analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

97abf34f7cdffe95724a5eedbafe0e38761496c807ce7c309385f88c7ac0bf5d_KV0VbYlg8d.bin.gz

Full analysis: https://app.any.run/tasks/d2163532-9e6c-4f51-9dbc-071ffd2ae60e
Verdict: Malicious activity
Analysis date: February 11, 2019, 10:00:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/gzip
File info: gzip compressed data, max compression, from Unix
MD5:

CEB84C5ABB70DE6266F402F024B9472E

SHA1:

BC8B7BED7809DE339EFF54945B676A9069C145ED

SHA256:

D152DEBABE6CC8C217835EC4EE6FB390941DE57603308751407C0A900AC914F2

SSDEEP:

96:3T63CssfmY6D7CM7cHGJNxKqnB3SdbYQEzC8R5OxzuN/XMCn53SOi8C5YyPs7:j6yUHD7CM7PriWoS5OtuN/XZ53LPhX7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • AcroRd32.exe (PID: 312)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 3500)
  • INFO

    • Application launched itself

      • RdrCEF.exe (PID: 2260)
      • chrome.exe (PID: 1396)
    • Changes internet zones settings

      • iexplore.exe (PID: 2892)
    • Creates files in the user directory

      • AcroRd32.exe (PID: 312)
      • iexplore.exe (PID: 3576)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3576)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3576)
    • Reads settings of System Certificates

      • chrome.exe (PID: 1396)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

OperatingSystem: Unix
ExtraFlags: Maximum Compression
ModifyDate: 0000:00:00 00:00:00
Flags: (none)
Compression: Deflated
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
18
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs iexplore.exe iexplore.exe adobearm.exe no specs reader_sl.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2968"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\97abf34f7cdffe95724a5eedbafe0e38761496c807ce7c309385f88c7ac0bf5d_KV0VbYlg8d.bin.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
312"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\Desktop\97abf34f7cdffe95724a5eedbafe0e38761496c807ce7c309385f88c7ac0bf5d_KV0VbYlg8d.bin.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
explorer.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3580"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\Desktop\97abf34f7cdffe95724a5eedbafe0e38761496c807ce7c309385f88c7ac0bf5d_KV0VbYlg8d.bin.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
2260"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2748"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2260.0.807887772\1985370456" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
992"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2260.1.1952725469\1440199978" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2892"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3576"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2892 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3500"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Version:
1.824.27.2646
2884"C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe" C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exeAdobeARM.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat SpeedLauncher
Exit code:
0
Version:
15.23.20053.211670
Total events
1 027
Read events
884
Write events
139
Delete events
4

Modification events

(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2968) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\97abf34f7cdffe95724a5eedbafe0e38761496c807ce7c309385f88c7ac0bf5d_KV0VbYlg8d.bin.gz.z
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3580) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
0
(PID) Process:(3580) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:bExpandRHPInViewer
Value:
1
Executable files
0
Suspicious files
38
Text files
69
Unknown types
14

Dropped files

PID
Process
Filename
Type
3580AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
3580AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1oimmt4_1801chq_2rg.tmp
MD5:
SHA256:
3580AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1t8kbej_1801chr_2rg.tmp
MD5:
SHA256:
3580AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rs9cnef_1801chs_2rg.tmp
MD5:
SHA256:
3580AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R2syt6w_1801cht_2rg.tmp
MD5:
SHA256:
3580AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1xmtj9m_1801chu_2rg.tmp
MD5:
SHA256:
2892iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2892iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
MD5:
SHA256:
3576iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\ffehg_date-locator_com[1].txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
29
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
312
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip
unknown
whitelisted
312
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
312
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
312
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
3576
iexplore.exe
GET
302
91.215.153.90:80
http://top.nov.ru/M9ccWt
BG
suspicious
312
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
unknown
whitelisted
3576
iexplore.exe
GET
200
95.213.251.197:80
http://ffehg.date-locator.com/?utm_source=5c20d6919caa2
RU
html
867 b
malicious
1396
chrome.exe
GET
200
95.213.251.197:80
http://dating-locator.com/js/eclick.js
RU
text
347 b
malicious
1396
chrome.exe
GET
200
95.213.251.197:80
http://dating-locator.com/bundle/101/assets/js/js.js
RU
text
104 b
malicious
2892
iexplore.exe
GET
404
95.213.251.197:80
http://ffehg.date-locator.com/favicon.ico
RU
html
245 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2892
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
312
AcroRd32.exe
2.16.186.33:80
acroipm2.adobe.com
Akamai International B.V.
whitelisted
3576
iexplore.exe
91.215.153.90:80
top.nov.ru
ITL Company
BG
suspicious
2.18.233.74:443
armmf.adobe.com
Akamai International B.V.
whitelisted
3576
iexplore.exe
95.213.251.197:80
ffehg.date-locator.com
OOO Network of data-centers Selectel
RU
unknown
2892
iexplore.exe
95.213.251.197:80
ffehg.date-locator.com
OOO Network of data-centers Selectel
RU
unknown
312
AcroRd32.exe
2.18.233.74:443
armmf.adobe.com
Akamai International B.V.
whitelisted
23.210.248.251:443
ardownload2.adobe.com
Akamai International B.V.
NL
whitelisted
1396
chrome.exe
216.58.205.227:443
www.google.de
Google Inc.
US
whitelisted
1396
chrome.exe
216.58.208.35:443
www.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
acroipm2.adobe.com
  • 2.16.186.33
  • 2.16.186.32
whitelisted
armmf.adobe.com
  • 2.18.233.74
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
top.nov.ru
  • 91.215.153.90
suspicious
ffehg.date-locator.com
  • 95.213.251.197
  • 31.184.255.77
malicious
ardownload2.adobe.com
  • 23.210.248.251
whitelisted
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
www.gstatic.com
  • 216.58.208.35
whitelisted
www.google.de
  • 216.58.205.227
whitelisted
safebrowsing.googleapis.com
  • 216.58.207.74
whitelisted

Threats

PID
Process
Class
Message
3576
iexplore.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Possible Keitaro TDS Redirect
1396
chrome.exe
Misc activity
SUSPICIOUS [PTsecurity] JS obfuscation (obfuscator.io)
1396
chrome.exe
Misc activity
SUSPICIOUS [PTsecurity] Redirection JScript Obfuscated (seen Banload)
No debug info