analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

upwork1

Full analysis: https://app.any.run/tasks/7a404c7f-6182-4b75-976e-215e6c3da662
Verdict: Malicious activity
Analysis date: May 20, 2022, 23:02:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with CRLF line terminators
MD5:

B8DD5BBB5B79D1CBE0350452574F155A

SHA1:

3E60BF86E873E03D6C65E2BEAE8D32668562359B

SHA256:

9BAE55F07001A9268E1C4F8612671D19594BB31D699C6813A3206FA6A7808770

SSDEEP:

6:h4QboY+oMOO2Rg9AtJav1uZKaoJTwMGNAFKUYUHPGb:hPQofRgitoao5cUVPGb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 3184)
    • Application was dropped or rewritten from another process

      • Project Info.scr (PID: 2480)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3808)
      • iexplore.exe (PID: 2280)
      • iexplore.exe (PID: 3772)
    • Checks supported languages

      • WinRAR.exe (PID: 3184)
      • Project Info.scr (PID: 2480)
    • Reads the computer name

      • WinRAR.exe (PID: 3184)
      • Project Info.scr (PID: 2480)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3184)
    • Executed via COM

      • DllHost.exe (PID: 3800)
    • Starts application with an unusual extension

      • rundll32.exe (PID: 3092)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3184)
    • Reads Environment values

      • Project Info.scr (PID: 2480)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 3808)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 3772)
      • iexplore.exe (PID: 2280)
      • rundll32.exe (PID: 3092)
      • DllHost.exe (PID: 3800)
    • Checks supported languages

      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 3808)
      • iexplore.exe (PID: 3772)
      • iexplore.exe (PID: 2280)
      • DllHost.exe (PID: 3800)
      • rundll32.exe (PID: 3092)
    • Application launched itself

      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 3808)
    • Changes internet zones settings

      • iexplore.exe (PID: 924)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3808)
      • iexplore.exe (PID: 2280)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3772)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 2280)
      • iexplore.exe (PID: 3808)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 924)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3772)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 2280)
      • iexplore.exe (PID: 3808)
      • Project Info.scr (PID: 2480)
    • Manual execution by user

      • WinRAR.exe (PID: 3184)
      • rundll32.exe (PID: 3092)
    • Creates files in the user directory

      • iexplore.exe (PID: 924)
    • Changes settings of System certificates

      • iexplore.exe (PID: 924)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

Refresh: 2; url = https://zarkai.com/upwork1/Mobile.zip
Title: Upwork Requirements
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe iexplore.exe winrar.exe PhotoViewer.dll no specs rundll32.exe no specs project info.scr

Process information

PID
CMD
Path
Indicators
Parent process
924"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\admin\AppData\Local\Temp\upwork1.html"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3808"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:924 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3772"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:924 CREDAT:333057 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2280"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:924 CREDAT:144390 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3184"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Downloads\Mobile.zip" C:\Users\admin\Downloads\Mobile\C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3800C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3092"rundll32.exe" desk.cpl,InstallScreenSaver C:\Users\admin\Downloads\Mobile\mobile\Project Info.scrC:\Windows\system32\rundll32.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2480"C:\Users\admin\Downloads\Mobile\mobile\Project Info.scr" /p 262846C:\Users\admin\Downloads\Mobile\mobile\Project Info.scr
rundll32.exe
User:
admin
Integrity Level:
MEDIUM
Description:
InventoryProgram
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\mobile\mobile\project info.scr
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
22 613
Read events
22 306
Write events
305
Delete events
2

Modification events

(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30960797
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30960797
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(924) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
1
Suspicious files
17
Text files
22
Unknown types
9

Dropped files

PID
Process
Filename
Type
3772iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAder
MD5:D5E270D74DBADE0F3350ED531128DC9A
SHA256:C242010C3AB0A663751A5F035A19D1A3A5FAB13ABD2E13D5AF97A49D63C09FB5
3772iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691der
MD5:D9AD86C16BB8DF5F783C447663F752E9
SHA256:05FBF77343768D2E2079347876363E50A9D3F35A365183019212B8F42530F0AE
3772iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\Mobile[1].zipcompressed
MD5:44B5FDD0E8B6A6710627785DE1397697
SHA256:DD5E4DA52A60F1AE59BFA53A3E0D05D4C551F28D370F7EAD699851FDF0AEC578
3772iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:C3A628B64EBC53A027134689E0C35EFE
SHA256:98B3240F2129E9DF2295BF08051C9182456087F0EF33145399B718C17B7AC898
3772iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAbinary
MD5:C12752E91B1B53D449BC4938CABFCEBD
SHA256:9A4E2D091F7750738196B3F8AC54A7B3BD9B42F8C574B26DEE808EED162D9325
924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{E212BF9A-D890-11EC-8695-18C4897E77EE}.datbinary
MD5:606D6538BCBFE8F3E324556D7DA9A6F0
SHA256:1C24121E97E64CF5C21D54CE64B8117C5C3D96C6C49AFD9AC90B9AA281AE4A99
3772iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691binary
MD5:50368D53BB94740D415C075EA2D3B246
SHA256:14B3D1091D5398208FD24FDFCB17257A5EF256E3D5690BFEADC3BB1CD7BBCE6C
924iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF89CBD8427CE904FE.TMPgmc
MD5:9151218D18A7D3F24C00783BAE302AC0
SHA256:BD4FC078DEA7C7AFA838EAF2F5A114DCF2F9038AC551BD590B0A23B88167B06A
3772iexplore.exeC:\Users\admin\Downloads\Mobile.zip.e6xmxbi.partialcompressed
MD5:9A2A1C67A6B8CF0066E286EF12CB80AC
SHA256:0A8B3ADA5A8876E53A7280DD3A5C95B12120B3DE416AC5E4B9C21A30CB69AF9B
924iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:3914AD71E78F8C9F2B192AD8B0A46D7A
SHA256:AB61D7D2809F0B4D57638CD78C8CCC36431D45D52E74F4827EAE7081BCBFD87C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
24
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3772
iexplore.exe
GET
200
172.64.155.188:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEGfe9D7xe9riT%2FWUBgbSwIQ%3D
US
der
471 b
whitelisted
924
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3772
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9821b281a62b84bb
US
compressed
4.70 Kb
whitelisted
3772
iexplore.exe
GET
200
172.64.155.188:80
http://ocsp.comodoca.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCEQDwHUvue3yjezwFZqwFlyRY
US
der
728 b
whitelisted
924
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e8b2a2d22bb01ab4
US
compressed
4.70 Kb
whitelisted
924
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
US
der
471 b
whitelisted
3772
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?790639385af19279
US
compressed
4.70 Kb
whitelisted
924
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
924
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1e99a519cecb2e10
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3772
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
924
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
924
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
924
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3772
iexplore.exe
172.64.155.188:80
ocsp.comodoca.com
US
suspicious
3772
iexplore.exe
95.111.231.140:443
zarkai.com
Intertelecom Ltd
UA
unknown
2280
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
924
iexplore.exe
204.79.197.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
2480
Project Info.scr
180.188.192.80:443
burgercircus.com.hk
i-System Technology Limited
HK
unknown
3808
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
zarkai.com
  • 95.111.231.140
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.comodoca.com
  • 172.64.155.188
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
burgercircus.com.hk
  • 180.188.192.80
unknown
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

No threats detected
No debug info