download:

/GOST-7805-70.pdf

Full analysis: https://app.any.run/tasks/d4b1ed35-823a-4d4a-8e81-e8cc639d4127
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: January 17, 2024, 23:20:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
netwire
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

504D57BFD170A980B89C3BD7AFEC8D3E

SHA1:

658FCF0CD490ED7626DC163669D845FF83C2B4DC

SHA256:

BED092067F03B317EF15B9DC2FBA0A9A6D5947179E4AE930844FD2D59CEA129E

SSDEEP:

49152:QZfEJrJQ9njeD6dmrMgqOs+/XYfmj0HsxU1G1Qawz/WVrUORSyVZ48sCj1Ws/D7D:AfEJrqK64oVOdwfmj0B1G1/AORSyVPjH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • GOST-7805-70.pdf.exe (PID: 128)
      • cmd.exe (PID: 2168)
      • Expensive.pif (PID: 1540)
      • SchoolHormone.exe (PID: 1432)
    • Create files in the Startup directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • cmd.exe (PID: 2340)
    • NETWIRE has been detected (SURICATA)

      • ipconfig.exe (PID: 2664)
  • SUSPICIOUS

    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1604)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1604)
      • SchoolHormone.exe (PID: 1432)
      • cmd.exe (PID: 1040)
    • Executable content was dropped or overwritten

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • cmd.exe (PID: 2168)
      • Expensive.pif (PID: 1540)
    • Application launched itself

      • cmd.exe (PID: 1604)
      • cmd.exe (PID: 1040)
    • The executable file from the user directory is run by the CMD process

      • Expensive.pif (PID: 1540)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1604)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 1604)
    • Connects to unusual port

      • ipconfig.exe (PID: 2664)
    • Reads the Internet Settings

      • SchoolHormone.exe (PID: 1432)
    • Get information on the list of running processes

      • cmd.exe (PID: 1604)
  • INFO

    • Checks supported languages

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • Expensive.pif (PID: 1540)
      • wmpnscfg.exe (PID: 3116)
    • Reads the computer name

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
      • Expensive.pif (PID: 1540)
      • wmpnscfg.exe (PID: 3116)
    • Application launched itself

      • AcroRd32.exe (PID: 296)
      • RdrCEF.exe (PID: 2440)
    • Create files in a temporary directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • SchoolHormone.exe (PID: 1432)
    • Creates files or folders in the user directory

      • GOST-7805-70.pdf.exe (PID: 128)
      • Expensive.pif (PID: 1540)
    • Reads mouse settings

      • Expensive.pif (PID: 1540)
    • Manual execution by a user

      • cmd.exe (PID: 2340)
      • cmd.exe (PID: 2296)
      • wmpnscfg.exe (PID: 3116)
      • ipconfig.exe (PID: 2664)
    • Drops the executable file immediately after the start

      • RdrCEF.exe (PID: 2440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:02 04:09:39+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26112
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x34fc
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
29
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start gost-7805-70.pdf.exe schoolhormone.exe acrord32.exe acrord32.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe cmd.exe no specs expensive.pif ping.exe no specs cmd.exe cmd.exe no specs schtasks.exe no specs rdrcef.exe rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs #NETWIRE ipconfig.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf.exe" C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\gost-7805-70.pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
296"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
GOST-7805-70.pdf.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
0
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
712tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
764findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
848cmd /c mkdir 11131C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1040"C:\Windows\System32\cmd.exe" /k cmd < Prerequisite & exitC:\Windows\System32\cmd.exeSchoolHormone.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1216tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1432C:\Users\admin\AppData\Local\Temp\SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\SchoolHormone.exe
GOST-7805-70.pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\schoolhormone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
154011131\Expensive.pif 11131\j C:\Users\admin\AppData\Local\Temp\7ZipSfx.000\11131\Expensive.pif
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 4
Modules
Images
c:\users\admin\appdata\local\temp\7zipsfx.000\11131\expensive.pif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1604cmd C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
14 275
Read events
14 244
Write events
31
Delete events
0

