File name:

EverSpy Ultimate Unpacked - Copy.rar

Full analysis: https://app.any.run/tasks/abd51472-e279-4040-ac79-6f95a3975b2d
Verdict: Malicious activity
Analysis date: August 11, 2024, 20:11:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7CEA74158FFA610149B5B76B9CE29E5D

SHA1:

BD5BBD55F354B271015BE7B971DD3510064EE709

SHA256:

04D5C7486CF4962F52AC9173987C4AE53084A9329797F9E872D701943AF4A022

SSDEEP:

98304:/Ynz1/Hgu+4BNfWxWLFDou3biToRnoJF5j4GcvIhXWHhC320BIwXx3dyu4SJwbsk:DcFS50oBk3JJ7Rs63kuf2fN8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 2212)
    • Reads security settings of Internet Explorer

      • Unlock-Rat-V6.exe (PID: 6928)
    • Creates file in the systems drive root

      • Unlock-Rat-V6.exe (PID: 6928)
    • Drops the executable file immediately after the start

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 2212)
    • Starts CMD.EXE for commands execution

      • Unlock-Rat-V6.exe (PID: 6928)
    • Process drops legitimate windows executable

      • Unlock-Rat-V6.exe (PID: 6928)
    • The process drops C-runtime libraries

      • Unlock-Rat-V6.exe (PID: 6928)
    • Starts application with an unusual extension

      • java.exe (PID: 2212)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6420)
    • Checks supported languages

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 6484)
      • java.exe (PID: 2852)
      • java.exe (PID: 2212)
      • zipalign.exe (PID: 1432)
      • brut_util_Jar_41112474085867589873911591747991064364.tmp (PID: 6400)
      • java.exe (PID: 1984)
    • Reads the computer name

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 2852)
      • java.exe (PID: 2212)
      • java.exe (PID: 1984)
    • Manual execution by a user

      • WinRAR.exe (PID: 6420)
      • Unlock-Rat-V6.exe (PID: 1164)
      • Unlock-Rat-V6.exe (PID: 6928)
    • Creates files or folders in the user directory

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 2852)
    • Reads the machine GUID from the registry

      • Unlock-Rat-V6.exe (PID: 6928)
      • java.exe (PID: 2852)
      • java.exe (PID: 2212)
      • java.exe (PID: 1984)
    • Create files in a temporary directory

      • java.exe (PID: 6484)
      • java.exe (PID: 2852)
      • java.exe (PID: 2212)
      • brut_util_Jar_41112474085867589873911591747991064364.tmp (PID: 6400)
      • java.exe (PID: 1984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
14
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe rundll32.exe no specs unlock-rat-v6.exe no specs unlock-rat-v6.exe cmd.exe no specs conhost.exe no specs java.exe no specs java.exe no specs java.exe brut_util_jar_41112474085867589873911591747991064364.tmp no specs conhost.exe no specs zipalign.exe no specs java.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1164"C:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\Unlock-Rat-V6.exe" C:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\Unlock-Rat-V6.exeexplorer.exe
User:
admin
Company:
安卓远控
Integrity Level:
MEDIUM
Description:
安卓远控
Exit code:
3221226540
Version:
6.0
Modules
Images
c:\users\admin\desktop\unlock-rat-v6 by @dark_h4cking\unlock-rat-v6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1432zipalign.exe -v 4 C:\tianxian_Builder\platformBinary64\bin\temp\dist\temp.apk C:\tianxian_Builder\platformBinary64\bin\temp\dist\tempzip.apk C:\tianxian_Builder\platformBinary64\bin\zipalign.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\tianxian_builder\platformbinary64\bin\zipalign.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
1984java -jar C:\tianxian_Builder\platformBinary64\bin\SignApk.jar sign --key C:\tianxian_Builder\platformBinary64\bin\key.pk8 --cert C:\tianxian_Builder\platformBinary64\bin\certificate.pem --v2-signing-enabled true --v3-signing-enabled true --out C:\tianxian_Builder\platformBinary64\bin\output\ready.apk C:\tianxian_Builder\platformBinary64\bin\temp\dist\temp.apk C:\tianxian_Builder\platformBinary64\bin\java.execmd.exe
User:
admin
Company:
N/A
Integrity Level:
HIGH
Description:
OpenJDK Platform binary
Exit code:
0
Version:
8.0.1520.1
Modules
Images
c:\tianxian_builder\platformbinary64\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2212java -jar -Duser.language=en "C:\tianxian_Builder\platformBinary64\bin\\apktool.jar" b tempC:\tianxian_Builder\platformBinary64\bin\java.exe
cmd.exe
User:
admin
Company:
N/A
Integrity Level:
HIGH
Description:
OpenJDK Platform binary
Exit code:
0
Version:
8.0.1520.1
Modules
Images
c:\tianxian_builder\platformbinary64\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2852java -jar -Duser.language=en "C:\tianxian_Builder\platformBinary64\bin\\apktool.jar" d temp.apkC:\tianxian_Builder\platformBinary64\bin\java.execmd.exe
User:
admin
Company:
N/A
Integrity Level:
HIGH
Description:
OpenJDK Platform binary
Exit code:
0
Version:
8.0.1520.1
Modules
Images
c:\tianxian_builder\platformbinary64\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3812\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5924"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\EverSpy Ultimate Unpacked - Copy.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6400C:\Users\admin\AppData\Local\Temp\brut_util_Jar_41112474085867589873911591747991064364.tmp p --forced-package-id 127 --min-sdk-version 23 --target-sdk-version 28 --version-code 1000 --version-name 1.0.0.0 --no-version-vectors -F C:\Users\admin\AppData\Local\Temp\APKTOOL1530726720742455262.tmp -e C:\Users\admin\AppData\Local\Temp\APKTOOL7428684883387620065.tmp -0 arsc -I C:\Users\admin\AppData\Local\apktool\framework\1.apk -S C:\tianxian_Builder\platformBinary64\bin\temp\res -M C:\tianxian_Builder\platformBinary64\bin\temp\AndroidManifest.xmlC:\Users\admin\AppData\Local\Temp\brut_util_Jar_41112474085867589873911591747991064364.tmpjava.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\brut_util_jar_41112474085867589873911591747991064364.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6420"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver "-anf=C:\Users\admin\AppData\Local\Temp\Rar$LS4552.47118" -scul -- "C:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING.part02.rar" "C:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6468"cmd.exe"C:\Windows\SysWOW64\cmd.exeUnlock-Rat-V6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
15 897
Read events
15 708
Write events
180
Delete events
9

