| File name: | Bif Archive.7z |
| Full analysis: | https://app.any.run/tasks/7e3926b1-22d5-4993-a126-e002cccec83c |
| Verdict: | Malicious activity |
| Threats: | A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools. |
| Analysis date: | August 03, 2024, 18:57:18 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 5FEC5AC45E3A45B5C4E710B6EE3D87B8 |
| SHA1: | 18ECDABE47E7B63D02EDAE2F99627C523D6C4581 |
| SHA256: | A9F9B44D847B89500C7DA54CBFDBAD946792E3ED162DBF3A8355D308CA82D2CB |
| SSDEEP: | 98304:cequWYBaoffc7jOGT3vnXyBe4YYFpxq9J8RZAi9hR3V4uj9REeRamNtyn8IWbu0P:f478Qkj21B2eN5Hk4vqWsl/ |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 292 | "C:\Users\admin\AppData\Local\Temp\server.exe" | C:\Users\admin\AppData\Local\Temp\server.exe | Bifrost hamoody 1.2.1.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 740 | "C:\Users\admin\Desktop\Bifrost 2.1.2 Skull Hacker\Bifrost 2.1.2 Skull Hacker.exe" | C:\Users\admin\Desktop\Bifrost 2.1.2 Skull Hacker\Bifrost 2.1.2 Skull Hacker.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 3, 3, 0, 0 Modules
| |||||||||||||||
| 828 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1580 CREDAT:144385 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | — | iexplore.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 936 | "C:\Users\admin\Desktop\Bifrost 2.1.2 Skull Hacker\Bifrost 2.1.2 Skull Hacker.exe" | C:\Users\admin\Desktop\Bifrost 2.1.2 Skull Hacker\Bifrost 2.1.2 Skull Hacker.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 3, 3, 0, 0 Modules
| |||||||||||||||
| 1076 | "C:\Users\admin\AppData\Local\Temp\Copy of bifrost 1.2.1 hamoody10 .exe" | C:\Users\admin\AppData\Local\Temp\Copy of bifrost 1.2.1 hamoody10 .exe | — | Bifrost hamoody 1.2.1.exe | |||||||||||
User: admin Company: http://as7apcool.com/vb Integrity Level: HIGH Description: by hamoody Exit code: 20 Version: 1, 2, 1, 0 Modules
| |||||||||||||||
| 1180 | "C:\Users\admin\Desktop\Bifrost Palestine 1.2.1.exe" | C:\Users\admin\Desktop\Bifrost Palestine 1.2.1.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Palestine Exit code: 20 Version: 1, 2, 1, 0 Modules
| |||||||||||||||
| 1296 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1460 | "C:\Users\admin\AppData\Local\Temp\43.exe" | C:\Users\admin\AppData\Local\Temp\43.exe | — | Bifrost Nasser hacker.exe | |||||||||||
User: admin Company: السيّد العلوي Integrity Level: HIGH Description: السيّد العلوي Exit code: 0 Version: 444.666.0888 Modules
| |||||||||||||||
| 1488 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Bif Archive.7z" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 1580 | "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\Desktop\Bifrost 1.2.1 zmm@Hotmail.com\TNT_ON السيف عزام.gif | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (1296) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (1488) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Bif Archive.7z | |||
| (PID) Process: | (1296) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.7z\OpenWithList |
| Operation: | write | Name: | a |
Value: WinRAR.exe | |||
| (PID) Process: | (1296) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.7z\OpenWithList |
| Operation: | write | Name: | MRUList |
Value: a | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1296 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-ms | binary | |
MD5:7BB5249C94A535CABBED5A2194EFAB46 | SHA256:75CD2314C88E9D233A64C267DACE660626E302284B2647390E76B8C86D6251F9 | |||
| 1296 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms | binary | |
MD5:1D3A3A31B95F6075D913F01604D2C02D | SHA256:7B8807E14DEF8E119C2F7F492FE3B93827A94B210BCAED73736E4ED6A34214F9 | |||
| 1296 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Bif Archive.7z.lnk | binary | |
MD5:DC71BDD894C9B93048D878BD58B04BA7 | SHA256:908889BB30B50136E6ED4C47C91C1C0EBCB551C53E5895FD876D4DC8BF06D90D | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\Bifrost By SpY--HackeR..exe | executable | |
MD5:573CF942D7272A4CADDFA861FEDFCC6F | SHA256:AEB3F430D6CBF059E73AC8AB2B6D4846FEAEE4F09F9AE5F33689CEE9B35DB1EC | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\BifrosT abo fahd hacker\ملاحظه.txt | text | |
MD5:49A0190345030BD3989C969E3D0B1FA3 | SHA256:B988C88C694B02E30FA15736352A540D1FC665604686C231C7900FB5D1CAC3E5 | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\Bifrost-Arabic-1.2.1\مهم جداً.txt | text | |
MD5:CA30D52824E98548CEED7622FB78C58E | SHA256:4863C92928F6489E45BE75383FCA4F91EDF9C800252A45F5374C771DCF0A0EDF | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\BiFrOsT.شامخ رغم الألم\ملاحظه.txt | text | |
MD5:692B2D14C34102CBB9863B98FF65DC8D | SHA256:A194B8BB432645CB6E5D9DFEF8490EB0DA448E9925C50E4D6BF7D6F14C47A022 | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\تتخطى اليميت BiFrOsT HaCkEr MuTiR 1.2dX\ملاحظه.txt | text | |
MD5:220608329962C35DD89AA92B9C12FEEF | SHA256:B0F49EE90AB5E8CECDBDFB46331ECD9A2E31D06D6F71A4C2238038CAC16E464A | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\Bifrost 1.2.1 zmm@Hotmail.com\server.exe | executable | |
MD5:3CA47E2C1C05F0AF250C51B150B9796D | SHA256:65B5C64B922124ACBCF92E24F2E10A44122FDDFDA57FBE97180C913903A42382 | |||
| 1488 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1488.27603\Bifrost 1.2.1 zmm@Hotmail.com\Bifrost 1.2.1 zmm@Hotmail.com.exe | executable | |
MD5:1C4A0EF5078CEB09A2D3358E78FDCE5B | SHA256:04F4844110904ED16AE29B933BA4613557207F973048C22EBDFEE8C52F32349D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1372 | svchost.exe | GET | 304 | 23.50.131.196:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | whitelisted |
1372 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1372 | svchost.exe | GET | 200 | 23.48.23.164:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1060 | svchost.exe | GET | 304 | 199.232.214.172:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8f69642324cc87bd | unknown | — | — | whitelisted |
1580 | iexplore.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
— | — | 239.255.255.250:3702 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1372 | svchost.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
1372 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
1372 | svchost.exe | 23.50.131.196:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
1372 | svchost.exe | 23.48.23.164:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
1372 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
zx3500.no-ip.biz |
| unknown |
nassersalem6.no-ip.org |
| malicious |
al7rbi.no-ip.info |
| unknown |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1060 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to a Suspicious no-ip Domain |
1060 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to a Suspicious no-ip Domain |
1060 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to a Suspicious no-ip Domain |
Process | Message |
|---|---|
Bifrostv1.3 black-hacker.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2007 Oreans Technologies ---
------------------------------------------------
|