analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PL%2C_INV%2C_BL-PACKING_DOCUMENTS%2Cpdf(1).zip

Full analysis: https://app.any.run/tasks/c5fd7a13-15a1-47f6-ae6e-0b659b171985
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: July 13, 2020, 02:17:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

17BF1D1EB30A1020C0CDAD5E393D12D9

SHA1:

A25CDE38A2CB5C303D04FD95A9DC329D619815A8

SHA256:

A6648EC6FE21E85A64A16F562655CDC1F48FE06B27157968F6AE431250366EE9

SSDEEP:

6144:sifGAonD7QlHaRYH8mcSMUBWgeINbx02IbpruB3IzXBMpI9f3aI:sifM70THBWgJbiMBKXBV1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2268)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3436)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2580)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2968)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3268)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2144)
    • Uses Task Scheduler to run other applications

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3436)
    • REMCOS was detected

      • vbc.exe (PID: 292)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3424)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 180)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3436)
    • Creates files in the user directory

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3436)
      • vbc.exe (PID: 292)
    • Executes scripts

      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2580)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3436)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2268)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2144)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 3268)
      • PL, INV, BL-PACKING DOCUMENTS,pdf.exe (PID: 2968)
    • Writes files like Keylogger logs

      • vbc.exe (PID: 292)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: PL, INV, BL-PACKING DOCUMENTS,pdf.exe
ZipUncompressedSize: 303616
ZipCompressedSize: 211515
ZipCRC: 0x27e3d489
ZipModifyDate: 2020:07:12 09:11:19
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
14
Malicious processes
3
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start drop and start start winrar.exe pl, inv, bl-packing documents,pdf.exe pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs schtasks.exe no specs #REMCOS vbc.exe vbc.exe no specs vbc.exe no specs pl, inv, bl-packing documents,pdf.exe no specs pl, inv, bl-packing documents,pdf.exe no specs vbc.exe no specs pl, inv, bl-packing documents,pdf.exe no specs vbc.exe no specs vbc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
180"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\965bd4c8-0542-4376-821d-8f6f1cf027aa.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3436"C:\Users\admin\AppData\Local\Temp\Rar$EXa180.3318\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa180.3318\PL, INV, BL-PACKING DOCUMENTS,pdf.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
2580"C:\Users\admin\AppData\Local\Temp\Rar$EXa180.4215\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa180.4215\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
2268"C:\Users\admin\AppData\Local\Temp\Rar$EXa180.4577\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa180.4577\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
3424"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bqrsxoTw" /XML "C:\Users\admin\AppData\Local\Temp\tmpBE9A.tmp"C:\Windows\System32\schtasks.exePL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
292"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Version:
14.7.3062.0
2436"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exePL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
1
Version:
14.7.3062.0
3964"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exePL, INV, BL-PACKING DOCUMENTS,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
1
Version:
14.7.3062.0
2968"C:\Users\admin\AppData\Local\Temp\Rar$EXa180.17616\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa180.17616\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
2144"C:\Users\admin\AppData\Local\Temp\Rar$EXa180.21290\PL, INV, BL-PACKING DOCUMENTS,pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa180.21290\PL, INV, BL-PACKING DOCUMENTS,pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Tetris
Exit code:
0
Version:
1.0.0.0
Total events
530
Read events
511
Write events
19
Delete events
0

Modification events

(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(180) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(180) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\965bd4c8-0542-4376-821d-8f6f1cf027aa.zip
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(180) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
7
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.4577\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.3318\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.17616\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.4215\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
3436PL, INV, BL-PACKING DOCUMENTS,pdf.exeC:\Users\admin\AppData\Roaming\bqrsxoTw.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.23544\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
180WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa180.21290\PL, INV, BL-PACKING DOCUMENTS,pdf.exeexecutable
MD5:875D1341464339F98E80899903D51A41
SHA256:1F08995FAF8B4AF6A6CB979A890F6DCF4A6E526382E63F9E8B27ADD0140BFF33
3436PL, INV, BL-PACKING DOCUMENTS,pdf.exeC:\Users\admin\AppData\Local\Temp\tmpBE9A.tmpxml
MD5:0978BE5169413A76FF4B8709B869EA8F
SHA256:3D76AF57F73E5097DD0ECAE2917523A9087C6B2BE2739F4109CA92BE32227235
292vbc.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:99C562B91C7D890B686A1F123C13AA34
SHA256:88B669280F3D4CB8A1A54DAC1ACB8D8AF298602AF2412F06A5A2863D5669C1C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
77
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
292
vbc.exe
185.244.30.19:1965
jamesanderson68986.ddns.net
malicious
185.244.30.19:1965
jamesanderson68986.ddns.net
malicious

DNS requests

Domain
IP
Reputation
jamesanderson68986.ddns.net
  • 185.244.30.19
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info