Modification events

(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\EverSpy Ultimate Unpacked - Copy.rar
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5924) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5924) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@C:\WINDOWS\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(6420) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
174
Suspicious files
63
Text files
1 662
Unknown types
35

Dropped files

PID
Process
Filename
Type
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\Unlock-Rat-V6.exe
MD5:
SHA256:
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\HVMRun64.dllexecutable
MD5:21184C4444B13C67546C7ACF7F6AD8E3
SHA256:14F61C269509EB27083883D5E8EDCF9ED14F3B62CFBFB69F4F7434D64A7FA924
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\MetroSet UI.dllbinary
MD5:D99A97DE55B2561E57135433B44BB786
SHA256:6288E559B0F34D56AB4601FFB2BA2289001C77CF7351D135DD93915034C56BBA
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\res\Config\maps.inftext
MD5:4F6C0B41AE6C4FAF4A82EFFA5422ACAC
SHA256:5E5155D5B91A7C5FC89F3DB9399873327D0C8B16645AC65C5B4F74BB0069F897
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\Newtonsoft.Json.dllexecutable
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\HVMRuntm.dllexecutable
MD5:559F1A94D4FADBE42745200C5DEEB94C
SHA256:52CF690F3436C9E98A2AB13E2871CA95DA72C34EA5DD36D5C52ECCCFA78B5696
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\res\Audio\notification.wavwav
MD5:A812F51D703FF92C95DD481FE270782F
SHA256:4AC90B06262E1D8DD6FC3F25E09ACD47619D159A46C763DC8298616910C0FE3A
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\Newtonsoft.Json.xmlxml
MD5:D398FFE9FDAC6A53A8D8BB26F29BBB3C
SHA256:79EE87D4EDE8783461DE05B93379D576F6E8575D4AB49359F15897A854B643C4
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\res\Config\supported_text.inftext
MD5:5D3B89E5C0D8B54971A1F81D175D5717
SHA256:4C382A99B06A04BF3E5141FE9F4C6D1D40E7A2740740040156E1247C073FA8B6
6420WinRAR.exeC:\Users\admin\Desktop\Unlock-Rat-V6 BY @DARK_H4CKING\NAudio.dllexecutable
MD5:6CA17ABCCAE3050F391401B2955F9333
SHA256:3AD5D09B4C8C3146D15955A564A9F1A57D7C795B189A25C6F722A738D95EF89C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
40
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5540
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5540
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2128
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5064
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
4080
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5336
SearchApp.exe
184.86.251.28:443
www.bing.com
Akamai International B.V.
DE
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5540
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5540
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.206
whitelisted
www.bing.com
  • 184.86.251.28
  • 184.86.251.17
  • 184.86.251.11
  • 184.86.251.9
  • 184.86.251.23
  • 184.86.251.21
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.67
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
th.bing.com
  • 184.86.251.9
  • 184.86.251.17
  • 184.86.251.14
  • 184.86.251.28
  • 184.86.251.21
  • 184.86.251.11
  • 184.86.251.23
  • 184.86.251.24
whitelisted
fd.api.iris.microsoft.com
  • 20.24.121.134
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted

Threats

No threats detected
Process
Message
Unlock-Rat-V6.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s