analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

cb4b8fe0c1e53fdd444e3d09c4ebd7af-sample.zip

Full analysis: https://app.any.run/tasks/40daf6b0-2c35-43b9-819c-8c56446796cd
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 19, 2019, 09:08:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
floxif
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

CED95B0B0736282A4876166ABCA62828

SHA1:

5012B8994CE68B5572E8099CB4A37D78D38AEA70

SHA256:

E1146BCF7861746C2B12550F81C42D79AFBBA7D9615D70F9DAFACD3FCB7F1D20

SSDEEP:

24576:ih/vdT9kCeWu/X8LtcnVSHmirzqxAsNjzErMNyUGC3:a/lT9VJu/XomVSGirexAsNjRyUGC3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 3488)
      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
      • WinRAR.exe (PID: 3524)
    • Loads dropped or rewritten executable

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Disables Windows Defender

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Changes Windows auto-update feature

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • FLOXIF was detected

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Connects to CnC server

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
      • WinRAR.exe (PID: 3524)
    • Creates files in the program directory

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
    • Changes tracing settings of the file or console

      • 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe (PID: 2492)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2019:09:19 09:08:02
ZipCRC: 0x1cea19ec
ZipCompressedSize: 1177325
ZipUncompressedSize: 1217023
ZipFileName: 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe no specs #FLOXIF 30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe

Process information

PID
CMD
Path
Indicators
Parent process
3524"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\cb4b8fe0c1e53fdd444e3d09c4ebd7af-sample.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3488"C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeWinRAR.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
MEDIUM
Description:
Rufus
Exit code:
3221226540
Version:
3.8.1580
2492"C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
WinRAR.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
HIGH
Description:
Rufus
Version:
3.8.1580
Total events
552
Read events
463
Write events
0
Delete events
0

Modification events

No data
Executable files
6
Suspicious files
1
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libglib-2.0-0.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\intl.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libgcc_s_sjlj-1.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\libssp-0.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Qemu-ga\qemu-ga.exe.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\Internet Explorer\ieproxy.dll.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\WinRAR\WinRAR.exe.tmp
MD5:
SHA256:
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Program Files\WinRAR\WinRAR.exeexecutable
MD5:7FA4DCB748C30BE7369B7EEE0B933176
SHA256:E9F1885B189970170A5AEB70D7D38C72EFCBCEEBD210130F8568E30C39A09AEF
3524WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3524.14520\30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeexecutable
MD5:51390856BA36D3DD182342C083F07FE0
SHA256:30899E5874F879C10E63C8DEDB8EF830CB101FA50115154043AA38A89DFA32F0
249230899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exeC:\Windows\System32\GroupPolicy\gpt.initext
MD5:B80DA72138836F4AE021F8AB704AC61B
SHA256:D3E559031C039C67A0CB8F54D9DAFE05306BC9739907171E07259C865F6FDAA4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
15
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/so.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
GET
403
104.200.22.130:80
http://www.aieov.com/logo.gif
US
html
175 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
104.200.22.130:80
www.aieov.com
Linode, LLC
US
malicious
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
185.199.110.153:443
rufus.ie
GitHub, Inc.
NL
shared
185.199.110.153:443
rufus.ie
GitHub, Inc.
NL
shared

DNS requests

Domain
IP
Reputation
5isohu.com
whitelisted
rufus.ie
  • 185.199.110.153
  • 185.199.111.153
  • 185.199.108.153
  • 185.199.109.153
suspicious
www.aieov.com
  • 104.200.22.130
  • 104.200.23.95
malicious

Threats

PID
Process
Class
Message
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
2492
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32.Floxif.A
6 ETPRO signatures available at the full report
Process
Message
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
*** Rufus init ***
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Binary executable is signed by 'Akeo Consulting'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Binary executable is signed by 'Akeo Consulting'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
Will use settings from registry
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
loc file not found in current directory - embedded one will be used
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: extracted data to 'C:\Users\admin\AppData\Local\Temp\RufCC7C.tmp'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'en-US'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'ar-SA'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'bg-BG'
30899e5874f879c10e63c8dedb8ef830cb101fa50115154043aa38a89dfa32f0.exe
localization: found locale 'zh-CN'