Modification events

(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1432) SchoolHormone.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:uLastAppLaunchTimeStamp
Value:
738908672
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:iNumReaderLaunches
Value:
5
(PID) Process:(2076) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement
Operation:writeName:bNormalExit
Value:
1
(PID) Process:(296) AcroRd32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(296) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
4
Suspicious files
195
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
128GOST-7805-70.pdf.exeC:\Users\admin\AppData\Local\Temp\GOST-7805-70.pdfpdf
MD5:48AADDCD159CAF11A5971AE9A642BEDA
SHA256:F6B781106376BCBCE1A4B9108989EF2532BE19C1E5605C7AA903E75FE684D44C
128GOST-7805-70.pdf.exeC:\Users\admin\AppData\Local\Temp\SchoolHormone.exeexecutable
MD5:EA6520DA8322F1E8F2B7426FEA702FF2
SHA256:6DC16464D18FDF945438E5427C0ADA8342E71B0D51964F6C15144A5BA71B3E84
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Blowingexecutable
MD5:CC90BFDDF713A51B817BB5083414A78C
SHA256:2FE7AA83C04F166ABE7A93DB8390BC425B035D57584CC35B96B78B37536085FF
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Logosbinary
MD5:7DCE8C2D601B1162D21AAF3534B3EBD1
SHA256:9AA3C8EC5CB36E0D776167F8A301A4BC7F2ECA90269EB815DFD972A7815F4B06
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Edmontontext
MD5:BE2A41F9DB4B614CE50BC015AB63B32A
SHA256:3B22D98F89FA0185D78D7F6D43E5EC62AD7DD018F61921EC089B96EA93E04FE4
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Injuredtext
MD5:CF6EF1B9D442D5213E5093451440506F
SHA256:FA5E6C9BAA75D58CB517E9512C3D1E22B4677D921CF93B99222411239A68CBF6
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Prerequisitetext
MD5:EDD1DE0B68929893F8AAF8FE4F8441A9
SHA256:7617BC1F134A3792484CB02C51F3A3D320E73D0EC6E7673716A47EF516BA6A41
2440RdrCEF.exe
MD5:
SHA256:
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Utilsbinary
MD5:405761775FF3E70ADDD8F57A212D2271
SHA256:BF7AD8B331A2E7915508BD3047669170DDDCEAD874B8D4F8C6F231F9497FF046
1432SchoolHormone.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Restoredbinary
MD5:5ED92F349533735F927E2D023CD707EC
SHA256:35C8DEF67823C116B945818C63584CABBC0DF72D85BDC310C90D2D88D39EBC18
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
9
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
296
AcroRd32.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8ec46989b1d1d589
unknown
compressed
4.66 Kb
unknown
296
AcroRd32.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
1080
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e90c163b6659448e
unknown
unknown
296
AcroRd32.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7c5cced82a00ccfd
unknown
compressed
4.66 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2440
RdrCEF.exe
23.35.236.137:443
geo2.adobe.com
AKAMAI-AS
DE
unknown
2440
RdrCEF.exe
184.30.20.134:443
armmf.adobe.com
AKAMAI-AS
DE
unknown
296
AcroRd32.exe
23.50.131.75:443
acroipm2.adobe.com
Akamai International B.V.
DE
unknown
296
AcroRd32.exe
184.24.77.194:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
296
AcroRd32.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2440
RdrCEF.exe
107.22.247.231:443
p13n.adobe.io
AMAZON-AES
US
unknown

DNS requests

Domain
IP
Reputation
opcVcFcDTxD.opcVcFcDTxD
unknown
geo2.adobe.com
  • 23.35.236.137
whitelisted
armmf.adobe.com
  • 184.30.20.134
whitelisted
acroipm2.adobe.com
  • 23.50.131.75
  • 23.50.131.87
whitelisted
ctldl.windowsupdate.com
  • 184.24.77.194
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
p13n.adobe.io
  • 107.22.247.231
  • 54.144.73.197
  • 34.193.227.236
  • 18.207.85.246
whitelisted

Threats

PID
Process
Class
Message
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Client KeepAlive
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
2664
ipconfig.exe
A Network Trojan was detected
ET MALWARE NetWire / Ozone / Darktrack Alien RAT - Server Hello
No debug info