File name:

FIR doc.rar

Full analysis: https://app.any.run/tasks/8da10f37-1e46-4c71-88bb-e72c40c99e24
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 16, 2019, 09:33:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
exploit
cve-2017-11882
loader
autoit
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2763E9F12838A8F44C09BFFEB165E1D1

SHA1:

2C3DA4CDB976A82AA2B70310E3A26070360CAC8D

SHA256:

AD334AA51E9F3DB7680D0285CE2BF218148D7E8A8BF63A9BA721FA2B253E1EAC

SSDEEP:

49152:OSEBKHYSr9kHoZk8yF607cJPJ+dCSJqwTB7IjSahOlb0/bctu5Bk:TEQHVkF60APJ8CSJqbtAeb+Qk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 2784)
    • Application was dropped or rewritten from another process

      • System.scr (PID: 892)
      • ifmgvub.com (PID: 2148)
    • Downloads executable files from the Internet

      • EQNEDT32.EXE (PID: 2784)
    • Writes to a start menu file

      • ifmgvub.com (PID: 2148)
    • Changes the autorun value in the registry

      • ifmgvub.com (PID: 2148)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 2040)
    • Executed via COM

      • EQNEDT32.EXE (PID: 2784)
    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 2784)
      • System.scr (PID: 892)
    • Drop AutoIt3 executable file

      • System.scr (PID: 892)
    • Starts application with an unusual extension

      • System.scr (PID: 892)
      • EQNEDT32.EXE (PID: 2784)
    • Creates files in the user directory

      • EQNEDT32.EXE (PID: 2784)
      • ifmgvub.com (PID: 2148)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3900)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winword.exe no specs eqnedt32.exe system.scr ifmgvub.com regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
892"C:\Users\admin\AppData\Roaming\System.scr" /SC:\Users\admin\AppData\Roaming\System.scr
EQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\system.scr
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2040"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\FIR doc.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2148"C:\Users\admin\AppData\Local\Temp\74881273\ifmgvub.com" pbmhbqpqu.fndC:\Users\admin\AppData\Local\Temp\74881273\ifmgvub.com
System.scr
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 8, 1
Modules
Images
c:\users\admin\appdata\local\temp\74881273\ifmgvub.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2784"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
Modules
Images
c:\program files\common files\microsoft shared\equation\eqnedt32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3900"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIa2040.32429\FIR doc.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
4036"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
ifmgvub.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.7.3062.0 built by: NET472REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
Total events
3 139
Read events
2 401
Write events
610
Delete events
128

Modification events

(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2040) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\FIR doc.rar
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2040) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3900) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:s{i
Value:
737B69003C0F0000010000000000000000000000
(PID) Process:(3900) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
Executable files
3
Suspicious files
0
Text files
57
Unknown types
3

Dropped files

PID
Process
Filename
Type
3900WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE3D3.tmp.cvr
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\pbmhbqpqu.fnd
MD5:
SHA256:
2040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2040.32429\FIR doc.doctext
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\jojjmipoav.exetext
MD5:
SHA256:
2784EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\a[1].exeexecutable
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\ufdv.dlltext
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\ecglnal.cpltext
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\ccluiuvxj.dlltext
MD5:
SHA256:
2784EQNEDT32.EXEC:\Users\admin\AppData\Roaming\System.screxecutable
MD5:
SHA256:
892System.scrC:\Users\admin\AppData\Local\Temp\74881273\fepb.bintext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2784
EQNEDT32.EXE
GET
200
192.185.25.198:80
http://harmonyfacility.com/a.exe
US
executable
1.22 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4036
RegSvcs.exe
185.217.1.190:5552
harmonyfacility.com
Icme Limited
SE
malicious
2784
EQNEDT32.EXE
192.185.25.198:80
harmonyfacility.com
CyrusOne LLC
US
malicious

DNS requests

Domain
IP
Reputation
harmonyfacility.com
  • 192.185.25.198
  • 185.217.1.190
malicious
iphanyi.ddns.net
  • 185.217.1.190
malicious

Threats

PID
Process
Class
Message
2784
EQNEDT32.EXE
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
2784
EQNEDT32.EXE
A Network Trojan was detected
ET TROJAN Possible Malicious Macro DL EXE Feb 2016
2784
EQNEDT32.EXE
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
2784
EQNEDT32.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1080
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info