download:

F17-3539631Z576351678.zip

Full analysis: https://app.any.run/tasks/b8b6a24f-4eee-425f-8e80-825f7872cc55
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: March 21, 2019, 15:26:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
nymaim
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

2E47875BEC2058C43DD26CC7C0699198

SHA1:

85AC4D6221EDE937AB81524A9411496E3105F873

SHA256:

CE9B70D2E755C0F0276BE0FEB3326C2EFAC91E2A005CE7B281E204CDE24EAC04

SSDEEP:

12288:BDutsCZgBzXgbkjbNDl0BJg0inywGH7plFpi8Z2gX0YAliO:AtswgBNb52BJgfI7nFpg40YAliO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Rechnung-8270564-67193419R6.com (PID: 720)
      • Rechnung-8270564-67193419R6.com (PID: 716)
    • NYMAIM was detected

      • WinRAR.exe (PID: 1660)
      • Journal.exe (PID: 580)
    • Connects to CnC server

      • Journal.exe (PID: 580)
      • WinRAR.exe (PID: 1660)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1660)
    • Starts application with an unusual extension

      • WinRAR.exe (PID: 1660)
    • Creates files in the program directory

      • WinRAR.exe (PID: 1660)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:03:20 20:09:20
ZipCRC: 0x25899b3d
ZipCompressedSize: 644801
ZipUncompressedSize: 671232
ZipFileName: Rechnung-8270564-67193419R6.com
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start #NYMAIM winrar.exe rechnung-8270564-67193419r6.com no specs #NYMAIM journal.exe rechnung-8270564-67193419r6.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
580-fiC:\Program Files\Windows Journal\Journal.exe
Rechnung-8270564-67193419R6.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Journal
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows journal\journal.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
716"C:\Users\admin\Desktop\Rechnung-8270564-67193419R6.com" C:\Users\admin\Desktop\Rechnung-8270564-67193419R6.comexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\rechnung-8270564-67193419r6.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nddeapi.dll
720"C:\Users\admin\AppData\Local\Temp\Rar$DIa1660.5366\Rechnung-8270564-67193419R6.com" C:\Users\admin\AppData\Local\Temp\Rar$DIa1660.5366\Rechnung-8270564-67193419R6.comWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$dia1660.5366\rechnung-8270564-67193419r6.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nddeapi.dll
1660"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\F17-3539631Z576351678.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
477
Read events
452
Write events
25
Delete events
0

Modification events

(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1660) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\F17-3539631Z576351678.zip
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa1660.5366\Rechnung-8270564-67193419R6.comexecutable
MD5:
SHA256:
1660WinRAR.exeC:\ProgramData\xiq\kxhfs.gajbinary
MD5:
SHA256:
1660WinRAR.exeC:\Users\admin\AppData\Local\Temp\zscuza.refbinary
MD5:
SHA256:
580Journal.exeC:\Users\admin\AppData\Local\Temp\zscuza.refbinary
MD5:
SHA256:
580Journal.exeC:\ProgramData\xiq\kxhfs.gajbinary
MD5:
SHA256:
1660WinRAR.exeC:\Users\admin\Desktop\Rechnung-8270564-67193419R6.comexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
9
DNS requests
5
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1660
WinRAR.exe
POST
200
185.180.196.49:80
http://carfax.com/q8sjxoq/index.php
NL
malicious
1660
WinRAR.exe
POST
200
46.105.37.21:80
http://carfax.com/q8sjxoq/index.php
FR
malicious
580
Journal.exe
POST
200
46.105.37.21:80
http://zepter.com/q8sjxoq/index.php
FR
malicious
580
Journal.exe
POST
200
185.180.196.49:80
http://zepter.com/q8sjxoq/index.php
NL
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1660
WinRAR.exe
8.8.4.4:53
Google Inc.
US
whitelisted
1660
WinRAR.exe
8.8.8.8:53
Google Inc.
US
malicious
1660
WinRAR.exe
185.180.196.49:80
Hosting Solution Ltd.
NL
malicious
1660
WinRAR.exe
46.105.37.21:80
OVH SAS
FR
malicious
580
Journal.exe
8.8.4.4:53
Google Inc.
US
whitelisted
580
Journal.exe
185.180.196.49:80
Hosting Solution Ltd.
NL
malicious
580
Journal.exe
46.105.37.21:80
OVH SAS
FR
malicious

DNS requests

Domain
IP
Reputation
microsoft.com
  • 40.112.72.205
  • 40.113.200.201
  • 104.215.148.63
  • 13.77.161.179
  • 40.76.4.15
whitelisted
dsionse.com
  • 185.141.199.63
  • 238.61.58.23
  • 231.253.239.248
unknown

Threats

PID
Process
Class
Message
1660
WinRAR.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
1660
WinRAR.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
1660
WinRAR.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
1660
WinRAR.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
580
Journal.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
580
Journal.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
580
Journal.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
580
Journal.exe
A Network Trojan was detected
MALWARE [PTsecurity] Nymaim Check-in
7 ETPRO signatures available at the full report
No debug info