analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Antivirus.zip

Full analysis: https://app.any.run/tasks/4b97d05f-977c-4a11-9c91-41adb9944cc2
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: November 29, 2020, 13:37:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E1AC4770F42BAC0E4A6826314331C6EA

SHA1:

66493386AD995819871ACA4C30897B6F29AB358F

SHA256:

EABF7FDD31C5838D66CCBC3CA52B0F6EAF8120F83EED43F372F21E4D31734B73

SSDEEP:

24576:oSL6Ntp05P6ftXeQAPm1sPj54cubcZDUPKrFusldmR8uCbdfxgEgL+xTbQDE5GYJ:oftFtXr85409usl8R8vJgEdCY5n3Rv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2013:12:25 02:24:07
ZipCRC: 0xd75c0646
ZipCompressedSize: 1410554
ZipUncompressedSize: 2066944
ZipFileName: [email protected]
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
11
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe [email protected] net.exe no specs net.exe no specs net.exe no specs net.exe no specs mofcomp.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2608"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Antivirus.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2108"C:\Users\admin\Desktop\[email protected]" C:\Users\admin\Desktop\[email protected]
explorer.exe
User:
admin
Integrity Level:
MEDIUM
3828net stop wscsvcC:\Windows\system32\net.exe[email protected]
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1628net stop winmgmt /yC:\Windows\system32\net.exe[email protected]
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1352net start winmgmtC:\Windows\system32\net.exe[email protected]
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3232net start wscsvcC:\Windows\system32\net.exe[email protected]
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
956mofcomp C:\Users\admin\AppData\Local\Temp\4otjesjty.mofC:\Windows\System32\Wbem\mofcomp.exe[email protected]
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
The Managed Object Format (MOF) Compiler
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1876C:\Windows\system32\net1 stop wscsvcC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2504C:\Windows\system32\net1 stop winmgmt /yC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3528C:\Windows\system32\net1 start winmgmtC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
5 046
Read events
4 964
Write events
81
Delete events
1

Modification events

(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2608) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Antivirus.zip
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2608) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
1
Suspicious files
5
Text files
9
Unknown types
2

