analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

request.zip

Full analysis: https://app.any.run/tasks/be925965-c254-478a-a959-395b1548f5c7
Verdict: Malicious activity
Analysis date: October 20, 2020, 09:00:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

4B6553F564EF9D64CF22CFF1C313E413

SHA1:

927EBA9B665A3C23209B40007DA99CF02A61935A

SHA256:

AE99B4A2C59EB7D4168AB3D293917C9EFE94258758F7FDD9BAF6ED893E663023

SSDEEP:

3072:NjO7Btb/J6PA0YYXHSQYXQWP0NjydwSDfpsC4x2:p47b/4pXHLqPSybvu2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 892)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 892)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2020:10:19 03:26:18
ZipCRC: 0xb06b582d
ZipCompressedSize: 138778
ZipUncompressedSize: 145022
ZipFileName: specifics,010.19.2020.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winword.exe

Process information

PID
CMD
Path
Indicators
Parent process
2452"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\request.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
892"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\specifics,010.19.2020.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 893
Read events
1 276
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
4

Dropped files

PID
Process
Filename
Type
2452WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2452.26980\specifics,010.19.2020.doc
MD5:
SHA256:
892WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9AFC.tmp.cvr
MD5:
SHA256:
892WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\specifics,010.19.2020.doc.LNKlnk
MD5:D8087DDEA615AD9981A9AE681F398F42
SHA256:F9BFE65CB033A65A5317F82CCFE7BCF7B84FB02B25534B7BBE65B426F6F957BB
892WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:5281EAA5220996DA1A9E25CE48025D99
SHA256:E6F992443C596F7C5767C2B752DA11EA95D902AF831423E13BBDFE972C82066E
892WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:9EEF8404F24656650A46F5931403971A
SHA256:4F4D4C49A2B657B1B2AA2593758638D67C971FDAA858457AA02142D3DAC7011A
892WINWORD.EXEC:\Users\admin\Desktop\~$ecifics,010.19.2020.docpgc
MD5:5CB290A1F697453B03009C53F78BF3F9
SHA256:0229542E396B7F4D713EFBE7473FE98BAE87C30B03177253D7D0AB0F7E60B1B7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
892
WINWORD.EXE
45.128.206.80:80
zcbw6z7.com
malicious

DNS requests

Domain
IP
Reputation
zcbw6z7.com
  • 45.128.206.80
malicious

Threats

No threats detected
No debug info