analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Malware_7Z_0091de0b1f5067c80eee88a11e4c961da296a9e07078c4c860b6fd8a9d8a752f

Full analysis: https://app.any.run/tasks/593a3c25-626e-4a62-a6da-42f57f24928d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 15, 2019, 09:25:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redaman
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

64B4DF21164EB459E59EB656E73B8431

SHA1:

9496C4F6FADFAB17497D5C9B70DBB59564E385A4

SHA256:

0091DE0B1F5067C80EEE88A11E4C961DA296A9E07078C4C860B6FD8A9D8A752F

SSDEEP:

6144:wmvogqxWr1ZmkpqlybxfNYe5xFJeUw9GQihKwrsevehSGNyDe2n:dvoZ0qkpcIRNYaeLiowRbn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Документы на возврат 21е марта.exe (PID: 1812)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 964)
      • Документы на возврат 21е марта.exe (PID: 1812)
    • REDAMAN was detected

      • rundll32.exe (PID: 964)
    • Loads the Task Scheduler COM API

      • Документы на возврат 21е марта.exe (PID: 1812)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Документы на возврат 21е марта.exe (PID: 1812)
    • Creates files in the program directory

      • Документы на возврат 21е марта.exe (PID: 1812)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs документы на возврат 21е марта.exe #REDAMAN rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
1728"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Malware_7Z_0091de0b1f5067c80eee88a11e4c961da296a9e07078c4c860b6fd8a9d8a752f.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1812"C:\Users\admin\Desktop\Документы на возврат 21е марта.exe" C:\Users\admin\Desktop\Документы на возврат 21е марта.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
964rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
333
Read events
322
Write events
11
Delete events
0

Modification events

(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1728) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Malware_7Z_0091de0b1f5067c80eee88a11e4c961da296a9e07078c4c860b6fd8a9d8a752f.7z
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1812) Документы на возврат 21е марта.exeKey:HKEY_CURRENT_USER\Software\1e3b855a06aa
Operation:writeName:41ecc984c611c3e873
Value:
A18D639E
(PID) Process:(1812) Документы на возврат 21е марта.exeKey:HKEY_CURRENT_USER\Software\1e3b855a06aa
Operation:writeName:41ecc984c611c3e873
Value:
6AA951455EF3720C0ED36736893200E509609CED25B7F2C869788FC0B00D0B44E02CE17DE232290266BF4DF354D321EF7C342FBFE178E0CC84CF0C0CFDD7DF018798AE60972BF205C3F78596ECAB52ED0073CE60FB41654732979EE840DE5CD620EF8D8FF3AF30CC7322E22E9B9BB716012A78BE0E350640805FAD224D3CA75C7CEDFC922F1C2553068FA4D1EF1C8D09A52DB816081CDFB934A4EF5925309D71CB3BC2B93E493CC9E93772B1C386EF3E12D19D3EB734FB11F9819918B337E79EFFC99E68ACA046B75872E4BC40C4
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1728.35504\Документы на возврат 21е марта.exe
MD5:
SHA256:
964rundll32.exeC:\Users\admin\AppData\Local\Temp\8E13.tmp
MD5:
SHA256:
964rundll32.exeC:\Users\admin\AppData\Local\Temp\napilbdlkhjnlddi
MD5:
SHA256:
964rundll32.exeC:\Users\admin\Desktop\Документы на возврат 21е марта.exe
MD5:
SHA256:
964rundll32.exeC:\Users\admin\Desktop\niieckedjafcmnfd
MD5:
SHA256:
1812Документы на возврат 21е марта.exeC:\Users\admin\AppData\Local\Temp\8E13.tmpexecutable
MD5:3E8235809E544B7DBAA9971E20A7FE72
SHA256:7C33B5D66DACFACF54123CEC65D431779726CAA5F647FB5B816167A580CCBB21
1812Документы на возврат 21е марта.exeC:\ProgramData\2401bf603c90\2702bc633f93.datexecutable
MD5:3E8235809E544B7DBAA9971E20A7FE72
SHA256:7C33B5D66DACFACF54123CEC65D431779726CAA5F647FB5B816167A580CCBB21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
964
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
338 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
964
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious
964
rundll32.exe
91.213.233.138:443
Optima Telecom Ltd.
KG
malicious

DNS requests

Domain
IP
Reputation
myip.ru
  • 178.62.9.171
unknown

Threats

PID
Process
Class
Message
964
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
964
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
964
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
964
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 687
964
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
No debug info