File name:

cb4b8fe0c1e53fdd444e3d09c4ebd7af-sample.zip

Full analysis: https://app.any.run/tasks/40daf6b0-2c35-43b9-819c-8c56446796cd
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 19, 2019, 09:08:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
floxif
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

CED95B0B0736282A4876166ABCA62828

SHA1:

5012B8994CE68B5572E8099CB4A37D78D38AEA70

SHA256:

E1146BCF7861746C2B12550F81C42D79AFBBA7D9615D70F9DAFACD3FCB7F1D20

SSDEEP:

24576:ih/vdT9kCeWu/X8LtcnVSHmirzqxAsNjzErMNyUGC3:a/lT9VJu/XomVSGirexAsNjRyUGC3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 3488)
      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
      • WinRAR.exe (PID: 3524)
    • Changes Windows auto-update feature

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Disables Windows Defender

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Loads dropped or rewritten executable

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • FLOXIF was detected

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Connects to CnC server

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3524)
      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Creates files in the program directory

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Changes tracing settings of the file or console

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2019:09:19 09:08:02
ZipCRC: 0x1cea19ec
ZipCompressedSize: 1177325
ZipUncompressedSize: 1217023
ZipFileName: 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe no specs #FLOXIF 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe

Process information

PID
CMD
Path
Indicators
Parent process
2492"C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
WinRAR.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
HIGH
Description:
Rufus
Exit code:
0
Version:
3.8.1580
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3488"C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeWinRAR.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
MEDIUM
Description:
Rufus
Exit code:
3221226540
Version:
3.8.1580
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
c:\systemroot\system32\ntdll.dll
3524"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\cb4b8fe0c1e53fdd444e3d09c4ebd7af-sample.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
552
Read events
463
Write events
61
Delete events
28

Modification events

(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3524) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\cb4b8fe0c1e53fdd444e3d09c4ebd7af-sample.zip
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
6
Suspicious files
1
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libglib-2.0-0.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\intl.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libgcc_s_sjlj-1.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libssp-0.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\qemu-ga.exe.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Internet Explorer\ieproxy.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\WinRAR\WinRAR.exe.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Windows\System32\GroupPolicy\gpt.initext
MD5:
SHA256:
3524WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeexecutable
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Windows\System32\GroupPolicy\GPT.INItext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
15
DNS requests
3
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/so.gif
US
html
175 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
185.199.110.153:443
rufus.ie
GitHub, Inc.
NL
shared
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
104.200.22.130:80
www.aieov.com
Linode, LLC
US
malicious
185.199.110.153:443
rufus.ie
GitHub, Inc.
NL
shared

DNS requests

Domain
IP
Reputation
5isohu.com
whitelisted
rufus.ie
  • 185.199.110.153
  • 185.199.111.153
  • 185.199.108.153
  • 185.199.109.153
suspicious
www.aieov.com
  • 104.200.22.130
  • 104.200.23.95
malicious

Threats

PID
Process
Class
Message
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
6 ETPRO signatures available at the full report
Process
Message
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
*** Rufus init ***
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Binary executable is signed by 'Akeo Consulting'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Binary executable is signed by 'Akeo Consulting'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Will use settings from registry
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
loc file not found in current directory - embedded one will be used
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: extracted data to 'C:\Users\admin\AppData\Local\Temp\RufCC7C.tmp'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'en-US'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'ar-SA'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'bg-BG'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'zh-CN'