File name:

netcoreapp3.1.7z

Full analysis: https://app.any.run/tasks/66803406-23f5-4cb0-b75b-70d2c5a31afb
Verdict: Malicious activity
Analysis date: November 30, 2020, 01:25:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

C5CCD223B3CA304185E9656925AEA63E

SHA1:

8B1F593F10EC2DC6B88450E75D6FCAE69343B7D1

SHA256:

0935EDFDB28894D24BDE2D06F0FED586C37A9238352C3EB59A90F5DAC1374BC9

SSDEEP:

3072:JRhvkQYaln/W1JLl9xnGaQ4x3grbD5e9cmX+XByCToBTJMVGBSR:JfFQX9RGIxqX5eCmXWBTTD4W

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3448)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2784)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2784)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2784)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2784"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\netcoreapp3.1.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3448"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
782
Read events
763
Write events
19
Delete events
0

Modification events

(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2784) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\netcoreapp3.1.7z
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(2784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
3
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.pdbbinary
MD5:
SHA256:
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.runtimeconfig.dev.jsontext
MD5:
SHA256:
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.deps.jsontext
MD5:
SHA256:
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.exeexecutable
MD5:
SHA256:
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.dllexecutable
MD5:
SHA256:
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Leaf.xNet.dllexecutable
MD5:6F4784273E0E378ECF86ACC62A5E8005
SHA256:2A5E234423CF8A275E0DC6127C94F53F0E3C6916704FCFF40D0ADA105AB13E8E
2784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2784.39165\netcoreapp3.1\Youtube-Viewers.runtimeconfig.jsontext
MD5:42F40B6C1B9AB7F8F92B0AE5D8C5FDAB
SHA256:ED69FDC80437B2D0FD2B177D018A6E800517200E4FB6DD54705F5A62A908EC38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info