| File name: | f1642209292.zip |
| Full analysis: | https://app.any.run/tasks/977397cd-2f82-4b6a-ae8c-0a89fb5aae80 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 15, 2022, 01:15:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | D1B2855320289D34316F45C6E3D59065 |
| SHA1: | 6A976AC887AC14AC67B9B8CCDAC7B5D7C97D1F9E |
| SHA256: | EFF7FD5659A327D68293C30DF9FED1D633877A722E02D2F534108939CA3A7099 |
| SSDEEP: | 3072:9Dt49qUqvyQdPv/rN+EKleG+RJ22v7TFK89qu2HfbcRJey2Inx05vbo:9Dt4gJvy+xU+RTOu2Dc3T2Ix05Do |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipFileName: | Setup.zip |
|---|---|
| ZipUncompressedSize: | 137088 |
| ZipCompressedSize: | 137141 |
| ZipCRC: | 0x51fa9d48 |
| ZipModifyDate: | 2022:01:15 04:01:01 |
| ZipCompression: | Unknown (99) |
| ZipBitFlag: | 0x0003 |
| ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 296 | "C:\Users\admin\Pictures\Adobe Films\ixT1donAxy7TlWzoGnObbGUw.exe" | C:\Users\admin\Pictures\Adobe Films\ixT1donAxy7TlWzoGnObbGUw.exe | — | OracleSearch.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 296 | "C:\Users\admin\AppData\Local\Temp\17e09b54-912d-491f-8ac7-f4dfd9fe255f.exe" | C:\Users\admin\AppData\Local\Temp\17e09b54-912d-491f-8ac7-f4dfd9fe255f.exe | — | aOrr6NrqysUW1Apt6G1SE8FZ.exe | |||||||||||
User: admin Company: bydfuigsdf Integrity Level: HIGH Description: bydfuigsdf Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 348 | ping 127.0.0.1 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 412 | "C:\Users\admin\AppData\Local\Temp\is-OLQL8.tmp\Tlhakssf9zE42egCEU2YcXUO.tmp" /SL5="$4013C,312591,228864,C:\Users\admin\Pictures\Adobe Films\Tlhakssf9zE42egCEU2YcXUO.exe" | C:\Users\admin\AppData\Local\Temp\is-OLQL8.tmp\Tlhakssf9zE42egCEU2YcXUO.tmp | Tlhakssf9zE42egCEU2YcXUO.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 1 Version: 51.52.0.0 Modules
| |||||||||||||||
| 436 | "C:\Users\admin\Pictures\Adobe Films\ZivKTnAr7w9xt_7BHdO2JPFf.exe" | C:\Users\admin\Pictures\Adobe Films\ZivKTnAr7w9xt_7BHdO2JPFf.exe | OracleSearch.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 784 | "C:\Windows\System32\cmd.exe" /c taskkill /im hXFG2sTVCSFyj7FdxtuRywcI.exe /f & timeout /t 6 & del /f /q "C:\Users\admin\Pictures\Adobe Films\hXFG2sTVCSFyj7FdxtuRywcI.exe" & del C:\ProgramData\*.dll & exit | C:\Windows\System32\cmd.exe | — | hXFG2sTVCSFyj7FdxtuRywcI.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 824 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb2172.47376\password-is-485136.txt | C:\Windows\system32\NOTEPAD.EXE | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 860 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\system32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 908 | "C:\Users\admin\AppData\Local\Temp\4e-5eb24-03a-4d8aa-6e4178c175955\Laecuvafyky.exe" | C:\Users\admin\AppData\Local\Temp\4e-5eb24-03a-4d8aa-6e4178c175955\Laecuvafyky.exe | ________djskjT76(((.exe | ||||||||||||
User: admin Company: firefox__update__ Integrity Level: HIGH Description: firefox__update__ Exit code: 0 Version: 1.1.1.1 Modules
| |||||||||||||||
| 1028 | "C:\Users\admin\Pictures\Adobe Films\Xm0yK3Tw8ek6TSvGMQ5WOvIe.exe" | C:\Users\admin\Pictures\Adobe Films\Xm0yK3Tw8ek6TSvGMQ5WOvIe.exe | OracleSearch.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\f1642209292.zip | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2172) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2260 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2260.48760\bin0 | binary | |
MD5:— | SHA256:— | |||
| 2672 | OracleSearch.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 2172 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb2172.47376\password-is-485136.txt | text | |
MD5:— | SHA256:— | |||
| 2672 | OracleSearch.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\PL_Client[1].bmp | binary | |
MD5:— | SHA256:— | |||
