File name:

Document (1).rar

Full analysis: https://app.any.run/tasks/cc577481-d673-4374-9fd5-e4464dc1a8cf
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 15, 2019, 09:44:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

6B415AB90361A304F376E94F2DD0E58A

SHA1:

E544A3C92C8451C4694E1986497E21D6351D2825

SHA256:

059C84305F563C044D89DD3A2F6B2DA53438EA41FE7795144413BE29A6313187

SSDEEP:

3072:mi9UDPHG2baMxCIeU3TyXhFWoxDYN9b6QGzqT4Yf3D8Qq35w:yTPn8hQoxeG9zqJxF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • yhhhyhhy.exe (PID: 944)
      • svhost.exe (PID: 1652)
      • yhhhyhhy.exe (PID: 2172)
      • svhost.exe (PID: 3580)
      • yhhhyhhy.exe (PID: 2792)
    • Changes the autorun value in the registry

      • reg.exe (PID: 1648)
      • reg.exe (PID: 488)
    • Runs app for hidden code execution

      • yhhhyhhy.exe (PID: 2172)
      • yhhhyhhy.exe (PID: 944)
    • REMCOS RAT was detected

      • svhost.exe (PID: 3580)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • yhhhyhhy.exe (PID: 944)
      • yhhhyhhy.exe (PID: 2172)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 636)
      • yhhhyhhy.exe (PID: 944)
      • cmd.exe (PID: 3456)
      • yhhhyhhy.exe (PID: 2172)
      • cmd.exe (PID: 980)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 980)
      • cmd.exe (PID: 3456)
    • Creates files in the user directory

      • svhost.exe (PID: 3580)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 137782
UncompressedSize: 487920
OperatingSystem: Win32
ModifyDate: 2019:05:08 22:05:16
PackingMethod: Normal
ArchivedFileName: yhhhyhhy.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe yhhhyhhy.exe no specs yhhhyhhy.exe cmd.exe reg.exe svhost.exe no specs cmd.exe no specs timeout.exe no specs yhhhyhhy.exe cmd.exe reg.exe #REMCOS svhost.exe

Process information

PID
CMD
Path
Indicators
Parent process
488reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnk" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
636"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Document (1).rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
944"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exe
explorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
HIGH
Description:
Sandboxie Installer
Exit code:
0
Version:
5.26
Modules
Images
c:\users\admin\desktop\yhhhyhhy.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
980"cmd.exe"C:\Windows\system32\cmd.exe
yhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1648reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnk" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1652"C:\Users\admin\AppData\Local\Temp\svhost.exe"C:\Users\admin\AppData\Local\Temp\svhost.exeyhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual Basic Command Line Compiler
Exit code:
3221225496
Version:
9.0.30729.5420
Modules
Images
c:\users\admin\appdata\local\temp\svhost.exe
c:\systemroot\system32\ntdll.dll
2160cmd /c C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.batC:\Windows\system32\cmd.exeyhhhyhhy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2172"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exe
explorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
HIGH
Description:
Sandboxie Installer
Exit code:
0
Version:
5.26
Modules
Images
c:\users\admin\desktop\yhhhyhhy.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2792"C:\Users\admin\Desktop\yhhhyhhy.exe" C:\Users\admin\Desktop\yhhhyhhy.exeexplorer.exe
User:
admin
Company:
Sandboxie Holdings, LLC
Integrity Level:
MEDIUM
Description:
Sandboxie Installer
Exit code:
3221226540
Version:
5.26
Modules
Images
c:\users\admin\desktop\yhhhyhhy.exe
c:\systemroot\system32\ntdll.dll
3032timeout /t 300C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
987
Read events
974
Write events
13
Delete events
0

Modification events

(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(636) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Document (1).rar
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(1648) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
Operation:writeName:Load
Value:
C:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnk
Executable files
5
Suspicious files
0
Text files
5
Unknown types
2

Dropped files

PID
Process
Filename
Type
980cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exeexecutable
MD5:
SHA256:
636WinRAR.exeC:\Users\admin\Desktop\yhhhyhhy.exeexecutable
MD5:
SHA256:
3456cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exeexecutable
MD5:
SHA256:
980cmd.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifiertext
MD5:130A75A932A2FE57BFEA6A65B88DA8F6
SHA256:F2B79CAE559D6772AFC1C2ED9468988178F8B6833D5028A15DEA73CE47D0196E
2172yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnklnk
MD5:B7F2CFEC6823A438DBA7530A8F4AE648
SHA256:612F6D646DAAA368D40443AB894042EBB8B93AC485658E78682731BAD9AB52CC
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.lnklnk
MD5:B7F2CFEC6823A438DBA7530A8F4AE648
SHA256:612F6D646DAAA368D40443AB894042EBB8B93AC485658E78682731BAD9AB52CC
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\svhost.exeexecutable
MD5:32827E69B293B99013BBBE37D029245D
SHA256:9250B89157770E3AB59A2C7E2DD6B12B3C61D9B7C6620C3B4727E4BFFF10F01F
944yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\FolderN\name.exe.battext
MD5:4C8485419E996A63B390E1E42AE851A8
SHA256:6B8CCB3DB87E52C95A7EA8D41B7BFF269A26C9573E74AF142525C7DC49EA2467
2172yhhhyhhy.exeC:\Users\admin\AppData\Local\Temp\svhost.exeexecutable
MD5:32827E69B293B99013BBBE37D029245D
SHA256:9250B89157770E3AB59A2C7E2DD6B12B3C61D9B7C6620C3B4727E4BFFF10F01F
3580svhost.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:89B5667E995FBEB88EDDA0BAC2FD47C4
SHA256:EE321AE724EA998CADB15526D3573191C892653D28A8AA7DE43413AE2DCE5E79
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
30
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3580
svhost.exe
185.247.228.179:5770
unknown

DNS requests

No data

Threats

No threats detected
No debug info