analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Scan_Payment_Copy8704.pdf.z

Full analysis: https://app.any.run/tasks/6615c80c-9566-4255-8f24-e24e852cc221
Verdict: Malicious activity
Analysis date: November 15, 2018, 01:38:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

75A916608069CE9E740B74314045639E

SHA1:

170EFD77F46BE82CA9EE66FE5C09841E192AF416

SHA256:

D4A78BA5BA02A2C5A3B21DD2F56ADCE6AEFF1E682B02C57F8C933040B9EF191C

SSDEEP:

24576:SMJ9TJ4saJMbKPuNGVw3BQc4I0btQYu0I+ZdXK1:XTJnaJI8uNMw3BQcGtQY1IKS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Scan_Payment_Copy8704.scr (PID: 3216)
      • RegSvcs.exe (PID: 2144)
      • che.exe (PID: 312)
      • che.exe (PID: 736)
      • IMDCSC.exe (PID: 2536)
    • Changes the autorun value in the registry

      • RegSvcs.exe (PID: 2144)
      • che.exe (PID: 312)
  • SUSPICIOUS

    • Drop AutoIt3 executable file

      • Scan_Payment_Copy8704.scr (PID: 3216)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2700)
      • Scan_Payment_Copy8704.scr (PID: 3216)
      • RegSvcs.exe (PID: 2144)
      • che.exe (PID: 312)
    • Application launched itself

      • che.exe (PID: 736)
    • Starts itself from another location

      • RegSvcs.exe (PID: 2144)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • che.exe (PID: 736)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe scan_payment_copy8704.scr che.exe no specs che.exe regsvcs.exe imdcsc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2700"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Scan_Payment_Copy8704.pdf.z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3216"C:\Users\admin\Desktop\Scan_Payment_Copy8704.scr" /SC:\Users\admin\Desktop\Scan_Payment_Copy8704.scr
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
736"C:\Users\admin\AppData\Local\Temp\27018646\che.exe" itc=htc C:\Users\admin\AppData\Local\Temp\27018646\che.exeScan_Payment_Copy8704.scr
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
312C:\Users\admin\AppData\Local\Temp\27018646\che.exe C:\Users\admin\AppData\Local\Temp\27018646\SYXOZC:\Users\admin\AppData\Local\Temp\27018646\che.exe
che.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
2144"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
che.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
2536"C:\Users\admin\Documents\DCSCMIN\IMDCSC.exe" C:\Users\admin\Documents\DCSCMIN\IMDCSC.exeRegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Total events
1 135
Read events
1 103
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
0
Text files
50
Unknown types
0

Dropped files

PID
Process
Filename
Type
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\itc=htctext
MD5:7E9762B6CE99F61E7079D2D938AC41E0
SHA256:370D45A4A31AD70B2C550DB2D97D9583EE780582065CB6CF2A54DC615343E915
2700WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2700.44621\Scan_Payment_Copy8704.screxecutable
MD5:78B3FA0F86CDF97BD33D402938885062
SHA256:F4500B5B4C8B649C8B154430C7238BCDF4016CB6BD463F7BE6F95BA9A9228677
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\kwk.xltext
MD5:A4A4ED6D688F9779250DAEEF90D2EDF7
SHA256:12FA91C4E9B7537184EF877486BD2175A783759ED2A283A1CAC5EA83DF1C02A9
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\hlw.txttext
MD5:82D7A133F50F0EDFA4F80A2FB13C8A79
SHA256:B3094BDD7129FE892341D13966A8C63C9F24FBBC8B855530E1A828E81AA53670
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\sge.icotext
MD5:F86E4BB26B0EBACFC6B24F427DF2992D
SHA256:5206ABB53C8AEF060D0344C958AB6EFEB12C9A72A31BC0A27219773A5F2C8F46
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\rwf.dattext
MD5:2C2F05D346DD1A114ACD0EB43B84904B
SHA256:5EA11CCB781E2C38864A33B8FE2B8125390303F906F4557B1C61540B408EF77E
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\wlq.bmptext
MD5:2325D23D3AD9D83C7EF13C44E40381F8
SHA256:DB715D29EAFA3E7B06BE015C0C98DED75544F7ED73A1973D6A8F20BBE59C6CEF
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\hkc.mp4text
MD5:E55C7CA0335E3F31C243D44E4E2B0D6B
SHA256:51200126C62883FB31F878EEAB5C52570ED291C4727768FB4CA899ED74EF6038
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\iux.icmtext
MD5:61B7DA85A738CA7476DF42906B705F76
SHA256:8649F7BB23A74687DCCBE12939C36B6A9773561E5FFD8C5C4F4478590FBB2F03
3216Scan_Payment_Copy8704.scrC:\Users\admin\AppData\Local\Temp\27018646\see.icotext
MD5:27C02BD9C2A3EF6D1D9C567EADC109A2
SHA256:1A5370398368A8BBAB5BE2B2F322918677EB7975B4575F076948E49C8B254330
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info