File name:

mod menu gta 5.rar

Full analysis: https://app.any.run/tasks/f5a5e6ae-0e9d-44e3-a763-81a25a1c869e
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 21, 2025, 11:20:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
trox
stealer
auto
pythonstealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

DFEEF3C62715058EADC40EBBF1F2EA7B

SHA1:

70E411885A41928540C162F8923619E8201F789B

SHA256:

0803C0FD3651CB14E0E3B95402A971A3FD5F700E91C18CB2642D49804CDC251E

SSDEEP:

98304:WHOItQx8KAhvSYOTNRt2Iw5NV9DJiEhrIBfZIPjkcCTK9ocWA3JxkfX5+JILmInl:YxwQQJeOwOFVkZMYdcPH/ml9w

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PYTHONSTEALER has been found (auto)

      • WinRAR.exe (PID: 5556)
    • TROX has been detected

      • modest-menu.exe (PID: 5116)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5556)
    • Executable content was dropped or overwritten

      • modest-menu.exe (PID: 5116)
    • The process drops C-runtime libraries

      • modest-menu.exe (PID: 5116)
    • Process drops python dynamic module

      • modest-menu.exe (PID: 5116)
    • Process drops legitimate windows executable

      • modest-menu.exe (PID: 5116)
    • Loads Python modules

      • SOSAqq.exe (PID: 5548)
    • Starts POWERSHELL.EXE for commands execution

      • SOSAqq.exe (PID: 5548)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5556)
    • Checks supported languages

      • modest-menu.exe (PID: 5116)
      • SOSAqq.exe (PID: 5548)
    • Manual execution by a user

      • Taskmgr.exe (PID: 896)
      • Taskmgr.exe (PID: 2340)
    • The sample compiled with english language support

      • modest-menu.exe (PID: 5116)
    • Create files in a temporary directory

      • modest-menu.exe (PID: 5116)
      • SOSAqq.exe (PID: 5548)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 2340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PYTHONSTEALER winrar.exe #TROX modest-menu.exe conhost.exe no specs sosaqq.exe no specs taskmgr.exe no specs taskmgr.exe powershell.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
2340"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
5112\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemodest-menu.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5116"C:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\modest-menu.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\modest-menu.exe
WinRAR.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Setup
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb5556.38051\modest-menu.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5548C:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\SOSAqq.exemodest-menu.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Setup
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_5116_133870296716717479\sosaqq.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5556"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\mod menu gta 5.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5576C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5776powershell -c "Get-WmiObject -Query \"Select * from Win32_CacheMemory\""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSOSAqq.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
8 307
Read events
8 288
Write events
18
Delete events
1

Modification events

(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\mod menu gta 5.rar
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2340) Taskmgr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Operation:delete valueName:Preferences
Value:
Executable files
63
Suspicious files
3
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
5556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\V2\libEGL.dllexecutable
MD5:6FC3B6D9E75B41468B0494B639EED291
SHA256:2CAA86AE899BF92B62C61750263E0FAE4B85C688F76C6F586094ACBC3963C80C
5556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\scripts\cef_200_percent.pakbinary
MD5:4829EAFCB6A9311DD0967F9FEC2FAB4A
SHA256:0B7D72864DA135A180FDD585F2993FC4BAE8DCC167EDB3EA7643B0EF8C89CE99
5556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\Readme.txttext
MD5:E3E92815DAA209D5FA0FB5EF9FF2D450
SHA256:89E0ADF1256F2D7F6747B6075252149B43E412864E8C8188B6545691DB371300
5116modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\_bz2.pydexecutable
MD5:30F396F8411274F15AC85B14B7B3CD3D
SHA256:CB15D6CC7268D3A0BD17D9D9CEC330A7C1768B1C911553045C73BC6920DE987F
5556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\config.jconexecutable
MD5:37054E3603A1E679F62A8682E1E651AC
SHA256:C253136038C70236546F7544B9AF444603E59BF43888284EF29AD9849B53C136
5116modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\_decimal.pydexecutable
MD5:7AE94F5A66986CBC1A2B3C65A8D617F3
SHA256:DA8BB3D54BBBA20D8FA6C2FD0A4389AEC80AB6BD490B0ABEF5BD65097CBC0DA4
5556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5556.38051\scripts\cef_100_percent.pakbinary
MD5:CE05F28288F44CB355010803DD3E54F8
SHA256:3D01A942041DF04B8124F229910DFDAB20D7097A69FDAB11D3A3B4B23BDC4DBF
5116modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\_multiprocessing.pydexecutable
MD5:41EE16713672E1BFC4543E6AE7588D72
SHA256:2FEB0BF9658634FE8405F17C4573FEB1C300E9345D7965738BEDEB871A939E6B
5116modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\_hashlib.pydexecutable
MD5:A25BC2B21B555293554D7F611EAA75EA
SHA256:43ACECDC00DD5F9A19B48FF251106C63C975C732B9A2A7B91714642F76BE074D
5116modest-menu.exeC:\Users\admin\AppData\Local\Temp\onefile_5116_133870296716717479\_ssl.pydexecutable
MD5:90F080C53A2B7E23A5EFD5FD3806F352
SHA256:FA5E6FE9545F83704F78316E27446A0026FBEBB9C0C3C63FAED73A12D89784D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1188
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
856
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
856
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1188
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1188
backgroundTaskHost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.132
  • 40.126.32.72
  • 20.190.160.22
  • 20.190.160.67
  • 20.190.160.20
  • 40.126.32.74
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 23.219.150.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info