File name: | Proposta.zip |
Full analysis: | https://app.any.run/tasks/217d4c71-6064-4f88-83e5-58ba03a5f61f |
Verdict: | Malicious activity |
Analysis date: | December 14, 2018, 18:03:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 7CF3B686F1134DB13B32996AE3FD5C0B |
SHA1: | 71459BB3C0DC067E6A978BE0DB48747286420D84 |
SHA256: | 93E033F9F66858A4DC3394DB9B1980026335280B1FD63653E6004F7715D0C8F8 |
SSDEEP: | 12:5joVgj4YcTegeeOePNUkGCijwob3UMIYiv+U0bZW5CgUX9Fd1KHlJa+:9eT1eATGbM43UNHv+U0bZWURX9Fm/ |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | - |
ZipCompression: | Deflated |
ZipModifyDate: | 2018:12:14 06:44:03 |
ZipCRC: | 0x4fa66c66 |
ZipCompressedSize: | 480 |
ZipUncompressedSize: | 2774 |
ZipFileName: | Propostactn5893T.cmd |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2984 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Proposta.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
2872 | cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa2984.16618\Propostactn5893T.cmd" " | C:\Windows\system32\cmd.exe | — | WinRAR.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3512 | C:\Windows\system32\cmd.exe /S /D /c" echo %TePPolS% " | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3576 | WindowsPowerShell\v1.0\powershell.exe -nop -win 1 - | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3552 | "C:\Windows\System32\NOTEPAD.EXE" C:\Users\admin\Desktop\Propostactn5893T.cmd | C:\Windows\System32\NOTEPAD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3576 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DS1ZITZ8682GT0430QOQ.temp | — | |
MD5:— | SHA256:— | |||
2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.17371\Propostactn5893T.cmd | — | |
MD5:— | SHA256:— | |||
3576 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:6073B6FC66D2E68644893344F6904E4A | SHA256:0F2F61C8DFC3A20C7A5E5133C19BA1493441440E5477254273F28F6F668E64B3 | |||
3576 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF249616.TMP | binary | |
MD5:6073B6FC66D2E68644893344F6904E4A | SHA256:0F2F61C8DFC3A20C7A5E5133C19BA1493441440E5477254273F28F6F668E64B3 | |||
2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa2984.16618\Propostactn5893T.cmd | text | |
MD5:214CA8AFD233ECE2D96DF3657479E8A6 | SHA256:E82713505DF9F8C1C26284CBB85C05A07CDD23A6768F1D51BEAE807494329500 | |||
3576 | powershell.exe | C:\Users\admin\admin\ONCcVmDq.zip | binary | |
MD5:684051FD047A95FD508CAB2FAF9C3F7F | SHA256:E0351E64D3BC2282BF89AAA5FC4C966B02DBF4B7D78D3775DA2329DC5047C379 | |||
3576 | powershell.exe | C:\ProgramData\201812.14aP | text | |
MD5:81051BCC2CF1BEDF378224B0A93E2877 | SHA256:7EB70257593DA06F682A3DDDA54A9D260D4FC514F645237F5CA74B08F8DA61A6 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3576 | powershell.exe | GET | 200 | 167.114.128.37:80 | http://dezevoltsquisk.club/bals/index.php?o=YmFscw== | CA | text | 8.02 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3576 | powershell.exe | 167.114.128.37:80 | dezevoltsquisk.club | OVH SAS | CA | malicious |
3576 | powershell.exe | 51.15.98.191:443 | esteticacoservadagold.club | Online S.a.s. | FR | unknown |
Domain | IP | Reputation |
---|---|---|
dezevoltsquisk.club |
| malicious |
esteticacoservadagold.club |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
3576 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] PS/TrojanDownloader.Agent.NNR PowerShell Startup Persistence |