| download: | SpyEye.zip |
| Full analysis: | https://app.any.run/tasks/2dfe65e3-dc76-456c-9e28-05829f90f2cf |
| Verdict: | Malicious activity |
| Analysis date: | October 16, 2020, 09:02:07 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract |
| MD5: | 2E0BB844572DE2E88CBD23D76101BD16 |
| SHA1: | 8152E5A5187413EE20B36F4F059C47D594590A3C |
| SHA256: | FA3B854F0E4C0D35CA9A5647BC6935EE1E6A3920D9B951C51B2CB7BC1588C904 |
| SSDEEP: | 24576:xx83QwgESJLldWfsqI4/rWhZPG44yuJoy7SHoIO1:IAwg7+sqI4/OZ/To7iox1 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2010:03:30 22:05:25 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | Spyeye/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 128 | "C:\Windows\system32\Dwm.exe" | C:\Windows\System32\dwm.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Desktop Window Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 392 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 688 | C:\Windows\System32\ctfmon.exe | C:\Windows\System32\ctfmon.exe | taskeng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: CTF Loader Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 984 | "C:\Users\admin\Desktop\malware.exe" | C:\Users\admin\Desktop\malware.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft CleanSweep Exit code: 0 Version: 1, 1, 3, 14 Modules
| |||||||||||||||
| 1500 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.47485\malware.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.47485\malware.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1836 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.47219\malware.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.47219\malware.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1948 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2604.41202\malware.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2604.41202\malware.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1980 | "taskhost.exe" | C:\Windows\System32\taskhost.exe | services.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1996 | taskeng.exe {9FFF9F18-B475-4F9C-BA26-08811E66DE84} | C:\Windows\System32\taskeng.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Engine Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2088 | "C:\cleansweep.exe\cleansweep.exe" | C:\cleansweep.exe\cleansweep.exe | — | malware.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft CleanSweep Exit code: 0 Version: 1, 1, 3, 14 Modules
| |||||||||||||||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\SpyEye.zip | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2452) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (392) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList |
| Operation: | write | Name: | a |
Value: WinRAR.exe | |||
| (PID) Process: | (392) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList |
| Operation: | write | Name: | MRUList |
Value: a | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 392 | explorer.exe | C:\Users\admin\Desktop\Spyeye | — | |
MD5:— | SHA256:— | |||
| 3196 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3196.33072\malware.exe | — | |
MD5:— | SHA256:— | |||
| 3936 | WinRAR.exe | C:\Users\admin\Desktop\Spyeye\__rzi_3936.37944 | — | |
MD5:— | SHA256:— | |||
| 392 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-ms | automaticdestinations-ms | |
MD5:— | SHA256:— | |||
| 392 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms | automaticdestinations-ms | |
MD5:— | SHA256:— | |||
| 2452 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2452.28469\Spyeye\2b8a408b56eaf3ce0198c9d1d8a75ec0.zip | compressed | |
MD5:46AFF61C6E52847E67B4247BDD6AED72 | SHA256:F21428B9856F55A5B582A1D248A200AC5D110599C2295CC0B88C4B741A2C20D3 | |||
| 2452 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2452.28469\Spyeye\9d2a48be1a553984a4fda1a88ed4f8ee.zip | compressed | |
MD5:912E3BA19E79F46723BA98B2067FC56F | SHA256:F8A3DA69C8A2D5276BF5E13513F0AF28BC3481B9AE18C9AB843809D5F01BCA60 | |||
| 392 | explorer.exe | C:\Users\admin\Desktop\2b8a408b56eaf3ce0198c9d1d8a75ec0.zip | compressed | |
MD5:46AFF61C6E52847E67B4247BDD6AED72 | SHA256:F21428B9856F55A5B582A1D248A200AC5D110599C2295CC0B88C4B741A2C20D3 | |||
| 2452 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2452.28469\Spyeye\d64ca15261c53279a7288616b3cb1a92.zip | compressed | |
MD5:DF56431376AEBC88228098ECF2A03BD7 | SHA256:9866A9B24EBBE307D7C14AB08361D44AF22A83C7EA124BAE975CB3B0FFDBC882 | |||
| 2452 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2452.28469\Spyeye\7779f923da8c1418764fecc7d1ba86cf.zip | compressed | |
MD5:D5E3F04C2A786F8C1C979B3403733356 | SHA256:4CE9B8B4785483AED81B2FCD8563AF683A8239D7DF2CBE2089A2E95D6C2F0C08 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
392 | explorer.exe | GET | 200 | 104.75.89.181:80 | http://www.microsoft.com/ | NL | html | 1020 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
392 | explorer.exe | 104.75.89.181:80 | www.microsoft.com | Akamai Technologies, Inc. | NL | suspicious |
Domain | IP | Reputation |
|---|---|---|
www.secureantibot.net |
| unknown |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
392 | explorer.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer) |
392 | explorer.exe | A Network Trojan was detected | ET POLICY Microsoft user-agent automated process response to automated request |
Process | Message |
|---|---|
malware.exe | *Dropper* : BOT_VERSION = 10060, PID = 984, szModuleFileName = "C:\Users\admin\Desktop\malware.exe" |
malware.exe | *Dropper* : BOT_VERSION = 10060, PID = 3328, szModuleFileName = "C:\Users\admin\Desktop\malware.exe" |