analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

6748784799285248.zip

Full analysis: https://app.any.run/tasks/de1857d4-a419-4c5f-bd51-df8a09f57bf0
Verdict: Malicious activity
Analysis date: February 22, 2020, 11:59:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

1D96324541643FA76DB00EEF242C8727

SHA1:

6BB580B51B9B3013735DEC97F078D979FA18E244

SHA256:

D65C569C047982B2801987A371F1EC6905B88BF472E35DB4845727AF0B7E32B5

SSDEEP:

192:euUlUy/87Dh7bFTqpQ3JXKxVBsw03TUOKeQDk+xaNN6VIt:el87DhdqpQ3JXG2B3wOKtcb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • MSOXMLED.EXE (PID: 3560)
    • Reads Internet Cache Settings

      • WINWORD.EXE (PID: 956)
      • WINWORD.EXE (PID: 3684)
  • INFO

    • Manual execution by user

      • MSOXMLED.EXE (PID: 3560)
      • WINWORD.EXE (PID: 956)
      • WINWORD.EXE (PID: 3684)
      • EXCEL.EXE (PID: 2704)
      • WINWORD.EXE (PID: 548)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2592)
      • iexplore.exe (PID: 2840)
    • Changes internet zones settings

      • iexplore.exe (PID: 2592)
    • Application launched itself

      • iexplore.exe (PID: 2592)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3772)
      • iexplore.exe (PID: 2840)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 956)
      • WINWORD.EXE (PID: 3684)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 956)
      • WINWORD.EXE (PID: 3684)
      • WINWORD.EXE (PID: 548)
      • EXCEL.EXE (PID: 2704)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2592)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2592)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x8ca1c636
ZipCompressedSize: 9004
ZipUncompressedSize: 11760
ZipFileName: d0b97ae8a6be8f1142ae78abc8d96a7401bb94434daedcff0b7b35f0654e3b4a
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
9
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs msoxmled.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe no specs winword.exe winword.exe excel.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1348"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\6748784799285248.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3560"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\admin\Desktop\asd.xml"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
XML Editor
Exit code:
0
Version:
14.0.4750.1000
Modules
Images
c:\program files\common files\microsoft shared\office14\msoxmled.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2592"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
MSOXMLED.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2840"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2592 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3772"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2592 CREDAT:78849 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
956"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\as.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3684"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\as.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
2704"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
548"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\asd.docm"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
Total events
13 420
Read events
4 347
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
34
Text files
6
Unknown types
10

Dropped files

PID
Process
Filename
Type
1348WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1348.27960\d0b97ae8a6be8f1142ae78abc8d96a7401bb94434daedcff0b7b35f0654e3b4a
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFD831BE33F0A8D150.TMP
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFF957235AFB689CFA.TMP
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF46F651F9EFF4C402.TMP
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF070088AB240C508A.TMP
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFE526C22779D76424.TMP
MD5:
SHA256:
2592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF14DB2CB672B1FA89.TMP
MD5:
SHA256:
956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR1689.tmp.cvr
MD5:
SHA256:
956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\{0F8DAE4A-9A5E-4F02-9B60-730410652F38}
MD5:
SHA256:
956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\{CCEF1B87-6D18-461C-AA74-FEB4E082418D}
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
14
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
824
svchost.exe
OPTIONS
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office
US
malicious
956
WINWORD.EXE
HEAD
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/invoice_11131.doc
US
malicious
956
WINWORD.EXE
OPTIONS
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/
US
malicious
956
WINWORD.EXE
GET
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/invoice_11131.doc
US
malicious
824
svchost.exe
OPTIONS
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office
US
malicious
2592
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
3684
WINWORD.EXE
HEAD
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/invoice_11131.doc
US
malicious
3684
WINWORD.EXE
GET
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/invoice_11131.doc
US
malicious
2592
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
3684
WINWORD.EXE
OPTIONS
192.169.69.25:80
http://kung2globalinvestmentwsdygoogledngaddres.duckdns.org/office/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2592
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
956
WINWORD.EXE
192.169.69.25:80
kung2globalinvestmentwsdygoogledngaddres.duckdns.org
Wowrack.com
US
malicious
2592
iexplore.exe
72.21.91.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3684
WINWORD.EXE
192.169.69.25:80
kung2globalinvestmentwsdygoogledngaddres.duckdns.org
Wowrack.com
US
malicious
824
svchost.exe
192.169.69.25:80
kung2globalinvestmentwsdygoogledngaddres.duckdns.org
Wowrack.com
US
malicious

DNS requests

Domain
IP
Reputation
kung2globalinvestmentwsdygoogledngaddres.duckdns.org
  • 192.169.69.25
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 72.21.91.29
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info