analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Here.zip

Full analysis: https://app.any.run/tasks/a9d3c4ef-e787-4589-961b-35c9e7b02962
Verdict: Malicious activity
Analysis date: November 29, 2020, 18:19:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

433D2BA266B252EE7169C1332EA3C70D

SHA1:

DA2574BAA71AE19B63BD74FD004D416AAFDA0917

SHA256:

E7EBCDB71B394BBEB7C7E57AE45CFEF5E6CE37FCCA9E38CF94CBF11B12EF9938

SSDEEP:

6:5jq9hnRsPs6PoyhRzvHpoDjQB2Vd2hwh97yVZKhxxBzxq918n5jQBZ/z7tz:5jqXWwyhR9skB2ehQ9yVZKhxzM386Bjz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • cmd.exe (PID: 2848)
    • Executes scripts

      • cmd.exe (PID: 2848)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 2848)
    • Changes internet zones settings

      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 1852)
      • iexplore.exe (PID: 2148)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2660)
      • iexplore.exe (PID: 4072)
      • iexplore.exe (PID: 756)
    • Application launched itself

      • iexplore.exe (PID: 1852)
      • iexplore.exe (PID: 2148)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 2660)
      • iexplore.exe (PID: 756)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 4072)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3128)
      • iexplore.exe (PID: 3692)
      • iexplore.exe (PID: 1484)
      • iexplore.exe (PID: 2672)
      • iexplore.exe (PID: 2464)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 556)
      • iexplore.exe (PID: 2148)
      • iexplore.exe (PID: 756)
      • iexplore.exe (PID: 4588)
      • iexplore.exe (PID: 3660)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 2660)
      • iexplore.exe (PID: 2348)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 4784)
      • iexplore.exe (PID: 6092)
      • iexplore.exe (PID: 4072)
      • iexplore.exe (PID: 1852)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1484)
      • iexplore.exe (PID: 1652)
      • iexplore.exe (PID: 2056)
      • iexplore.exe (PID: 2672)
      • iexplore.exe (PID: 1392)
      • iexplore.exe (PID: 3692)
      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 2572)
      • iexplore.exe (PID: 3660)
      • iexplore.exe (PID: 556)
      • iexplore.exe (PID: 4784)
      • iexplore.exe (PID: 4864)
      • iexplore.exe (PID: 5780)
      • iexplore.exe (PID: 4588)
    • Creates files in the user directory

      • iexplore.exe (PID: 3128)
      • iexplore.exe (PID: 2464)
      • iexplore.exe (PID: 1484)
      • iexplore.exe (PID: 2484)
      • iexplore.exe (PID: 2508)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2148)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2660)
      • iexplore.exe (PID: 756)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 2148)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2660)
      • iexplore.exe (PID: 756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:11:29 19:19:00
ZipCRC: 0xed2b6168
ZipCompressedSize: 70
ZipUncompressedSize: 109
ZipFileName: Launch me.bat
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
103
Monitored processes
67
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs wscript.exe no specs iexplore.exe iexplore.exe iexplore.exe wscript.exe no specs iexplore.exe iexplore.exe iexplore.exe wscript.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe wscript.exe no specs wscript.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs iexplore.exe iexplore.exe iexplore.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs iexplore.exe iexplore.exe iexplore.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs iexplore.exe no specs wscript.exe no specs iexplore.exe iexplore.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs iexplore.exe wscript.exe no specs iexplore.exe wscript.exe no specs iexplore.exe wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs iexplore.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2476"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Here.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2848cmd /c ""C:\Users\admin\Desktop\Launch me.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2492"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Lol.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
3636"C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1852"C:\Program Files\Internet Explorer\iexplore.exe" https://youtube.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2148"C:\Program Files\Internet Explorer\iexplore.exe" https://nintendo.co.jp/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3460"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Lol.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
2660"C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1516"C:\Program Files\Internet Explorer\iexplore.exe" https://youtube.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
4072"C:\Program Files\Internet Explorer\iexplore.exe" https://nintendo.co.jp/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
10 353
Read events
8 528
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
50
Text files
285
Unknown types
36

Dropped files

PID
Process
Filename
Type
2476WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2476.31585\Launch me.bat
MD5:
SHA256:
2476WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2476.31585\Lol.vbs
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].ico
MD5:
SHA256:
1852iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[3].ico
MD5:
SHA256:
1852iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2148iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3128iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab355A.tmp
MD5:
SHA256:
3128iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar355B.tmp
MD5:
SHA256:
2464iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab3673.tmp
MD5:
SHA256:
2464iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar3674.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
303
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2464
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3128
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQD76E8xQFZstgIAAAAAgFWS
US
der
472 b
whitelisted
1852
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2464
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQD76E8xQFZstgIAAAAAgFWS
US
der
472 b
whitelisted
3636
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2464
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2464
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDliVAU%2F6ZWzwIAAAAAgFX%2B
US
der
472 b
whitelisted
2484
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDa2MTpyZrzlQgAAAAAYth4
US
der
472 b
whitelisted
2464
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
1852
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2464
iexplore.exe
172.217.23.142:443
youtube.com
Google Inc.
US
whitelisted
1392
iexplore.exe
172.217.23.142:443
youtube.com
Google Inc.
US
whitelisted
172.217.12.142:443
google.com
Google Inc.
US
whitelisted
1484
iexplore.exe
172.217.12.142:443
google.com
Google Inc.
US
whitelisted
2464
iexplore.exe
172.217.12.142:443
google.com
Google Inc.
US
whitelisted
3128
iexplore.exe
172.217.23.142:443
youtube.com
Google Inc.
US
whitelisted
3692
iexplore.exe
172.217.12.142:443
google.com
Google Inc.
US
whitelisted
3636
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1852
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2672
iexplore.exe
172.217.12.142:443
google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
youtube.com
  • 172.217.23.142
whitelisted
google.com
  • 172.217.12.142
whitelisted
nintendo.co.jp
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ocsp.pki.goog
  • 172.217.21.195
whitelisted
www.youtube.com
  • 64.233.160.136
  • 64.233.180.91
  • 173.194.223.136
  • 173.194.223.93
  • 173.194.78.190
  • 173.194.223.190
  • 108.177.9.93
  • 64.233.180.93
  • 108.177.9.190
  • 64.233.180.136
  • 64.233.168.91
  • 173.194.78.93
  • 173.194.67.190
  • 64.233.169.136
  • 142.250.28.91
  • 64.233.169.190
whitelisted
www.google.com
  • 172.217.165.132
whitelisted
ssl.gstatic.com
  • 172.217.18.3
whitelisted
consent.google.com
  • 216.58.210.14
shared

Threats

No threats detected
No debug info