File name:

HEAD0000I00142259_pdf.jar

Full analysis: https://app.any.run/tasks/786ea57d-5158-493d-964a-937ba0233f10
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 26, 2019, 02:49:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
pyrogenic
evasion
trojan
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

CD970A4A891EB11BEF1CBA03F8986A07

SHA1:

78108554240D01B39D77E3E39229B0A9EBA37205

SHA256:

E06584F0F5B6C98AA9882E2B555850FFE096AF141C2F63507647611199B034ED

SSDEEP:

6144:rEXMRfPNyg1bQ0PGr7j+ychS610ehVxU2jNNRgd:rEXMRfFyg1xPGnjt6dPlRO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PYROGENIC was detected

      • javaw.exe (PID: 3552)
    • Actions looks like stealing of personal data

      • worker5073824568157330461.exe (PID: 2584)
    • Application was dropped or rewritten from another process

      • worker5073824568157330461.exe (PID: 3888)
      • worker5073824568157330461.exe (PID: 2584)
    • Loads dropped or rewritten executable

      • worker5073824568157330461.exe (PID: 2584)
      • javaw.exe (PID: 3552)
  • SUSPICIOUS

    • Creates files in the user directory

      • worker5073824568157330461.exe (PID: 2584)
      • javaw.exe (PID: 3552)
      • powershell.exe (PID: 3172)
    • Application launched itself

      • worker5073824568157330461.exe (PID: 3888)
    • Loads Python modules

      • worker5073824568157330461.exe (PID: 2584)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 3552)
      • worker5073824568157330461.exe (PID: 3888)
    • Executes PowerShell scripts

      • worker5073824568157330461.exe (PID: 2584)
    • Reads Internet Cache Settings

      • powershell.exe (PID: 3172)
    • Reads the cookies of Google Chrome

      • javaw.exe (PID: 3552)
    • Reads the cookies of Mozilla Firefox

      • javaw.exe (PID: 3552)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 3484)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3484)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3484)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2019:08:26 00:37:04
ZipCRC: 0xfeb979a6
ZipCompressedSize: 78
ZipUncompressedSize: 79
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start #PYROGENIC javaw.exe worker5073824568157330461.exe worker5073824568157330461.exe powershell.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2584C:\Users\admin\AppData\Local\Temp\tmp1486989297968\worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\tmp1486989297968\worker5073824568157330461.exe
worker5073824568157330461.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\tmp1486989297968\worker5073824568157330461.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\users\admin\appdata\local\temp\_mei38882\python27.dll
3172powershell.exe /c " function get-iehistory { [CmdletBinding()] param () $shell = New-Object -ComObject Shell.Application $hist = $shell.NameSpace(34) $folder = $hist.Self $hist.Items() | foreach { if ($_.IsFolder) { $siteFolder = $_.GetFolder $siteFolder.Items() | foreach { $site = $_ if ($site.IsFolder) { $pageFolder = $site.GetFolder $pageFolder.Items() | foreach { $visit = New-Object -TypeName PSObject -Property @{ URL = $($pageFolder.GetDetailsOf($_,0)) } $visit } } } } } } get-iehistory "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeworker5073824568157330461.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3484"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\callsmajor.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3552"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\HEAD0000I00142259_pdf.jar.zip"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3888C:\Users\admin\AppData\Local\Temp\tmp1486989297968\worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\tmp1486989297968\worker5073824568157330461.exe
javaw.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\tmp1486989297968\worker5073824568157330461.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\apphelp.dll
Total events
912
Read events
794
Write events
106
Delete events
12

Modification events

(PID) Process:(3172) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019082620190827
Operation:writeName:CachePath
Value:
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019082620190827
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019082620190827
Operation:writeName:CachePrefix
Value:
:2019082620190827:
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019082620190827
Operation:writeName:CacheLimit
Value:
8192
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019082620190827
Operation:writeName:CacheOptions
Value:
11
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019082620190827
Operation:writeName:CacheRepair
Value:
0
(PID) Process:(3172) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019032320190324
Operation:delete keyName:
Value:
(PID) Process:(3484) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName::o$
Value:
3A6F24009C0D0000010000000000000000000000
(PID) Process:(3484) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3484) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
Executable files
21
Suspicious files
3
Text files
5
Unknown types
8

Dropped files

PID
Process
Filename
Type
3552javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:
SHA256:
3552javaw.exeC:\Users\admin\AppData\Local\Temp\tmp1486989297968\worker5073824568157330461.exeexecutable
MD5:
SHA256:
3888worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\_MEI38882\mein.exe.manifestxml
MD5:
SHA256:
2584worker5073824568157330461.exeC:\users\admin\appdata\local\temp\wdok4v
MD5:
SHA256:
2584worker5073824568157330461.exeC:\users\admin\appdata\local\temp\hbnfjpxlf
MD5:
SHA256:
3172powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MPVP2X45JU314GS6K551.temp
MD5:
SHA256:
3888worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\_MEI38882\_hashlib.pydexecutable
MD5:AE0EF46BC3A52A92544B6FACAB0F32A1
SHA256:61372337FE96D67F92BCB44E6FAEEFB7FE404A326F819EA33E27D33DB98226F5
3888worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\_MEI38882\_ctypes.pydexecutable
MD5:7896F2B2B44A6DC7F8021C142339CE07
SHA256:DA6F2A24EE007F2BA49B120F6253E2030563093B6ABD4514BF81F7F2326AC96A
3888worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\_MEI38882\_elementtree.pydexecutable
MD5:1C143C741A5EC702BDC52EF496905662
SHA256:C2FC1A8775B9B593A07CFE6DA23ED43EA1D806A9529654A7CAB380DC0F37790A
3888worker5073824568157330461.exeC:\Users\admin\AppData\Local\Temp\_MEI38882\Microsoft.VC90.CRT.manifestxml
MD5:0BCAE6094FDA15852A9D5C1E1F03BB24
SHA256:454E12BC0DED5A81B52F38D73942E9F0A1BD2073AC2E976F63A8AF115C7EA296
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
1
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3552
javaw.exe
GET
200
66.171.248.178:80
http://bot.whatismyipaddress.com/
US
text
15 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3552
javaw.exe
206.81.27.160:80
US
malicious
3552
javaw.exe
66.171.248.178:80
bot.whatismyipaddress.com
Alchemy Communications, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
bot.whatismyipaddress.com
  • 66.171.248.178
shared

Threats

PID
Process
Class
Message
3552
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] JavaPython.Stealer.Pyrogenic
3552
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] JavaPython.Stealer.Pyrogenic
3552
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] JavaPython.Stealer.Pyrogenic
3552
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] JavaPython.Stealer.Pyrogenic
2 ETPRO signatures available at the full report
No debug info