download:

/GOST-7805-70.pdf

Full analysis: https://app.any.run/tasks/d4b1ed35-823a-4d4a-8e81-e8cc639d4127
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: January 17, 2024, 23:20:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
netwire
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

504D57BFD170A980B89C3BD7AFEC8D3E

SHA1:

658FCF0CD490ED7626DC163669D845FF83C2B4DC

SHA256:

BED092067F03B317EF15B9DC2FBA0A9A6D5947179E4AE930844FD2D59CEA129E

SSDEEP:

49152:QZfEJrJQ9njeD6dmrMgqOs+/XYfmj0HsxU1G1Qawz/WVrUORSyVZ48sCj1Ws/D7D:AfEJrqK64oVOdwfmj0B1G1/AORSyVPjH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • cmd.exe (PID: 2168)
      • Expensive.pif (PID: 1540)
    • Create files in the Startup directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • cmd.exe (PID: 2340)
    • NETWIRE has been detected (SURICATA)

      • ipconfig.exe (PID: 2664)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • cmd.exe (PID: 2168)
      • Expensive.pif (PID: 1540)
    • Reads the Internet Settings

      • SchoolHormone.exe (PID: 1432)
    • Starts CMD.EXE for commands execution

      • SchoolHormone.exe (PID: 1432)
      • cmd.exe (PID: 1040)
      • cmd.exe (PID: 1604)
    • Application launched itself

      • cmd.exe (PID: 1040)
      • cmd.exe (PID: 1604)
    • Get information on the list of running processes

      • cmd.exe (PID: 1604)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1604)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1604)
    • The executable file from the user directory is run by the CMD process

      • Expensive.pif (PID: 1540)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 1604)
    • Connects to unusual port

      • ipconfig.exe (PID: 2664)
  • INFO

    • Creates files or folders in the user directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • Expensive.pif (PID: 1540)
    • Checks supported languages

      • SchoolHormone.exe (PID: 1432)
      • GOST-7805-70.pdf.exe (PID: 128)
      • Expensive.pif (PID: 1540)
      • wmpnscfg.exe (PID: 3116)
    • Reads the computer name

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • wmpnscfg.exe (PID: 3116)
      • Expensive.pif (PID: 1540)
    • Application launched itself

      • AcroRd32.exe (PID: 296)
      • RdrCEF.exe (PID: 2440)
    • Create files in a temporary directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
    • Reads mouse settings

      • Expensive.pif (PID: 1540)
    • Manual execution by a user

      • cmd.exe (PID: 2340)
      • cmd.exe (PID: 2296)
      • wmpnscfg.exe (PID: 3116)
      • ipconfig.exe (PID: 2664)
    • Drops the executable file immediately after the start

      • RdrCEF.exe (PID: 2440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:02 04:09:39+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26112
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x34fc
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
29
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start gost-7805-70.pdf.exe schoolhormone.exe acrord32.exe acrord32.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe cmd.exe no specs expensive.pif ping.exe no specs cmd.exe cmd.exe no specs schtasks.exe no specs rdrcef.exe rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs #NETWIRE ipconfig.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf.exe" C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\gost-7805-70.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
296"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
GOST-7805-70.pdf.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
0
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
712tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
764findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
848cmd /c mkdir 11131C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1040"C:\Windows\System32\cmd.exe" /k cmd < Prerequisite & exitC:\Windows\System32\cmd.exeSchoolHormone.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1216tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1432C:\Users\admin\AppData\Local\Temp\SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\SchoolHormone.exe
GOST-7805-70.pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\schoolhormone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
154011131\Expensive.pif 11131\j C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\11131\Expensive.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 4
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\11131\expensive.pif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1604cmd C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
14 275
Read events
14 244
Write events
31
Delete events
0

