File name: | pf.zip |
Full analysis: | https://app.any.run/tasks/48756484-1224-43e5-b094-537761ec1942 |
Verdict: | Malicious activity |
Analysis date: | November 22, 2020, 13:03:08 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 90B901191FB837ECD03B591D2CEEFD9A |
SHA1: | BF200150DD3F4F61898B44F53F6756C804821094 |
SHA256: | F4C1D831719DEFF3F583396038B9181B316E509AC410132BFA4EE2334C3121F6 |
SSDEEP: | 49152:TmPNJDnvx4+Zf95vAH3W0l79GFmZS0bn3VLIPLS0Le:6Fr4+Zfh0t9RZS0bn3BSB6 |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | M0021.cab |
---|---|
ZipUncompressedSize: | 1920389 |
ZipCompressedSize: | 1885603 |
ZipCRC: | 0xdc9b30a2 |
ZipModifyDate: | 2020:11:22 21:38:19 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2696 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\pf.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
2176 | "C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Desktop\6.msi" | C:\Windows\System32\msiexec.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2964 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1352 | C:\Windows\syswow64\MsiExec.exe -Embedding DF0FF1F891B6A720E9C78151C2592EF3 | C:\Windows\syswow64\MsiExec.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1736 | C:\Windows\syswow64\MsiExec.exe -Embedding 38C4768EC0B229C089DC8CDB53D4BAF7 E Global\MSI0000 | C:\Windows\syswow64\MsiExec.exe | — | msiexec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2932 | "C:\Windows\SysWOW64\netsh.exe" interface ipv6 install | C:\Windows\SysWOW64\netsh.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1460 | "C:\Windows\SysWOW64\netsh.exe" ipsec static add policy name=qianye | C:\Windows\SysWOW64\netsh.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2888 | "C:\Windows\SysWOW64\netsh.exe" ipsec static add filterlist name=Filter1 | C:\Windows\SysWOW64\netsh.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2780 | "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=TCP | C:\Windows\SysWOW64\netsh.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2596 | "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=135 protocol=TCP | C:\Windows\SysWOW64\netsh.exe | — | MsiExec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\pf.zip | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\msimsg.dll,-34 |
Value: Windows Installer Package | |||
(PID) Process: | (2696) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF1600000016000000D60300000B020000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2964 | msiexec.exe | C:\Windows\Installer\MSI6CDF.tmp | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Windows\Installer\MSI6D0F.tmp | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Windows\Installer\MSI6D2F.tmp | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DFFA96E4BA66BDF2A8.TMP | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Config.Msi\186540.rbs | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DFC2A6D4A18E956473.TMP | — | |
MD5:— | SHA256:— | |||
2964 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\~DF163B0130CD53AACE.TMP | — | |
MD5:— | SHA256:— | |||
3000 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UNIRVML18TXRDXAGXLCU.temp | — | |
MD5:— | SHA256:— | |||
456 | svchost.exe | C:\Windows\System32\drivers\dump_VMBUS.sys | — | |
MD5:— | SHA256:— | |||
456 | svchost.exe | C:\Windows\system32\MsE6E0D97CApp.dll | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2352 | svchost.exe | HEAD | 200 | 1.248.75.8:17182 | http://1.248.75.8:17182/0BC8EC41.moe | KR | — | — | malicious |
2352 | svchost.exe | HEAD | 200 | 45.32.155.0:14217 | http://45.32.155.0:14217/0BC8EC41.moe | DE | — | — | suspicious |
2352 | svchost.exe | HEAD | 200 | 172.106.32.32:19232 | http://172.106.32.32:19232/0BC8EC41.moe | US | — | — | unknown |
2352 | svchost.exe | HEAD | 200 | 107.191.53.95:19119 | http://107.191.53.95:19119/0BC8EC41.moe | JP | — | — | unknown |
2352 | svchost.exe | HEAD | 200 | 63.209.0.101:19667 | http://63.209.0.101:19667/0BC8EC41.moe | US | — | — | suspicious |
2352 | svchost.exe | HEAD | 200 | 145.255.27.140:13270 | http://145.255.27.140:13270/0BC8EC41.moe | RU | — | — | malicious |
2352 | svchost.exe | HEAD | 200 | 58.229.194.121:11532 | http://58.229.194.121:11532/0BC8EC41.moe | KR | — | — | malicious |
2352 | svchost.exe | HEAD | 200 | 45.76.155.140:13317 | http://45.76.155.140:13317/0BC8EC41.moe | SG | — | — | suspicious |
2352 | svchost.exe | HEAD | 200 | 45.32.155.0:14217 | http://45.32.155.0:14217/0BC8EC41.moe | DE | — | — | suspicious |
2352 | svchost.exe | HEAD | 200 | 58.229.194.122:11627 | http://58.229.194.122:11627/0BC8EC41.moe | KR | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
424 | svchost.exe | 45.32.155.0:10121 | — | Choopa, LLC | DE | suspicious |
424 | svchost.exe | 175.188.188.205:19486 | — | China Networks Inter-Exchange | CN | suspicious |
1028 | svchost.exe | 119.164.218.229:14711 | — | CHINA UNICOM China169 Backbone | CN | unknown |
1028 | svchost.exe | 175.188.188.205:13167 | — | China Networks Inter-Exchange | CN | suspicious |
424 | svchost.exe | 45.76.155.140:25739 | — | Choopa, LLC | SG | suspicious |
424 | svchost.exe | 8.8.8.8:53 | — | Google Inc. | US | malicious |
424 | svchost.exe | 51.105.208.173:80 | time.windows.com | Microsoft Corporation | GB | unknown |
424 | svchost.exe | 59.120.154.13:11605 | — | Data Communication Business Group | TW | malicious |
424 | svchost.exe | 45.32.155.0:25739 | — | Choopa, LLC | DE | suspicious |
1028 | svchost.exe | 45.76.204.9:25739 | — | Choopa, LLC | JP | unknown |
Domain | IP | Reputation |
---|---|---|
teredo.ipv6.microsoft.com |
| whitelisted |
time.windows.com |
| whitelisted |
Rpc.1qw.us |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | LOADER [PTsecurity] PhantomNugget |
— | — | A Network Trojan was detected | LOADER [PTsecurity] PhantomNugget |
— | — | A Network Trojan was detected | LOADER [PTsecurity] PhantomNugget |
— | — | Misc activity | ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection |
— | — | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
— | — | Misc Attack | ET CINS Active Threat Intelligence Poor Reputation IP group 1 |
— | — | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
— | — | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
— | — | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
— | — | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
Process | Message |
---|---|
MsiExec.exe | [AVX_CRT_Fix][C:\Windows\Installer\MSI6934.tmp] CPU: __isa_available = 5
|
MsiExec.exe | [AVX_CRT_Fix][C:\Windows\Installer\MSI6CDF.tmp] CPU: __isa_available = 5
|
MsiExec.exe | [AVX_CRT_Fix][C:\Windows\Installer\MSI6D0F.tmp] CPU: __isa_available = 5
|
MsiExec.exe | [AVX_CRT_Fix][C:\Windows\Installer\MSI6D2F.tmp] CPU: __isa_available = 5
|