analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

file

Full analysis: https://app.any.run/tasks/6361a12c-e524-4fb2-b200-036ddbb48ca9
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: July 17, 2019, 13:11:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
netwire
trojan
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

621E733F92198BA18E4F0318887A49AB

SHA1:

342D2D74EAEF55D70841E67F6C87BE990EDF2D1E

SHA256:

0F0E2733E42882C739129CEC49F6FC12380D85031A24C6A12BD737EC7945B29A

SSDEEP:

3072:2QWUF5g7eoDAOlwP7EMXZeWAP8PXttxv11E+HYH9/KbfXlempaDW:rW+eioEOS7ZXsjEP9txvpyNKbgiay

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • proof of payment#.exe (PID: 680)
      • proof of payment#.exe (PID: 916)
      • proof of payment#.exe (PID: 3820)
      • proof of payment#.exe (PID: 3676)
      • proof of payment#.exe (PID: 3976)
      • Host.exe (PID: 3908)
      • Host.exe (PID: 1736)
      • proof of payment#.exe (PID: 3224)
      • proof of payment#.exe (PID: 2856)
      • proof of payment#.exe (PID: 3156)
      • proof of payment#.exe (PID: 3568)
      • proof of payment#.exe (PID: 2732)
      • proof of payment#.exe (PID: 3028)
      • proof of payment#.exe (PID: 4004)
    • Changes the autorun value in the registry

      • Host.exe (PID: 3908)
    • NETWIRE was detected

      • Host.exe (PID: 3908)
    • Connects to CnC server

      • Host.exe (PID: 3908)
  • SUSPICIOUS

    • Application launched itself

      • proof of payment#.exe (PID: 680)
      • proof of payment#.exe (PID: 3820)
      • proof of payment#.exe (PID: 3224)
      • Host.exe (PID: 1736)
      • proof of payment#.exe (PID: 2856)
      • proof of payment#.exe (PID: 4004)
      • proof of payment#.exe (PID: 3156)
    • Executable content was dropped or overwritten

      • proof of payment#.exe (PID: 916)
      • WinRAR.exe (PID: 3760)
    • Starts itself from another location

      • proof of payment#.exe (PID: 916)
    • Creates files in the user directory

      • proof of payment#.exe (PID: 916)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
15
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start drop and start start drop and start winrar.exe proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe proof of payment#.exe no specs host.exe no specs #NETWIRE host.exe proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs proof of payment#.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3760"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\file.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3820"C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14581\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14581\proof of payment#.exeWinRAR.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
680"C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14978\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14978\proof of payment#.exeWinRAR.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
916C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14581\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14581\proof of payment#.exe
proof of payment#.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
3676C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14978\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14978\proof of payment#.exeproof of payment#.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
1736"C:\Users\admin\AppData\Roaming\Install\Host.exe"C:\Users\admin\AppData\Roaming\Install\Host.exeproof of payment#.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
3908C:\Users\admin\AppData\Roaming\Install\Host.exe"C:\Users\admin\AppData\Roaming\Install\Host.exe
Host.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Version:
1.09.0008
3224"C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.18148\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.18148\proof of payment#.exeWinRAR.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
3976C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.18148\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.18148\proof of payment#.exeproof of payment#.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
2856"C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.19564\proof of payment#.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3760.19564\proof of payment#.exeWinRAR.exe
User:
admin
Company:
weirdwoman
Integrity Level:
MEDIUM
Description:
Jokul
Exit code:
0
Version:
1.09.0008
Total events
454
Read events
438
Write events
16
Delete events
0

Modification events

(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3760) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\file.7z
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
9
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14978\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.14581\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.24436\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.23809\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
916proof of payment#.exeC:\Users\admin\AppData\Roaming\Install\Host.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\file\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.18148\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3760.19564\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
3760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3760.18398\proof of payment#.exeexecutable
MD5:91BDE73C68F05C9D9F400AAB6078E149
SHA256:902117ED18B5D36E12B03743591880945B4B7D5E4781C2532D56DE93FEB143D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3908
Host.exe
91.193.75.66:2803
onelove03.duckdns.org
WorldStream B.V.
RS
malicious

DNS requests

Domain
IP
Reputation
onelove03.duckdns.org
  • 91.193.75.66
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3908
Host.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
2 ETPRO signatures available at the full report
No debug info