analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Document (1).rar

Full analysis: https://app.any.run/tasks/cc577481-d673-4374-9fd5-e4464dc1a8cf
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 15, 2019, 09:44:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

6B415AB90361A304F376E94F2DD0E58A

SHA1:

E544A3C92C8451C4694E1986497E21D6351D2825

SHA256:

059C84305F563C044D89DD3A2F6B2DA53438EA41FE7795144413BE29A6313187

SSDEEP:

3072:mi9UDPHG2baMxCIeU3TyXhFWoxDYN9b6QGzqT4Yf3D8Qq35w:yTPn8hQoxeG9zqJxF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • yhhhyhhy.exe (PID: 944)
      • yhhhyhhy.exe (PID: 2792)
      • svhost.exe (PID: 1652)
      • yhhhyhhy.exe (PID: 2172)
      • svhost.exe (PID: 3580)
    • Runs app for hidden code execution

      • yhhhyhhy.exe (PID: 944)
      • yhhhyhhy.exe (PID: 2172)
    • Changes the autorun value in the registry

      • reg.exe (PID: 1648)
      • reg.exe (PID: 488)
    • REMCOS RAT was detected

      • svhost.exe (PID: 3580)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 636)
      • cmd.exe (PID: 980)
      • yhhhyhhy.exe (PID: 944)
      • cmd.exe (PID: 3456)
      • yhhhyhhy.exe (PID: 2172)
    • Starts CMD.EXE for commands execution

      • yhhhyhhy.exe (PID: 944)
      • yhhhyhhy.exe (PID: 2172)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 980)
      • cmd.exe (PID: 3456)
    • Creates files in the user directory

      • svhost.exe (PID: 3580)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: yhhhyhhy.exe
PackingMethod: Normal
ModifyDate: 2019:05:08 22:05:16
OperatingSystem: Win32
UncompressedSize: 487920
CompressedSize: 137782
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe yhhhyhhy.exe no specs yhhhyhhy.exe cmd.exe reg.exe svhost.exe no specs cmd.exe no specs timeout.exe no specs yhhhyhhy.exe cmd.exe reg.exe #REMCOS svhost.exe

Process information

PID
CMD
Path
Indicators
Parent process
636"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Document (1).rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2792"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exeexplorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
MEDIUM
Description:
Sandboxie Installer
Exit code:
3221226540
Version:
5.26
944"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exe
explorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
HIGH
Description:
Sandboxie Installer
Exit code:
0
Version:
5.26
980"cmd.exe"C:\Windows\system32\cmd.exe
yhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1648reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnk" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1652"C:\Users\admin\AppData\Local\Temp\svhost.exe"C:\Users\admin\AppData\Local\Temp\svhost.exeyhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual Basic Command Line Compiler
Exit code:
3221225496
Version:
9.0.30729.5420
2160cmd /c C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.batC:\Windows\system32\cmd.exeyhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3032timeout /t 300C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2172"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exe
explorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
HIGH
Description:
Sandboxie Installer
Exit code:
0
Version:
5.26
3456"cmd.exe"C:\Windows\system32\cmd.exe
yhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
987
Read events
974
Write events
13
Delete events
0

Modification events

(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(636) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Document (1).rar
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(1648) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
Operation:writeName:Load
Value:
C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnk
Executable files
5
Suspicious files
0
Text files
5
Unknown types
2

Dropped files

PID
Process
Filename
Type
636WinRAR.exeC:\Users\admin\Desktop\yhhhyhhy.exeexecutable
MD5:FD0578F8157A72F371C1F61A9CF159E6
SHA256:3CAEEBCB29DCAF26533B2EFF7190F3DAED907E2C6C8AA83D48DCB8F012B1A272
3456cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exeexecutable
MD5:FD0578F8157A72F371C1F61A9CF159E6
SHA256:3CAEEBCB29DCAF26533B2EFF7190F3DAED907E2C6C8AA83D48DCB8F012B1A272
2172yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\svhost.exeexecutable
MD5:32827E69B293B99013BBBE37D029245D
SHA256:9250B89157770E3AB59A2C7E2DD6B12B3C61D9B7C6620C3B4727E4BFFF10F01F
980cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exeexecutable
MD5:FD0578F8157A72F371C1F61A9CF159E6
SHA256:3CAEEBCB29DCAF26533B2EFF7190F3DAED907E2C6C8AA83D48DCB8F012B1A272
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\svhost.exeexecutable
MD5:32827E69B293B99013BBBE37D029245D
SHA256:9250B89157770E3AB59A2C7E2DD6B12B3C61D9B7C6620C3B4727E4BFFF10F01F
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.battext
MD5:4C8485419E996A63B390E1E42AE851A8
SHA256:6B8CCB3DB87E52C95A7EA8D41B7BFF269A26C9573E74AF142525C7DC49EA2467
2172yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnklnk
MD5:B7F2CFEC6823A438DBA7530A8F4AE648
SHA256:612F6D646DAAA368D40443AB894042EBB8B93AC485658E78682731BAD9AB52CC
3580svhost.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:89B5667E995FBEB88EDDA0BAC2FD47C4
SHA256:EE321AE724EA998CADB15526D3573191C892653D28A8AA7DE43413AE2DCE5E79
3456cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifiertext
MD5:130A75A932A2FE57BFEA6A65B88DA8F6
SHA256:F2B79CAE559D6772AFC1C2ED9468988178F8B6833D5028A15DEA73CE47D0196E
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnklnk
MD5:B7F2CFEC6823A438DBA7530A8F4AE648
SHA256:612F6D646DAAA368D40443AB894042EBB8B93AC485658E78682731BAD9AB52CC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
30
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3580
svhost.exe
185.247.228.179:5770
unknown

DNS requests

No data

Threats

No threats detected
No debug info