analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

5231676735029248.zip

Full analysis: https://app.any.run/tasks/d5484b55-e608-467c-b202-f9f5d5170024
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: March 30, 2020, 21:06:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

924EA146C28A8516044D8B76DD48F4E9

SHA1:

C3D922B4AC82A12C88A3EC680C98981BB93234B9

SHA256:

F9C6EE9C65812037F9E178DF73D38B8BC4527323996C7E37DA98D834FB5B6D6A

SSDEEP:

6144:vLzuhbGZIQy0/FYH2axgz1JhhLD4src4Oe7GSc8t/9+qFb8:HQSYHJ2z1Xh3DVOe7I0/9Tb8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 2296)
      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 1792)
      • typebsketch.exe (PID: 3636)
      • typebsketch.exe (PID: 2508)
    • Emotet process was detected

      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 2296)
    • EMOTET was detected

      • typebsketch.exe (PID: 2508)
    • Connects to CnC server

      • typebsketch.exe (PID: 2508)
  • SUSPICIOUS

    • Starts itself from another location

      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 2296)
    • Executable content was dropped or overwritten

      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 2296)
    • Reads Internet Cache Settings

      • typebsketch.exe (PID: 2508)
  • INFO

    • Manual execution by user

      • 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe (PID: 1792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0xe0c77dee
ZipCompressedSize: 270237
ZipUncompressedSize: 516346
ZipFileName: 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe no specs #EMOTET 1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe typebsketch.exe no specs #EMOTET typebsketch.exe

Process information

PID
CMD
Path
Indicators
Parent process
3408"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\5231676735029248.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1792"C:\Users\admin\Desktop\1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe" C:\Users\admin\Desktop\1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2296--9052edeeC:\Users\admin\Desktop\1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe
1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3636"C:\Users\admin\AppData\Local\typebsketch\typebsketch.exe"C:\Users\admin\AppData\Local\typebsketch\typebsketch.exe1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2508--b583abe8C:\Users\admin\AppData\Local\typebsketch\typebsketch.exe
typebsketch.exe
User:
admin
Integrity Level:
MEDIUM
Total events
492
Read events
479
Write events
13
Delete events
0

Modification events

(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3408) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\5231676735029248.zip
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3408) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2508) typebsketch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2508) typebsketch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3408WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3408.32330\1ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d
MD5:
SHA256:
22961ad1ff05930f27ef4b349c7a612235d1632ef7ceaa1a17adf7c7b3a97b40ca4d.exeC:\Users\admin\AppData\Local\typebsketch\typebsketch.exeexecutable
MD5:AE03A6F8FB74D401B403647D28E21574
SHA256:1AD1FF05930F27EF4B349C7A612235D1632EF7CEAA1A17ADF7C7B3A97B40CA4D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
9
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2508
typebsketch.exe
POST
87.106.136.232:8080
http://87.106.136.232:8080/srvc/arizona/
DE
malicious
2508
typebsketch.exe
POST
198.199.114.69:8080
http://198.199.114.69:8080/ringin/usbccid/results/merge/
US
malicious
2508
typebsketch.exe
POST
152.89.236.214:8080
http://152.89.236.214:8080/badge/forced/
unknown
malicious
2508
typebsketch.exe
POST
209.141.41.136:8080
http://209.141.41.136:8080/psec/window/
US
malicious
2508
typebsketch.exe
POST
45.33.54.74:443
http://45.33.54.74:443/symbols/raster/
US
malicious
2508
typebsketch.exe
POST
104.236.246.93:8080
http://104.236.246.93:8080/results/merge/
US
malicious
2508
typebsketch.exe
POST
178.210.51.222:8080
http://178.210.51.222:8080/health/free/results/
RU
malicious
2508
typebsketch.exe
POST
115.78.95.230:443
http://115.78.95.230:443/attrib/add/
VN
malicious
2508
typebsketch.exe
POST
201.251.43.69:8080
http://201.251.43.69:8080/child/stubs/results/merge/
AR
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2508
typebsketch.exe
45.33.54.74:443
Linode, LLC
US
malicious
2508
typebsketch.exe
104.236.246.93:8080
Digital Ocean, Inc.
US
malicious
2508
typebsketch.exe
209.141.41.136:8080
FranTech Solutions
US
malicious
2508
typebsketch.exe
178.210.51.222:8080
KVANT-TELEKOM Closed Joint Stock Company
RU
malicious
2508
typebsketch.exe
152.89.236.214:8080
malicious
2508
typebsketch.exe
87.106.136.232:8080
1&1 Internet SE
DE
malicious
2508
typebsketch.exe
198.199.114.69:8080
Digital Ocean, Inc.
US
malicious
115.78.95.230:443
Viettel Corporation
VN
malicious
2508
typebsketch.exe
201.251.43.69:8080
Telefonica de Argentina
AR
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2508
typebsketch.exe
A Network Trojan was detected
ET CNC Feodo Tracker Reported CnC Server group 15
2508
typebsketch.exe
A Network Trojan was detected
AV TROJAN W32/Emotet CnC Checkin M2
2508
typebsketch.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
2508
typebsketch.exe
A Network Trojan was detected
ET CNC Feodo Tracker Reported CnC Server group 16
3 ETPRO signatures available at the full report
No debug info