analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

5781707804835840.zip

Full analysis: https://app.any.run/tasks/8dfa9f45-6e43-48ee-9812-c256bcdd2837
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: July 11, 2019, 13:41:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gozi
ursnif
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

83187CFE903566BD8B9175D44488611A

SHA1:

ABAF95CE57A39BA4DB82E97920CB30EFA26EC3A1

SHA256:

E62667923B4C82671402EFCF51594F3D5AD7631C3D76EE6255E6B670A3915BCC

SSDEEP:

3072:jlViLVW4QygE3tPcv+pWDy62obqJMObQLVW1lEBZOhyVJ1x5hPsdamn:BwL0iI6LobqJv4cmZKyVDx5dsVn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • test.exe (PID: 3408)
    • URSNIF was detected

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3792)
      • iexplore.exe (PID: 3256)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 1604)
      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 4056)
    • Connects to CnC server

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3792)
      • iexplore.exe (PID: 3256)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 1604)
      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 4056)
  • SUSPICIOUS

    • Executed via COM

      • iexplore.exe (PID: 3616)
      • iexplore.exe (PID: 3720)
      • iexplore.exe (PID: 3240)
      • iexplore.exe (PID: 2436)
      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 3928)
      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 3464)
      • iexplore.exe (PID: 1692)
  • INFO

    • Manual execution by user

      • test.exe (PID: 3408)
    • Creates files in the user directory

      • iexplore.exe (PID: 3688)
    • Changes internet zones settings

      • iexplore.exe (PID: 3616)
      • iexplore.exe (PID: 3720)
      • iexplore.exe (PID: 3240)
      • iexplore.exe (PID: 2436)
      • iexplore.exe (PID: 3928)
      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 3464)
      • iexplore.exe (PID: 1692)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3792)
      • iexplore.exe (PID: 3256)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 1604)
      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 3348)
      • iexplore.exe (PID: 4056)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3792)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 3256)
      • iexplore.exe (PID: 1604)
      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 4056)
    • Application launched itself

      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 19d964c284f3a76b9c38b75252a43b5886a9be7915b094e1194e06c0bcaf4b47
ZipUncompressedSize: 297472
ZipCompressedSize: 178810
ZipCRC: 0x00000000
ZipModifyDate: 1980:00:00 00:00:00
ZipCompression: Unknown (99)
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
20
Malicious processes
12
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe no specs test.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe #URSNIF iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3012"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\5781707804835840.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3408"C:\Users\admin\Desktop\test.exe" C:\Users\admin\Desktop\test.exe
explorer.exe
User:
admin
Company:
Magic Leap
Integrity Level:
MEDIUM
Description:
103 Selectivity Instantiation Pac
3616"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3688"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3616 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3720"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3792"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3720 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3240"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3256"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3240 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2436"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2484"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2436 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
3 743
Read events
3 382
Write events
353
Delete events
8

Modification events

(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3012) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\5781707804835840.zip
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3012) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3408) test.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
test.exe
Executable files
0
Suspicious files
0
Text files
89
Unknown types
4

Dropped files

PID
Process
Filename
Type
3012WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3012.7917\19d964c284f3a76b9c38b75252a43b5886a9be7915b094e1194e06c0bcaf4b47
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF79749477116D6E5C.TMP
MD5:
SHA256:
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{E96E0446-A3E1-11E9-A9B1-5254004A04AF}.dat
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:07427262C25E9E9DB3C91F70D133789A
SHA256:D9A54E5431B899023650684771E8032666F0F2D5F228EF16EDB163D05F8153DB
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:FF5638B3664AD2AA5A4704CB3EF8B102
SHA256:0C301527CDDDBDE80DCBED095F10D60402BE49F9C6571A2499B061DA931FEF1F
3616iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF560D22550B9BF103.TMP
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
3616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{E96E0445-A3E1-11E9-A9B1-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
27
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3688
iexplore.exe
POST
404
161.117.80.233:80
http://api.fiho.at/index.htm
SG
html
161 b
malicious
3792
iexplore.exe
POST
404
161.117.80.233:80
http://api.fiho.at/index.htm
SG
html
161 b
malicious
1604
iexplore.exe
POST
404
161.117.80.233:80
http://api.fiho.at/index.htm
SG
html
161 b
malicious
3240
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2848
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2712
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3256
iexplore.exe
POST
404
161.117.80.233:80
http://api.fiho.at/index.htm
SG
html
161 b
malicious
2436
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3616
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
4060
iexplore.exe
POST
404
161.117.80.233:80
http://api.fiho.at/index.htm
SG
html
161 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3616
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3720
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3240
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3408
test.exe
172.104.136.243:53
Linode, LLC
DE
malicious
3688
iexplore.exe
161.117.80.233:80
api.fiho.at
SG
malicious
3792
iexplore.exe
161.117.80.233:80
api.fiho.at
SG
malicious
3256
iexplore.exe
161.117.80.233:80
api.fiho.at
SG
malicious
2484
iexplore.exe
161.117.80.233:80
api.fiho.at
SG
malicious
3928
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2436
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
api.fiho.at
  • 161.117.80.233
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
3688
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
3256
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
2484
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
1604
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
4060
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
4056
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Ursnif
12 ETPRO signatures available at the full report
No debug info