analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Product Specication.7z

Full analysis: https://app.any.run/tasks/2de1435d-663f-4248-bd51-c9dc9da6f71d
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: February 21, 2020, 16:18:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
exploit
CVE-2017-11882
trojan
rat
azorult
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

C73022492EEE329BE73E111D77F2A684

SHA1:

523364B27A7EE1FBFB532ED0497F2065A6B8072A

SHA256:

9879E2D3E88E7438236E325035B28AE5D7EB01C33FB4E8E7B2D0BFD82CF39203

SSDEEP:

192:pcbkJA6HCW90Yeckpc3rPYU/h0iSq0Pfo1G39cGLOgFPHTf9ZIKC:qb43CWoK3rR/VSq0no5GBFPQF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Suspicious connection from the Equation Editor

      • EQNEDT32.EXE (PID: 620)
    • Application was dropped or rewritten from another process

      • name.exe (PID: 3840)
      • name.exe (PID: 3424)
      • name.exe (PID: 3536)
      • name.exe (PID: 3952)
      • name.exe (PID: 3588)
      • name.exe (PID: 548)
      • name.exe (PID: 2652)
      • name.exe (PID: 2536)
      • name.exe (PID: 2064)
      • name.exe (PID: 2480)
      • name.exe (PID: 1296)
      • name.exe (PID: 1412)
      • name.exe (PID: 3436)
      • name.exe (PID: 1860)
      • name.exe (PID: 2840)
      • name.exe (PID: 1944)
      • name.exe (PID: 2848)
      • name.exe (PID: 1772)
      • name.exe (PID: 2696)
      • name.exe (PID: 3484)
      • name.exe (PID: 3868)
      • name.exe (PID: 440)
    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 620)
    • AZORULT was detected

      • name.exe (PID: 3424)
      • name.exe (PID: 3536)
      • name.exe (PID: 3952)
      • name.exe (PID: 548)
      • name.exe (PID: 3436)
      • name.exe (PID: 2536)
      • name.exe (PID: 2064)
      • name.exe (PID: 2480)
      • name.exe (PID: 2840)
      • name.exe (PID: 1412)
      • name.exe (PID: 2696)
      • name.exe (PID: 1772)
      • name.exe (PID: 1860)
      • name.exe (PID: 2848)
      • name.exe (PID: 3484)
      • name.exe (PID: 3868)
      • name.exe (PID: 440)
    • Connects to CnC server

      • name.exe (PID: 3952)
      • name.exe (PID: 3424)
      • name.exe (PID: 3536)
      • name.exe (PID: 548)
      • name.exe (PID: 2536)
      • name.exe (PID: 2064)
      • name.exe (PID: 2480)
      • name.exe (PID: 1412)
      • name.exe (PID: 3436)
      • name.exe (PID: 2840)
      • name.exe (PID: 1860)
      • name.exe (PID: 1772)
      • name.exe (PID: 2848)
      • name.exe (PID: 2696)
      • name.exe (PID: 3484)
      • name.exe (PID: 440)
      • name.exe (PID: 3868)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • EQNEDT32.EXE (PID: 620)
      • name.exe (PID: 3424)
      • name.exe (PID: 3536)
      • name.exe (PID: 3952)
      • name.exe (PID: 548)
      • name.exe (PID: 2480)
      • name.exe (PID: 2536)
      • name.exe (PID: 2064)
      • name.exe (PID: 3436)
      • name.exe (PID: 1412)
      • name.exe (PID: 2840)
      • name.exe (PID: 1860)
      • name.exe (PID: 2696)
      • name.exe (PID: 2848)
      • name.exe (PID: 1772)
      • name.exe (PID: 3868)
      • name.exe (PID: 3484)
      • name.exe (PID: 440)
    • Executed via COM

      • EQNEDT32.EXE (PID: 620)
    • Creates files in the user directory

      • EQNEDT32.EXE (PID: 620)
    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 620)
    • Application launched itself

      • name.exe (PID: 3840)
    • Connects to server without host name

      • name.exe (PID: 3536)
      • name.exe (PID: 3424)
      • name.exe (PID: 3952)
      • name.exe (PID: 548)
      • name.exe (PID: 2536)
      • name.exe (PID: 2480)
      • name.exe (PID: 2064)
      • name.exe (PID: 1412)
      • name.exe (PID: 3436)
      • name.exe (PID: 2840)
      • name.exe (PID: 2696)
      • name.exe (PID: 1860)
      • name.exe (PID: 2848)
      • name.exe (PID: 1772)
      • name.exe (PID: 3484)
      • name.exe (PID: 3868)
      • name.exe (PID: 440)
  • INFO

    • Manual execution by user

      • EXCEL.EXE (PID: 2636)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2636)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 2636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
25
Malicious processes
19
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs excel.exe no specs eqnedt32.exe name.exe no specs #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe name.exe no specs name.exe no specs #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe name.exe no specs #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe name.exe no specs #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe #AZORULT name.exe

Process information

PID
CMD
Path
Indicators
Parent process
3492"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Product Specication.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2636"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
620"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
3840"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exeEQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
3536"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exe
name.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3424"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exe
name.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3952"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exe
name.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3588"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exename.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2652"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exename.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
548"C:\Users\admin\AppData\Roaming\name.exe"C:\Users\admin\AppData\Roaming\name.exe
name.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
1 329
Read events
1 090
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
3492WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3492.40899\Product Specication.xlsx
MD5:
SHA256:
2636EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRABE8.tmp.cvr
MD5:
SHA256:
2636EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Product Specication.xlsx.LNK
MD5:
SHA256:
2636EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:04D116304E6D91673A1B1F0C7066D2D3
SHA256:336889845E156D748A48D6618214B027E6819F657A428D2A306E604AAF928990
620EQNEDT32.EXEC:\Users\admin\AppData\Roaming\name.exeexecutable
MD5:6C7A0902597EC60D68EB210643A5B6D8
SHA256:2B54318448A0DF8E939EC364B73D63D2A9E72E62FCC2D4E48B70EBC9D38726B4
620EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\bui[1].exeexecutable
MD5:6C7A0902597EC60D68EB210643A5B6D8
SHA256:2B54318448A0DF8E939EC364B73D63D2A9E72E62FCC2D4E48B70EBC9D38726B4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
34
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3424
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
2064
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
1412
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
548
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
2840
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
2536
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
1860
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
2840
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
3952
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
2480
name.exe
POST
217.160.59.64:80
http://217.160.59.64/index.php
DE
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3424
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
3536
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
620
EQNEDT32.EXE
208.115.234.234:80
yogeshcycles.com
Limestone Networks, Inc.
US
malicious
548
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
2536
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
2064
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
3952
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
2480
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
1860
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious
2840
name.exe
217.160.59.64:80
1&1 Internet SE
DE
malicious

DNS requests

Domain
IP
Reputation
yogeshcycles.com
  • 208.115.234.234
malicious

Threats

PID
Process
Class
Message
620
EQNEDT32.EXE
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
620
EQNEDT32.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3536
name.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
3536
name.exe
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.2 Client Checkin M3
3536
name.exe
A Network Trojan was detected
AV TROJAN AZORult CnC Beacon
3536
name.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult
3536
name.exe
Potentially Bad Traffic
ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
3536
name.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
3536
name.exe
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.2 Client Checkin M3
3536
name.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
17 ETPRO signatures available at the full report
No debug info