analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PL%2C_INV%2C_BL-PACKING_DOCUMENTS%2Cpdf.zip

Full analysis: https://app.any.run/tasks/aa948608-bd95-4072-ab6a-ca68cadc6204
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: July 12, 2020, 18:31:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

17BF1D1EB30A1020C0CDAD5E393D12D9

SHA1:

A25CDE38A2CB5C303D04FD95A9DC329D619815A8

SHA256:

A6648EC6FE21E85A64A16F562655CDC1F48FE06B27157968F6AE431250366EE9

SSDEEP:

6144:sifGAonD7QlHaRYH8mcSMUBWgeINbx02IbpruB3IzXBMpI9f3aI:sifM70THBWgJbiMBKXBV1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3832)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2232)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2876)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3972)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3096)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3452)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2344)
    • Uses Task Scheduler to run other applications

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2232)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 4052)
    • REMCOS was detected

      • vbc.exe (PID: 2540)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2232)
      • WinRAR.exe (PID: 2644)
    • Creates files in the user directory

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2232)
      • vbc.exe (PID: 2540)
    • Executes scripts

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2232)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3832)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2876)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3452)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2344)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3972)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3096)
    • Writes files like Keylogger logs

      • vbc.exe (PID: 2540)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:07:12 09:11:19
ZipCRC: 0x27e3d489
ZipCompressedSize: 211515
ZipUncompressedSize: 303616
ZipFileName: PL, INV, BL-PACKING DOCUMENTS,pdf.exe
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
16
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start drop and start drop and start start winrar.exe pl, inv, bl-packing documents,pdf.exe pl, inv, bl-packing documents,pdf.exe no specs schtasks.exe no specs #REMCOS vbc.exe vbc.exe no specs pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs vbc.exe no specs vbc.exe no specs vbc.exe no specs vbc.exe no specs vbc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2644"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\8ab6bda3-4529-401c-90c0-2742f8c33127.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2232"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3661\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3661\PL, INV, BL-PACKING DOCUMENTS,pdf.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
3832"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3775\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3775\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
4052"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bqrsxoTw" /XML "C:\Users\admin\AppData\Local\Temp\tmp8AA1.tmp"C:\Windows\System32\schtasks.exePL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2540"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Version:
14.7.3062.0
1692"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exePL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
1
Version:
14.7.3062.0
2876"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.14815\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.14815\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
2344"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.15086\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.15086\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
3096"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16236\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16236\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
3972"C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16316\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16316\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
Total events
546
Read events
527
Write events
19
Delete events
0

Modification events

(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2644) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2644) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\8ab6bda3-4529-401c-90c0-2742f8c33127.zip
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2644) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
8
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2232PL, INV, BL-PACKING DOCUMENTS,pdf.exeC:\Users\admin\AppData\Roaming\bqrsxoTw.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3775\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.14815\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16236\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2540vbc.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:72591240EDCC36F84793E6CE95131A61
SHA256:61B1285EC5235404E22E087485D8D47E9FE7EA6749D4C86E9E46B9086B4B350F
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.17236\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2232PL, INV, BL-PACKING DOCUMENTS,pdf.exeC:\Users\admin\AppData\Local\Temp\tmp8AA1.tmpxml
MD5:0978BE5169413A76FF4B8709B869EA8F
SHA256:3D76AF57F73E5097DD0ECAE2917523A9087C6B2BE2739F4109CA92BE32227235
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.15086\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.16316\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
2644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2644.3661\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
104
DNS requests
5
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2540
vbc.exe
185.244.30.19:1965
jamesanderson68986.ddns.net
malicious

DNS requests

Domain
IP
Reputation
jamesanderson68986.ddns.net
  • 185.244.30.19
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info