Dropped files

PID
Process
Filename
Type
2108[email protected]C:\Users\admin\AppData\Local\Temp\Cab81E0.tmp
MD5:
SHA256:
2108[email protected]C:\Users\admin\AppData\Local\Temp\Tar81E1.tmp
MD5:
SHA256:
2108[email protected]C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\1S8BBICR.txt
MD5:
SHA256:
2108[email protected]C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\51918FDN.txt
MD5:
SHA256:
2108[email protected]C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\zcredirect[1].htmhtml
MD5:5E7A1F73CBB81280DB5DB00356F95283
SHA256:BD8C7E345136C7A14A29F84AD5D9DEF6BF5A75CD083CEC4C0E276E7A7FB0C3C6
2108[email protected]C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\4B3SDSLK.txttext
MD5:FD0C71067ACC25A930578774ACDB3765
SHA256:5586B6656E2556492C82120D649A6CF5EECBA2CEA9795B75B752CAEC0EBA7B50
2108[email protected]C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\buy[1].htmhtml
MD5:1CA90FBE073902F6448D3C22CCFD38B3
SHA256:0BD7F7705C7B853336E31E6B7FC5267450ADB0F2C870A11BA3C3925E08292FCC
2108[email protected]C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08der
MD5:D9A7C71F2455317845563B02C39B84C8
SHA256:C5B24A2E28E55081E315826ED0127557077434F24D5C3EFF803C45AA4EF1B827
2108[email protected]C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\72092e88-2c53-401c-b988-51ef43ce1034[1].htmhtml
MD5:0771102963394E62D5140339E554DACA
SHA256:6D1AAF3201D4024BC854DA41674613408B73C4DB4E99F16091E17049582BBF50
2108[email protected]C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D24010A90C6599035FCDACD1F258EB3binary
MD5:A2C9336BDFC28207D501D89E2F2F970D
SHA256:5BD35E5CF2EC7CE11EB6D24B265963D241ECB5341F914AFFD6E0534C89A00EF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
21
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2108
GET
212.32.237.90:80
http://searchdusty.com/customers/buy.php?pid=AVT_BASIC&id=139&subid=1
NL
whitelisted
2108
GET
95.216.179.33:80
http://95.216.179.33/?NTk0MDY=&sCPMe&ZAZ=pinny&MoW=ball&xFyjYtw=cars&gjk=train&Tun=ftp&MbAdvx=why&XTtXz=shuffle&vwUBDeLD=twix&yXrvLMRGn=from&MsUmmNDpT=twix&obyvan4=w3_QMvXcJx3QFYPIJPrcTKRBKU7RH06Vwo2ehMildZ2xKGnihLL5UUSk6FyCEh3&ihrg=arena&qHORHAuu=arena&shufflet4=hp_AtK7VUbgCyjhCFeAZgyosOB1ga9Pith0CDmBTN1ZSG-EeNMwgQz6KlULB5nV4&kbbFNOxMjYxMzU4
DE
malicious
2108
GET
200
212.32.237.90:80
http://searchdusty.com/avt/avtr.dat
NL
html
483 b
whitelisted
2108
GET
200
212.32.237.90:80
http://searchdusty.com/customers/buy.php?pid=AVT_BASIC&id=139&subid=1
NL
html
517 b
whitelisted
2108
GET
200
212.32.237.90:80
http://searchdusty.com/avt/avt.dat
NL
html
482 b
whitelisted
2108
GET
212.32.237.90:80
http://searchdusty.com/customers/readdatagateway.php?type=notactivation&affid=139&subid=1&regkey=fj934imf4ie&[email protected]&version=4.0
NL
whitelisted
2108
GET
212.32.237.90:80
http://searchdusty.com/customers/buy.php?pid=AVT_BASIC&id=139&subid=1
NL
whitelisted
2108
GET
200
2.16.186.27:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOp4%2FRm7w%2BtGDs0fW%2BPi6niNA%3D%3D
unknown
der
527 b
whitelisted
2108
GET
200
199.59.242.153:80
http://ww1.searchdusty.com/
US
html
3.99 Kb
malicious
2108
GET
200
52.205.210.89:80
http://sopho-kat.com/zcredirect?visitid=563a7d85-3248-11eb-8d2d-12417cf20fd5&type=js&browserWidth=1254&browserHeight=575&iframeDetected=false
US
html
316 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2108
212.32.237.90:80
searchdusty.com
LeaseWeb Netherlands B.V.
NL
malicious
2108
52.205.210.89:80
sopho-kat.com
Amazon.com, Inc.
US
malicious
2108
199.59.242.153:80
ww1.searchdusty.com
Bodis, LLC
US
malicious
2108
18.195.195.71:443
linvered-definston.icu
Amazon.com, Inc.
DE
suspicious
2108
95.216.179.33:80
Hetzner Online GmbH
DE
malicious
2108
188.225.75.54:443
tracker.usemoney.xyz
TimeWeb Ltd.
RU
suspicious
2108
2.16.186.35:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
2108
2.16.186.27:80
ocsp.int-x3.letsencrypt.org
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
searchdusty.com
  • 212.32.237.90
whitelisted
ww1.searchdusty.com
  • 199.59.242.153
malicious
fastsofgeld.com
malicious
highway-traffic.com
malicious
frequentwin.com
malicious
sopho-kat.com
  • 52.205.210.89
  • 54.225.132.253
unknown
linvered-definston.icu
  • 18.195.195.71
suspicious
isrg.trustid.ocsp.identrust.com
  • 2.16.186.35
  • 2.16.186.11
whitelisted
tracker.usemoney.xyz
  • 188.225.75.54
suspicious
ocsp.int-x3.letsencrypt.org
  • 2.16.186.27
  • 2.16.186.11
whitelisted

Threats

PID
Process
Class
Message
2108
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
2108
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
2108
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
2108
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
2108
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
2108
Potentially Bad Traffic
ET INFO Suspicious Domain (*.icu) in TLS SNI
2108
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.icu)
2108
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)
2108
A Network Trojan was detected
ET CURRENT_EVENTS RIG EK URI Struct Mar 13 2017 M2
No debug info