File name: | Fattura_1108_116.rar |
Full analysis: | https://app.any.run/tasks/8062abcb-ff70-4e71-b999-298fa57d4817 |
Verdict: | Malicious activity |
Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
Analysis date: | November 08, 2018, 13:02:04 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 13AC494B5C1B99188943052EF1E499FD |
SHA1: | A25B84AAEC2ACD6DF5572EBDA29CD072649E3F3F |
SHA256: | E055569C97A3A09C245473D158E2FD5950CE767EA5229DAE306984CF69FAE534 |
SSDEEP: | 12:oEOrn6MLx6MMnKhyqb5sOSJsWU2wdmBvgdDu/XTVY3Kj8xJROQGV1ZSPz:ZOrFx6DnK3mOSJsWZBvES7VY3jVOlTSb |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3716 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Fattura_1108_116.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
1484 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa3716.14746\Fattura_1108_116.vbs" | C:\Windows\System32\WScript.exe | WinRAR.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 | ||||
2900 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
860 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2900 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3508 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2944 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3508 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3288 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3588 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3288 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
556 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3352 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:556 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Fattura_1108_116.rar | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\wshext.dll,-4802 |
Value: VBScript Script File | |||
(PID) Process: | (3716) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2900 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
2900 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
2900 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF9200AFBF2B8D28E4.TMP | — | |
MD5:— | SHA256:— | |||
2900 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{89FD1F84-E356-11E8-9C83-5254004AAD11}.dat | — | |
MD5:— | SHA256:— | |||
2900 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFCBA2A1F9F46A5358.TMP | — | |
MD5:— | SHA256:— | |||
2900 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{89FD1F83-E356-11E8-9C83-5254004AAD11}.dat | — | |
MD5:— | SHA256:— | |||
3508 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
3508 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
3508 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF102716FE5E67EB5B.TMP | — | |
MD5:— | SHA256:— | |||
3508 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{9158A140-E356-11E8-9C83-5254004AAD11}.dat | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3588 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/news.php?cbc=044870&d=23188815 | US | text | 20 b | suspicious |
3352 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/news.php?cbc=044870&d=23188816 | US | text | 27 b | suspicious |
3508 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/favicon.ico | US | text | 21 b | suspicious |
3288 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/favicon.ico | US | text | 595 b | suspicious |
2900 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/favicon.ico | US | text | 23 b | suspicious |
556 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/favicon.ico | US | text | 20 b | suspicious |
2508 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/favicon.ico | US | text | 22 b | suspicious |
2944 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/news.php?cbc=044870&d=23188814 | US | text | 27 b | suspicious |
2888 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/news.php?cbc=044870&d=23188818 | US | text | 403 Kb | suspicious |
860 | iexplore.exe | GET | 200 | 107.173.193.253:80 | http://107.173.193.253/news.php?cbc=044870&d=23188813 | US | text | 28 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2900 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3508 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2900 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
2944 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
860 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
3288 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
3288 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3588 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
556 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3508 | iexplore.exe | 107.173.193.253:80 | — | ColoCrossing | US | suspicious |
Domain | IP | Reputation |
---|---|---|
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
2888 | iexplore.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] PE EXE or DLL Windows file download HTTP (base64 encoded) |
2888 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM Packet with invalid ack |
2888 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM SHUTDOWN RST invalid ack |