmp
MD5:
SHA256:
2912MicrosoftSecurity.exeC:\Users\admin\AppData\Local\Temp\gcxgswu
MD5:
SHA256:
2912MicrosoftSecurity.exeC:\MicrosoftSecurity\commercialmillion.rtftext
MD5:
SHA256:
2912MicrosoftSecurity.exeC:\MicrosoftSecurity\backgroundfor.jpgimage
MD5:
SHA256:
3824MicrosoftSecurity.exeC:\Users\admin\AppData\Local\Temp\aut19A8.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3824
MicrosoftSecurity.exe
5.198.247.202:1212
chromeupdate.servepics.com
Batelco Jordan
JO
unknown

DNS requests

Domain
IP
Reputation
chromeupdate.servepics.com
  • 5.198.247.202
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.servepics .com
No debug info