| URL: | http://79.124.78.74/Delivery-Receipt.pdf.exe |
| Full analysis: | https://app.any.run/tasks/d1713a30-9ed3-4173-b073-c48bc4f8915d |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 17, 2019, 15:52:25 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | BE227F81D10E3D22D1ED1A6895F5F2F3 |
| SHA1: | 0613ABEC2396417C4497051D3930D6E1A8F7F17B |
| SHA256: | D60C267E24BE640AB33259B45880A19129C105D6A3A35A5BF39B6A4437868021 |
| SSDEEP: | 3:N1KSLVAJSAX5tVRLV10C:CSGJSAXJ2C |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2056 | TASKLIST /FI "STATUS eq RUNNING" | C:\Windows\system32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2160 | net stop "Security Center" | C:\Windows\system32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2228 | find /V "Image Name" | C:\Windows\system32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2256 | C:\Windows\system32\cmd.exe /c "dhl-receipt3657.exe" | C:\Windows\system32\cmd.exe | — | Delivery-Receipt.pdf[1].exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2268 | TASKKILL /F /IM "cmd.exe" | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2340 | C:\Windows\system32\cmd.exe /c tasklist | C:\Windows\system32\cmd.exe | — | dhl-receipt3657.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2444 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\Delivery-Receipt.pdf[1].exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\Delivery-Receipt.pdf[1].exe | Delivery-Receipt.pdf[1].exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2556 | find /V "=" | C:\Windows\system32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2716 | "C:\Program Files\Internet Explorer\iexplore.exe" -nohome | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2812 | C:\Windows\system32\net1 stop "Security Center" | C:\Windows\system32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {EEEC2A1F-1A6F-11E9-BAD8-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 3 | |||
| (PID) Process: | (2716) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E3070100040011000F0034002F00A003 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2716 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 2716 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 2716 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF8D6F9FCDF6809B6C.TMP | — | |
MD5:— | SHA256:— | |||
| 3288 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\Delivery-Receipt.pdf[1].exe | executable | |
MD5:— | SHA256:— | |||
| 2716 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{EEEC2A20-1A6F-11E9-BAD8-5254004A04AF}.dat | binary | |
MD5:— | SHA256:— | |||
| 2716 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\Delivery-Receipt.pdf[1].exe | executable | |
MD5:— | SHA256:— | |||
| 3328 | Delivery-Receipt.pdf[1].exe | C:\Users\admin\AppData\Local\Temp\_MEI33282\rr.exe.manifest | xml | |
MD5:— | SHA256:— | |||
| 2716 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011720190118\index.dat | dat | |
MD5:— | SHA256:— | |||
| 2444 | Delivery-Receipt.pdf[1].exe | C:\users\admin\appdata\local\temp\3fp1vp | — | |
MD5:— | SHA256:— | |||
| 3288 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011720190118\index.dat | dat | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2444 | Delivery-Receipt.pdf[1].exe | GET | — | 79.124.78.74:80 | http://79.124.78.74/dhl.exe | BG | — | — | suspicious |
3380 | dhl-receipt3657.exe | GET | 200 | 145.239.41.132:1338 | http://145.239.41.132:1338//stagers/whq.py | FR | text | 2.15 Kb | suspicious |
3380 | dhl-receipt3657.exe | GET | 200 | 145.239.41.132:1338 | http://145.239.41.132:1338//payloads/whq.py | FR | text | 118 Kb | suspicious |
2444 | Delivery-Receipt.pdf[1].exe | GET | 200 | 79.124.78.74:80 | http://79.124.78.74/dhl.png | BG | image | 20.6 Kb | suspicious |
3288 | iexplore.exe | GET | 200 | 79.124.78.74:80 | http://79.124.78.74/Delivery-Receipt.pdf.exe | BG | executable | 4.75 Mb | suspicious |
2716 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2716 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3288 | iexplore.exe | 79.124.78.74:80 | — | BlueAngelHost Pvt. Ltd | BG | suspicious |
2444 | Delivery-Receipt.pdf[1].exe | 79.124.78.74:80 | — | BlueAngelHost Pvt. Ltd | BG | suspicious |
3380 | dhl-receipt3657.exe | 145.239.41.132:1338 | — | OVH SAS | FR | suspicious |
3380 | dhl-receipt3657.exe | 145.239.41.132:1339 | — | OVH SAS | FR | suspicious |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
3288 | iexplore.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
3288 | iexplore.exe | Potentially Bad Traffic | ET POLICY SUSPICIOUS *.pdf.exe in HTTP URL |
3288 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3288 | iexplore.exe | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
2444 | Delivery-Receipt.pdf[1].exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2444 | Delivery-Receipt.pdf[1].exe | Attempted Information Leak | ET POLICY Python-urllib/ Suspicious User Agent |
2444 | Delivery-Receipt.pdf[1].exe | Potentially Bad Traffic | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile |
2444 | Delivery-Receipt.pdf[1].exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2444 | Delivery-Receipt.pdf[1].exe | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
2444 | Delivery-Receipt.pdf[1].exe | Attempted Information Leak | ET POLICY Python-urllib/ Suspicious User Agent |