File name:

4579042028453888.zip

Full analysis: https://app.any.run/tasks/960e38ca-c4df-4e45-b2fb-669e2cacac11
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 20, 2020, 09:15:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
emotet
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

C8D97A519275D0744D7B3C3213812652

SHA1:

DD767A02F6D96B7203F4905021692E7733A04B4D

SHA256:

924FEB832DC66E7903BA2B420EE63E10BB836A370C2DA1D33AC168560118E20F

SSDEEP:

12288:fg0XPa7ziL4HYA/v14aBboCc/71HjYOs4yY47:hy6CY0yj/7tjjF47

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe (PID: 2192)
      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
    • EMOTET was detected

      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
    • Changes the autorun value in the registry

      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
    • Connects to CnC server

      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
  • SUSPICIOUS

    • Starts itself from another location

      • 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe (PID: 2192)
    • Executable content was dropped or overwritten

      • 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe (PID: 2192)
    • Reads Internet Cache Settings

      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
    • Connects to server without host name

      • api-ms-win-core-string-l1-1-0.exe (PID: 1864)
  • INFO

    • Manual execution by user

      • 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe (PID: 2192)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (99.9)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0xfe6da151
ZipCompressedSize: 431794
ZipUncompressedSize: 731136
ZipFileName: 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs 9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe #EMOTET api-ms-win-core-string-l1-1-0.exe

Process information

PID
CMD
Path
Indicators
Parent process
1864"C:\Users\admin\AppData\Local\AuthFWSnapin\api-ms-win-core-string-l1-1-0.exe"C:\Users\admin\AppData\Local\AuthFWSnapin\api-ms-win-core-string-l1-1-0.exe
9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AdvancedTaskManager MFC Application
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\authfwsnapin\api-ms-win-core-string-l1-1-0.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2192"C:\Users\admin\Desktop\9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe" C:\Users\admin\Desktop\9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2496"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\4579042028453888.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
509
Read events
483
Write events
26
Delete events
0

Modification events

(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2496) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\4579042028453888.zip
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2496.18191\9065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a
MD5:
SHA256:
21929065ee76509738d4f5146f40909b0a72e66ea50b315bc155974e3157ee0bae8a.exeC:\Users\admin\AppData\Local\AuthFWSnapin\api-ms-win-core-string-l1-1-0.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
0
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1864
api-ms-win-core-string-l1-1-0.exe
POST
200
186.189.249.2:80
http://186.189.249.2/M5jOxbtr4/JG1wa0SEmUtoVyMk/
AR
binary
132 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1864
api-ms-win-core-string-l1-1-0.exe
186.189.249.2:80
AR
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
1864
api-ms-win-core-string-l1-1-0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Emotet
1 ETPRO signatures available at the full report
No debug info