| 2172 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb2172.48236\Setup.zip | compressed | |
MD5:— | SHA256:— | |||
| 2672 | OracleSearch.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:— | SHA256:— | |||
| 2260 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2260.48760\Setup.exe | executable | |
MD5:— | SHA256:— | |||
| 1160 | Setup.exe | C:\Users\admin\AppData\Local\Temp\OracleSearch.exe | executable | |
MD5:— | SHA256:— | |||
| 2672 | OracleSearch.exe | C:\Users\admin\Pictures\Adobe Films\jB2QcMvdAOsTouCoHZxVWBfr.exe | html | |
MD5:— | SHA256:— | |||
| 860 | svchost.exe | C:\Windows\appcompat\programs\RecentFileCache.bcf | txt | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2672 | OracleSearch.exe | HEAD | 200 | 45.144.225.57:80 | http://45.144.225.57/download/NiceProcessX32.bmp | unknown | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 200 | 45.144.225.57:80 | http://45.144.225.57/WW/search_target1kpd.exe | unknown | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 404 | 212.193.30.45:80 | http://212.193.30.45/WW/file5.exe | RU | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 200 | 85.209.157.230:80 | http://stylesheet.faseaegasdfase.com/hp8/g1/rtst1053.exe | unknown | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 404 | 45.144.225.57:80 | http://45.144.225.57/WW/sfx_123_310.exe | unknown | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 200 | 185.215.113.208:80 | http://185.215.113.208/ferrari.exe | PT | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 200 | 212.193.30.29:80 | http://212.193.30.29/WW/file4.exe | RU | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file1.exe | RU | — | — | malicious |
2672 | OracleSearch.exe | HEAD | 200 | 91.224.22.193:80 | http://xmtbsj.com/setup.exe | RU | — | — | suspicious |
2672 | OracleSearch.exe | HEAD | 404 | 212.193.30.45:80 | http://212.193.30.45/WW/file7.exe | RU | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2672 | OracleSearch.exe | 212.193.30.45:80 | — | — | RU | malicious |
— | — | 45.144.225.57:80 | — | — | — | malicious |
2672 | OracleSearch.exe | 104.23.98.190:443 | pastebin.com | Cloudflare Inc | US | malicious |
2672 | OracleSearch.exe | 172.67.133.215:80 | wfsdragon.ru | — | US | malicious |
2672 | OracleSearch.exe | 162.159.129.233:80 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2672 | OracleSearch.exe | 2.56.59.42:80 | — | — | — | malicious |
2672 | OracleSearch.exe | 162.159.129.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2672 | OracleSearch.exe | 162.159.130.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2672 | OracleSearch.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2672 | OracleSearch.exe | 34.117.59.81:443 | ipinfo.io | — | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| malicious |
wfsdragon.ru |
| malicious |
cdn.discordapp.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
ipinfo.io |
| shared |
db-ip.com |
| whitelisted |
api.db-ip.com |
| shared |
stylesheet.faseaegasdfase.com |
| malicious |
xmtbsj.com |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
2672 | OracleSearch.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
2672 | OracleSearch.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2672 | OracleSearch.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2672 | OracleSearch.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
2672 | OracleSearch.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2672 | OracleSearch.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2672 | OracleSearch.exe | A Network Trojan was detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2672 | OracleSearch.exe | Potential Corporate Privacy Violation | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) |
2672 | OracleSearch.exe | A Network Trojan was detected | ET TROJAN Win32/Unk.HRESQ! MultiDownloader Checkin |
2672 | OracleSearch.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |