File name:

SMS.Bomber.v1.0.Release (1).zip

Full analysis: https://app.any.run/tasks/41082a55-5317-4c6b-a792-e71d716ba5da
Verdict: Malicious activity
Analysis date: March 29, 2020, 09:44:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

4BA7153AB005AE8376A2E51F17555A0A

SHA1:

00694EAC06526CC0ABD8B0FC415499D4461CAC69

SHA256:

E2C5ADA0A675C66E39E4A30307A7210F80056035E0346B1A9957D3D99392EBBE

SSDEEP:

12288:5AKKszDnqorsz/rw1+BqbkBm5yJ4M5FJy1dDj23qe1:5AaDqor/1tbkRJ55Fud3260

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SmsBomber.exe (PID: 1940)
      • SmsBomber.exe (PID: 3624)
    • Application was dropped or rewritten from another process

      • SmsBomber.exe (PID: 1940)
      • SmsBomber.exe (PID: 3624)
      • SmsBomber.vshost.exe (PID: 3356)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2884)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:11:12 23:27:05
ZipCRC: 0xb211a78d
ZipCompressedSize: 23295
ZipUncompressedSize: 283541
ZipFileName: Leaf.xNet.xml
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start winrar.exe smsbomber.exe no specs smsbomber.vshost.exe smsbomber.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1940"C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.exeWinRAR.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
SmsBomber
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2884.45046\smsbomber.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2884"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SMS.Bomber.v1.0.Release (1).zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3356"C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.47437\SmsBomber.vshost.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.47437\SmsBomber.vshost.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
vshost32.exe
Exit code:
3762504530
Version:
14.0.23107.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2884.47437\smsbomber.vshost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3624"C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.48537\SmsBomber.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2884.48537\SmsBomber.exeWinRAR.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
SmsBomber
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2884.48537\smsbomber.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
573
Read events
541
Write events
32
Delete events
0

Modification events

(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2884) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SMS.Bomber.v1.0.Release (1).zip
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2884) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
18
Suspicious files
0
Text files
12
Unknown types
5

Dropped files

PID
Process
Filename
Type
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.exeexecutable
MD5:
SHA256:
1940SmsBomber.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\Settings.txtpi2
MD5:
SHA256:
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\Leaf.xNet.xmlxml
MD5:
SHA256:
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.pdbpdb
MD5:
SHA256:
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.47437\Leaf.xNet.xmlxml
MD5:
SHA256:
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\Leaf.xNet.dllexecutable
MD5:C56DE89F88B5E8203A637FC0CC1FA0DB
SHA256:5F4938C1140BE5E19F0BFD0FE9838DCCF8554DB781C56482660AA7DC751FB4BB
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.exe.configxml
MD5:5A7F52D69E6FCA128023469AE760C6D5
SHA256:498C7F8E872F9CEF0CF04F7D290CF3804C82A007202C9B484128C94D03040FD0
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.vshost.exe.manifestxml
MD5:A19A2658BA69030C6AC9D11FD7D7E3C1
SHA256:C0085EB467D2FC9C9F395047E057183B3CD1503A4087D0DB565161C13527A76F
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.45046\SmsBomber.vshost.exe.configxml
MD5:5A7F52D69E6FCA128023469AE760C6D5
SHA256:498C7F8E872F9CEF0CF04F7D290CF3804C82A007202C9B484128C94D03040FD0
2884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2884.47437\MetroFramework.Design.dllexecutable
MD5:AB4C3529694FC8D2427434825F71B2B8
SHA256:0A4A96082E25767E4697033649B16C76A652E120757A2CECAB8092AD0D716B65
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info