File name:

Teleshadow 3.1.rar

Full analysis: https://app.any.run/tasks/e1b5ba17-e6dd-45dd-bc7e-431a6bedaad7
Verdict: Suspicious activity
Analysis date: April 25, 2020, 18:28:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

792B40D4D60DC46AEDF9BDE56A7D91B6

SHA1:

72B03188E49AF8836A6980E7D6DED7F36B528051

SHA256:

00C882CBDE306EC34C86F080E75C21D365B65FC5B955E9034DA5EEF8F9205AEE

SSDEEP:

49152:zWqQk/31NPeCoJVRXL9GLoZyH/s5RPstM8+TFh8qXKDsD11wiJRes2Cql+vTLjXO:zWqQu31NPeRPb9GcQU5FstB+TFCMPPPm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Teleshadow 3.exe (PID: 3588)
    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 332)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Teleshadow 3.exe (PID: 3588)
      • WinRAR.exe (PID: 332)
    • Reads Environment values

      • Teleshadow 3.exe (PID: 3588)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe teleshadow 3.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Teleshadow 3.1.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1008"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa332.15903\1.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3588"C:\Users\admin\AppData\Local\Temp\Rar$EXa332.15821\Teleshadow 3.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa332.15821\Teleshadow 3.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Teleshadow
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa332.15821\teleshadow 3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
538
Read events
498
Write events
40
Delete events
0

Modification events

(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(332) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Teleshadow 3.1.rar
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
10
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa332.15903\1.txttext
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa332.15821\1.txttext
MD5:
SHA256:
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb340.tmpexecutable
MD5:B32993F21039491DD17CECDB5B06A2EC
SHA256:9D68A1C0F0E7125C8836042E40DA2C53D3302D21A86574045BE0225D09C27514
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb3A0.tmpexecutable
MD5:216FB1D780870623861B94E67A210F88
SHA256:E61530CC222745087C9996633763FD65EB053C1CCFB42F1DC6AF7D0B0DA83F06
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb3B3.tmpexecutable
MD5:BB56410706CA93F476FD45AE6ECCB2EC
SHA256:C6F73F24CA154F807A397FD951C5F4661757E4994B8F65DFBA0C3DAE85C4B87D
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb3B2.tmpexecutable
MD5:BB56410706CA93F476FD45AE6ECCB2EC
SHA256:C6F73F24CA154F807A397FD951C5F4661757E4994B8F65DFBA0C3DAE85C4B87D
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb402.tmpexecutable
MD5:B05EF07A65694848E41DE4F382BEEC80
SHA256:4D4403B0AB603B94E25FF31575C0BCCB85835F1E7812518ACBAAF45531627B8B
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb3A1.tmpexecutable
MD5:216FB1D780870623861B94E67A210F88
SHA256:E61530CC222745087C9996633763FD65EB053C1CCFB42F1DC6AF7D0B0DA83F06
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa332.15821\Teleshadow 3.exeexecutable
MD5:ED813189205C0D0E961D3EB7AE208DDE
SHA256:C9B7567230206F52F560D5CCF21C9B2022AE65D0411B30B8E4374E64B34E7BD2
3588Teleshadow 3.exeC:\Users\admin\AppData\Local\Temp\evb403.tmpexecutable
MD5:B05EF07A65694848E41DE4F382BEEC80
SHA256:4D4403B0AB603B94E25FF31575C0BCCB85835F1E7812518ACBAAF45531627B8B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3588
Teleshadow 3.exe
149.154.167.220:443
api.telegram.org
Telegram Messenger LLP
GB
malicious

DNS requests

Domain
IP
Reputation
api.telegram.org
  • 149.154.167.220
shared

Threats

No threats detected
No debug info