analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Electronic form Dt 06.21.2022.zip

Full analysis: https://app.any.run/tasks/83e1d381-c561-4308-a0d5-4746f2afa1af
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 27, 2022, 07:39:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

4E76C0E72D78D9EE18C0333F404C26CF

SHA1:

34F2EAE8240312C5BC605352E86100827611CD2F

SHA256:

F732FEB8786A9C7A8EE81913C07EF0494923E830C24B5095A4A216853D575C22

SSDEEP:

384:ep6TNm6xI9xekHLn++6T0IEvYS51l/zOo8vz5Eqvj3cT/WiQ:S6s6G5QT03vYS5/zOPdvYT/WiQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • EXCEL.EXE (PID: 372)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 372)
    • Registers / Runs the DLL via REGSVR32.EXE

      • EXCEL.EXE (PID: 372)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 372)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 240)
    • Reads the computer name

      • WinRAR.exe (PID: 240)
    • Reads default file associations for system extensions

      • WinRAR.exe (PID: 240)
    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 240)
    • Drops a file with a compile date too recent

      • EXCEL.EXE (PID: 372)
  • INFO

    • Checks supported languages

      • EXCEL.EXE (PID: 372)
      • regsvr32.exe (PID: 3952)
      • regsvr32.exe (PID: 2784)
      • regsvr32.exe (PID: 664)
      • regsvr32.exe (PID: 2192)
    • Reads the computer name

      • EXCEL.EXE (PID: 372)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 240)
      • EXCEL.EXE (PID: 372)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 372)
    • Reads settings of System Certificates

      • EXCEL.EXE (PID: 372)
    • Checks Windows Trust Settings

      • EXCEL.EXE (PID: 372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Electronic form Dt 06.21.2022.xls
ZipUncompressedSize: 56832
ZipCompressedSize: 18590
ZipCRC: 0x7cc818cd
ZipModifyDate: 2022:06:21 22:15:02
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs excel.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Electronic form Dt 06.21.2022.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
372"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3952C:\Windows\System32\regsvr32.exe /S ..\peg1.ocxC:\Windows\System32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\regsvr32.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
2784C:\Windows\System32\regsvr32.exe /S ..\peg2.ocxC:\Windows\System32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
664C:\Windows\System32\regsvr32.exe /S ..\peg3.ocxC:\Windows\System32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2192C:\Windows\System32\regsvr32.exe /S ..\peg4.ocxC:\Windows\System32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
6 948
Read events
6 847
Write events
90
Delete events
11

Modification events

(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(240) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Electronic form Dt 06.21.2022.zip
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
2
Suspicious files
5
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
372EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR60CA.tmp.cvr
MD5:
SHA256:
372EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:86EA4038E76B8C9CDA195A06BBAE51C3
SHA256:6F788B3E7496A6482108A2A34F55528CD368E4F8D255B78BE09914D797D4B390
372EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\VZIF1X7K.txttext
MD5:14E66138E95860B8B7E100AB517C119B
SHA256:E205445AF991755E62D739C359F62F6854E5D46A343F80F7B97621E4B9753D97
372EXCEL.EXEC:\Users\admin\peg1.ocxexecutable
MD5:400ACF98C6709C5789F5AE59287C8E8E
SHA256:3A845CF36F9A04EB6FA48E329316966BC0FA456D1DC68CE315E41BDDA3B50EC4
372EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F8B7C3256F5D1243492F6BA96F024FA4der
MD5:DFB97CE42C51D9577C51952074F98ACE
SHA256:275CDC9078983DFA7BFE78C09839BE9C86A51C25C064A7C07CFD6D7A04EF958B
372EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:AD251CDDB7BF23B769F750B0D12C5DDB
SHA256:5D807220AFD3E6AA0D98B71E7741B32476C9F46F4A95D3970BABCF8590D2B91D
372EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\5eArcW7P[1].dllexecutable
MD5:400ACF98C6709C5789F5AE59287C8E8E
SHA256:3A845CF36F9A04EB6FA48E329316966BC0FA456D1DC68CE315E41BDDA3B50EC4
372EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F8B7C3256F5D1243492F6BA96F024FA4binary
MD5:D2108BF822012671A6897D9321541BE5
SHA256:515830C2D21FA2C1AFC3F9FFE221FC82FCC5DABF9794CDD5BB4FD2A7206BF515
240WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb240.20950\Electronic form Dt 06.21.2022.xlsdocument
MD5:B4AA7A6790D8D0A4484FEE5C9D3EDD91
SHA256:A0DE1F3AF78BEF68DDFCABF4B7CEDFA0E466AC65648A5E81E591702B463C96B1
372EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:EC8FF3B1DED0246437B1472C69DD1811
SHA256:E634C2D1ED20E0638C95597ADF4C9D392EBAB932D3353F18AF1E4421F4BB9CAB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
9
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
372
EXCEL.EXE
GET
177.11.48.94:80
http://www.dh.net.br/catalogo1/0cJpUJXBhuBaMdVWQf/
BR
unknown
372
EXCEL.EXE
GET
200
166.62.28.144:80
http://subbalakshmi.com/data_winning/kYv6xb/
US
executable
314 Kb
suspicious
372
EXCEL.EXE
GET
200
184.24.77.48:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgM1OnL%2FOkWb2eDsuqsGNmS02g%3D%3D
US
der
503 b
shared
372
EXCEL.EXE
GET
200
67.27.158.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?309c5dfb5ecfe189
US
compressed
4.70 Kb
whitelisted
372
EXCEL.EXE
GET
200
23.45.105.185:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
372
EXCEL.EXE
67.27.158.126:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
malicious
372
EXCEL.EXE
166.62.28.144:80
subbalakshmi.com
GoDaddy.com, LLC
US
suspicious
372
EXCEL.EXE
184.24.77.48:80
r3.o.lencr.org
Time Warner Cable Internet LLC
US
unknown
372
EXCEL.EXE
177.11.48.94:80
www.dh.net.br
Brasil Site Informatica LTDA
BR
unknown
372
EXCEL.EXE
103.45.230.202:443
webhoanggia.com
Quang Trung Software City Development Company
VN
suspicious
372
EXCEL.EXE
23.45.105.185:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
372
EXCEL.EXE
175.45.125.128:443
www.controlnetworks.com.au
Vocus Connect International Backbone
AU
suspicious
175.45.125.128:443
www.controlnetworks.com.au
Vocus Connect International Backbone
AU
suspicious

DNS requests

Domain
IP
Reputation
subbalakshmi.com
  • 166.62.28.144
suspicious
webhoanggia.com
  • 103.45.230.202
unknown
ctldl.windowsupdate.com
  • 67.27.158.126
  • 8.253.204.120
  • 8.238.190.126
  • 67.26.73.254
  • 67.27.157.126
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted
r3.o.lencr.org
  • 184.24.77.48
  • 184.24.77.54
shared
www.dh.net.br
  • 177.11.48.94
unknown
www.controlnetworks.com.au
  • 175.45.125.128
suspicious

Threats

PID
Process
Class
Message
372
EXCEL.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
372
EXCEL.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2
372
EXCEL.EXE
Misc activity
ET INFO EXE - Served Attached HTTP
372
EXCEL.EXE
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info