Modification events

(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:uLastAppLaunchTimeStamp
Value:
738908672
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:iNumReaderLaunches
Value:
5
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement
Operation:writeName:bNormalExit
Value:
1
(PID) Process:(296) AcroRd32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(296) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
4
Suspicious files
195
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Injuredtext
MD5:CF6EF1B9D442D5213E5093451440506F
SHA256:FA5E6C9BAA75D58CB517E9512C3D1E22B4677D921CF93B99222411239A68CBF6
128GOST-7805-70.pdf.exeC:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdfpdf
MD5:48AADDCD159CAF11A5971AE9A642BEDA
SHA256:F6B781106376BCBCE1A4B9108989EF2532BE19C1E5605C7AA903E75FE684D44C
128GOST-7805-70.pdf.exeC:\Users\admin\AppData\Local\Temp\SchoolHormone.exeexecutable
MD5:EA6520DA8322F1E8F2B7426FEA702FF2
SHA256:6DC16464D18FDF945438E5427C0ADA8342E71B0D51964F6C15144A5BA71B3E84
1728cmd.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\11131\jtext
MD5:A3429C5747EB2311E19C052AE57585F5
SHA256:FE578E4DB6EA7E246330003CD4BB1CE10A00FA99FB98F96738047190E87B9BE1
2340cmd.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerGuard.urltext
MD5:353795816AE5B37D44A9024159D27EA8
SHA256:C0FC703B325B80CD526B0CF1AAA1A1BFEBBBFCB68A00B2493F690B950722E242
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Wagnerbinary
MD5:7B2A7D6531C942DAA515AEB6EE22875E
SHA256:3B77D5BEDEDDEDDC5B37FE56932A9B5F7E47393B5151649DC89E204FF0E04A9F
1540Expensive.pifC:\Users\admin\AppData\Local\EcoPower Dynamics Inc\Ltext
MD5:A3429C5747EB2311E19C052AE57585F5
SHA256:FE578E4DB6EA7E246330003CD4BB1CE10A00FA99FB98F96738047190E87B9BE1
2440RdrCEF.exe
MD5:
SHA256:
1540Expensive.pifC:\Users\admin\AppData\Local\EcoPower Dynamics Inc\PowerGuard.pifexecutable
MD5:848164D084384C49937F99D5B894253E
SHA256:F58D3A4B2F3F7F10815C24586FAE91964EEED830369E7E0701B43895B0CEFBD3
2076AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\TESTINGbinary
MD5:DC84B0D741E5BEAE8070013ADDCC8C28
SHA256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
9
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
296
AcroRd32.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8ec46989b1d1d589
unknown
compressed
4.66 Kb
unknown
296
AcroRd32.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7c5cced82a00ccfd
unknown
compressed
4.66 Kb
unknown
1080
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e90c163b6659448e
unknown
unknown
296
AcroRd32.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2440
RdrCEF.exe
23.35.236.137:443
geo2.adobe.com
AKAMAI-AS
DE
unknown
2440
RdrCEF.exe
184.30.20.134:443
armmf.adobe.com
AKAMAI-AS
DE
unknown
296
AcroRd32.exe
23.50.131.75:443
acroipm2.adobe.com
Akamai International B.V.
DE
unknown
296
AcroRd32.exe
184.24.77.194:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
296
AcroRd32.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2440
RdrCEF.exe
107.22.247.231:443
p13n.adobe.io
AMAZON-AES
US
unknown

DNS requests

Domain
IP
Reputation
opcVcFcDTxD.opcVcFcDTxD
unknown
geo2.adobe.com
  • 23.35.236.137
whitelisted
armmf.adobe.com
  • 184.30.20.134
whitelisted
acroipm2.adobe.com
  • 23.50.131.75
  • 23.50.131.87
whitelisted
ctldl.windowsupdate.com
  • 184.24.77.194
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
p13n.adobe.io
  • 107.22.247.231
  • 54.144.73.197
  • 34.193.227.236
  • 18.207.85.246
whitelisted

Threats

PID
Process
Class
Message
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Client KeepAlive
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
No debug info