File name:

Y5n.rar

Full analysis: https://app.any.run/tasks/80bc4aa7-9f76-4b27-8f9d-f253be6cb5ea
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 14, 2019, 22:04:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
revenge
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7F61BE018CFFA44ED1090A4B018FAB35

SHA1:

DF7775497DA491E515C0F48AB0C8350967150A29

SHA256:

0027596F7127B90D269F0D42152501AD56D1F1376AA89EA8800681DB77E25A83

SSDEEP:

49152:oyLTgM5dS1JuI2Vsu8pfQyRzAhGaQfFaXuYG4+an5N2Y2RgmlQngJsOnp:oyLTp5dSD20pfQqzf8Xru05NJ26ngOOp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Smart Pastebin Leecher.exe (PID: 2000)
      • Windows Defender Servcies.exe (PID: 3396)
      • Smart Pastebin Leecher.exe (PID: 2268)
      • UAC.exe (PID: 3188)
    • Writes to a start menu file

      • UAC.exe (PID: 3188)
    • Changes the autorun value in the registry

      • UAC.exe (PID: 3188)
    • REVENGE was detected

      • UAC.exe (PID: 3188)
    • Connects to CnC server

      • UAC.exe (PID: 3188)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2668)
      • Smart Pastebin Leecher.exe (PID: 2000)
      • Windows Defender Servcies.exe (PID: 3396)
    • Creates files in the user directory

      • Windows Defender Servcies.exe (PID: 3396)
      • UAC.exe (PID: 3188)
    • Starts itself from another location

      • Windows Defender Servcies.exe (PID: 3396)
    • Reads CPU info

      • UAC.exe (PID: 3188)
  • INFO

    • Application was crashed

      • Smart Pastebin Leecher.exe (PID: 2268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe smart pastebin leecher.exe smart pastebin leecher.exe windows defender servcies.exe #REVENGE uac.exe

Process information

PID
CMD
Path
Indicators
Parent process
2000"C:\Users\admin\AppData\Local\Temp\Y5n\Y5n\Smart Pastebin Leecher.exe" C:\Users\admin\AppData\Local\Temp\Y5n\Y5n\Smart Pastebin Leecher.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Pasebin Leecher
Exit code:
0
Version:
1.2.4.3
Modules
Images
c:\users\admin\appdata\local\temp\y5n\y5n\smart pastebin leecher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2268"C:\Users\admin\AppData\Local\Temp\Smart Pastebin Leecher.exe" C:\Users\admin\AppData\Local\Temp\Smart Pastebin Leecher.exe
Smart Pastebin Leecher.exe
User:
admin
Company:
Pasebin Leecher
Integrity Level:
MEDIUM
Description:
Pasebin Leecher
Exit code:
3762504530
Version:
1.2.4.3
Modules
Images
c:\users\admin\appdata\local\temp\smart pastebin leecher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2668"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Y5n.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3188"C:\Users\admin\AppData\Roaming\UAC.exe" C:\Users\admin\AppData\Roaming\UAC.exe
Windows Defender Servcies.exe
User:
admin
Company:
MS
Integrity Level:
MEDIUM
Description:
Windows Defender Servcies
Exit code:
0
Version:
32.14.21.5
Modules
Images
c:\users\admin\appdata\roaming\uac.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3396"C:\Users\admin\AppData\Local\Temp\Windows Defender Servcies.exe" C:\Users\admin\AppData\Local\Temp\Windows Defender Servcies.exe
Smart Pastebin Leecher.exe
User:
admin
Company:
MS
Integrity Level:
MEDIUM
Description:
Windows Defender Servcies
Exit code:
0
Version:
32.14.21.5
Modules
Images
c:\users\admin\appdata\local\temp\windows defender servcies.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 238
Read events
1 197
Write events
41
Delete events
0

Modification events

(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2668) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Y5n.rar
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Extraction\Profile
Operation:writeName:Overwrite
Value:
0
(PID) Process:(2668) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Extraction\Profile
Operation:writeName:Update
Value:
0
Executable files
6
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2000Smart Pastebin Leecher.exeC:\Users\admin\AppData\Local\Temp\Windows Defender Servcies.exeexecutable
MD5:
SHA256:
3188UAC.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Servcies.jstext
MD5:
SHA256:
2000Smart Pastebin Leecher.exeC:\Users\admin\AppData\Local\Temp\Smart Pastebin Leecher.exeexecutable
MD5:
SHA256:
2668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Y5n\Y5n\Smart Pastebin Leecher.exeexecutable
MD5:
SHA256:
3396Windows Defender Servcies.exeC:\Users\admin\AppData\Roaming\UAC.exeexecutable
MD5:
SHA256:
2668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Y5n\Y5n\SkinSoft.VisualStyler.dllexecutable
MD5:69E6563E0E7EA843E9B37D58819F4136
SHA256:F9FA9F508B9350ED12ED3AA5B7F24AED901A6434B1B02D1F0EE301B8EEA54B06
2668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Y5n\Y5n\xNet.dllexecutable
MD5:BF1F76644BDDD20339548EBACF7A48EB
SHA256:5D9C2B1822BCAA71DDEAA5426D4312D8E174766AE8864C7ADD29D7F44CEA87F2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
18
Threats
22

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3396
Windows Defender Servcies.exe
199.195.250.222:2222
uogapk7.ddns.net
FranTech Solutions
US
malicious
3188
UAC.exe
199.195.250.222:2222
uogapk7.ddns.net
FranTech Solutions
US
malicious
3188
UAC.exe
196.117.86.129:2222
uogapk18.ddns.net
ASMedi
MA
malicious

DNS requests

Domain
IP
Reputation
uogapk3.ddns.net
  • 0.0.0.0
malicious
uogapk4.ddns.net
  • 0.0.0.0
malicious
uogapk5.ddns.net
  • 0.0.0.0
malicious
uogapk6.ddns.net
  • 0.0.0.0
malicious
uogapk7.ddns.net
  • 199.195.250.222
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
uogapk8.ddns.net
  • 0.0.0.0
malicious
uogapk9.ddns.net
  • 0.0.0.0
malicious
uogapk10.ddns.net
  • 0.0.0.0
malicious
uogapk11.ddns.net
malicious

Threats

PID
Process
Class
Message
3188
UAC.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Revenge-RAT CnC Checkin
3188
UAC.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
3188
UAC.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
3188
UAC.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
3188
UAC.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
17 ETPRO signatures available at the full report
No debug info