URL: | https://cdn.discordapp.com/attachments/849955627279450122/881210716911177778/password_is_eulen_3.rar |
Full analysis: | https://app.any.run/tasks/c9eabd73-3506-4a04-9162-112ccdc25b8f |
Verdict: | Malicious activity |
Analysis date: | August 30, 2021, 09:25:36 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | 2C87BC9167950EE02A6D74ABE997B7D7 |
SHA1: | A88FA812D0039E13C9D8F2E11233B3AEE34B4528 |
SHA256: | D3E33694F6790566970A0C1A6467B49663275DBA2C1061EAD657FD864840D6A1 |
SSDEEP: | 3:N8cCWdy6//eGUvnMVnx/RSKXBnWgALc:2cry6XevMXNWgALc |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2368 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://cdn.discordapp.com/attachments/849955627279450122/881210716911177778/password_is_eulen_3.rar" | C:\Program Files\Internet Explorer\iexplore.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
2964 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2368 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
3320 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\password_is_eulen_3.rar" | C:\Program Files\WinRAR\WinRAR.exe | iexplore.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
2672 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3320.22215\password_is_eulen.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3320.22215\password_is_eulen.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Version: 1.0.0.0 Modules
| |||||||||||||||
2884 | "C:\Users\admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4wAa4X0asTrSqHzcyknATJZs7/rGhZ3vanFzt/fX+a6cQcu7t9SfYUN9an96UpQ2BZ0tRGQWw+SxyzE+WaF/eJzmARWtCZUFTO/TqNGdRd58ahum/X9AgC5npL6kBfnbA= | C:\Users\admin\AppData\Local\Temp\RtkBtManServ.exe | — | password_is_eulen.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: RtkBtManServ Version: 1.0.0.0 Modules
| |||||||||||||||
3744 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3320.23044\password_is_eulen.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3320.23044\password_is_eulen.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Version: 1.0.0.0 Modules
|
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: 134269008 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30907777 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 434432914 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30907777 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
(PID) Process: | (2368) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2964 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:70539884B2F1A097C17B583CDD386A34 | SHA256:0868CA1BF77D5483B97C293C385FE09827A9BB3B0E43FDD535A55D962FC96F4F | |||
3320 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3320.22215\password_is_eulen.exe | executable | |
MD5:A3C4C8135F8A00E218107ADE759EBBA4 | SHA256:03815EC1D9C964131F49037E05AA275ADA362237AADF5EAC87719EF8036B015C | |||
2964 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:D2A10F3B14769CF194BF06BB37749229 | SHA256:B8BD39FBC341AC62C6D2DC5580425DC2CC269C9BD025B2C11055F9BC04B20161 | |||
2368 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{45A3E8AD-0974-11EC-A146-12A9866C77DE}.dat | binary | |
MD5:8BCF18957CC5C1F100478794995CAD37 | SHA256:117FF3EA4546C5143CE7855EB3A87EC422D74D59F06842A170118560B64B1A27 | |||
2368 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF811EC079A2A87F02.TMP | gmc | |
MD5:79E0EA30CB7DB0E82012E06418F26F68 | SHA256:A336B97FABC52353FCD2E349BD1DD883A8262120CA2C81F87AFC46DF59D94C74 | |||
2368 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\password_is_eulen_3.rar | compressed | |
MD5:D46BAD0FCB2DD921B0D71069EA931039 | SHA256:705E2AEBC10FCC4368D2622E7A4507D7A0FE2B3005031EFB580F2230BAA940FC | |||
2368 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442 | der | |
MD5:318FAAB23BB01F24A058379F827E2B45 | SHA256:B0DA467C763AEF5036A53BB3F80462FCAE1D2A80671083237217AF6B51100917 | |||
2964 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\password_is_eulen_3.rar.01cpuof.partial | compressed | |
MD5:D46BAD0FCB2DD921B0D71069EA931039 | SHA256:705E2AEBC10FCC4368D2622E7A4507D7A0FE2B3005031EFB580F2230BAA940FC | |||
2368 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442 | binary | |
MD5:6C2FF24560F2CA03E9E78C29349B4C07 | SHA256:38EDDF5448DBADCEC3E42594D7F8F5FCB45BA522913D97A1E8F6D09460FA79F2 | |||
2964 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\password_is_eulen_3[1].rar | compressed | |
MD5:6B0F2B8D7FFB5B6A8252A5387718B169 | SHA256:308FC006929A07B8143B05CF713509D276A4CCBDB2B10DC7C3D29E0066E8E493 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2368 | iexplore.exe | GET | 304 | 13.107.4.50:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5e4a0c603e2458c5 | US | — | — | whitelisted |
2964 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
2368 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D | US | der | 1.47 Kb | whitelisted |
2368 | iexplore.exe | GET | 200 | 13.107.4.50:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?adb8ed1ea15518c7 | US | compressed | 4.70 Kb | whitelisted |
— | — | GET | 304 | 13.107.4.50:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1395118fe308ea05 | US | — | — | whitelisted |
2964 | iexplore.exe | GET | 200 | 13.107.4.50:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?194b4db5d7b70cf8 | US | compressed | 4.70 Kb | whitelisted |
2368 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2964 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2964 | iexplore.exe | 13.107.4.50:80 | ctldl.windowsupdate.com | Microsoft Corporation | US | whitelisted |
2368 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2964 | iexplore.exe | 162.159.133.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2368 | iexplore.exe | 204.79.197.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
2368 | iexplore.exe | 13.107.4.50:80 | ctldl.windowsupdate.com | Microsoft Corporation | US | whitelisted |
— | — | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2884 | RtkBtManServ.exe | 23.202.231.167:443 | itroublvehacker.gq | Akamai Technologies, Inc. | US | malicious |
— | — | 23.202.231.167:443 | itroublvehacker.gq | Akamai Technologies, Inc. | US | malicious |
— | — | 162.159.128.233:443 | discord.com | Cloudflare Inc | — | malicious |
Domain | IP | Reputation |
---|---|---|
cdn.discordapp.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
itroublvehacker.gq |
| whitelisted |
discord.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .gq Domain |