File name:

Desktop.rar

Full analysis: https://app.any.run/tasks/1be426c6-33ba-4ad4-9ce0-b7410e99e5c9
Verdict: Malicious activity
Analysis date: January 18, 2019, 13:33:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

ED56EF81342380D616ADDBD11DEF972F

SHA1:

BC85D7CC8C81BDCA9674022C35FEFC5810BF7B3E

SHA256:

102C6409B237288006F63F5EB2FD1B9FE785D219419FB231162DDDD9FC66D165

SSDEEP:

98304:boAMMZBE7gOIWSq0P7RhWt/c/1lLMDgORgPmwqVZ8iRH9y12hb1OT:0k3jOIWSqoits3MUE6hdil9j1+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • AncalogBuilder.exe (PID: 2640)
      • AncalogBuilder.exe (PID: 3912)
      • AncalogBuilder.exe (PID: 2628)
      • svchost.exe (PID: 2392)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 968)
      • AncalogBuilder.exe (PID: 2628)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2700)
      • WinRAR.exe (PID: 2184)
      • AncalogBuilder.exe (PID: 2640)
    • Creates executable files which already exist in Windows

      • AncalogBuilder.exe (PID: 2640)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs winrar.exe winrar.exe searchprotocolhost.exe no specs ancalogbuilder.exe ancalogbuilder.exe no specs ancalogbuilder.exe svchost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
968"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2184"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver "-an=C:\Users\admin\Desktop\radC8EB1.tmp.zip" -ad -- "C:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar.zip" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2392"C:\Users\admin\AppData\Local\Temp\svchost.exe" 0C:\Users\admin\AppData\Local\Temp\svchost.exeAncalogBuilder.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Phulli
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2628"C:\Users\admin\AppData\Local\Temp\AncalogBuilder.exe" 0C:\Users\admin\AppData\Local\Temp\AncalogBuilder.exe
AncalogBuilder.exe
User:
admin
Company:
ancalog.tech
Integrity Level:
HIGH
Description:
Ancalog Multi Exploit Builder
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ancalogbuilder.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2640"C:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\AncalogBuilder.exe" C:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\AncalogBuilder.exe
explorer.exe
User:
admin
Company:
BreakingSecurity.net
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.01.0001
Modules
Images
c:\users\admin\desktop\ancalog exploit builder achillepower.rar\ancalog exploit builder achillepower\ancalogbuilder.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2700"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower.rar" "C:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3096"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Desktop.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3912"C:\Users\admin\AppData\Local\Temp\AncalogBuilder.exe" 0C:\Users\admin\AppData\Local\Temp\AncalogBuilder.exeAncalogBuilder.exe
User:
admin
Company:
ancalog.tech
Integrity Level:
MEDIUM
Description:
Ancalog Multi Exploit Builder
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ancalogbuilder.exe
c:\systemroot\system32\ntdll.dll
Total events
1 196
Read events
1 155
Write events
41
Delete events
0

Modification events

(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3096) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Desktop.rar
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
10
Suspicious files
6
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.40598\radC8EB1.tmp.zip
MD5:
SHA256:
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.40598\Ancalog Exploit Builder AchillePower.rar.zip
MD5:
SHA256:
2184WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower.rarcompressed
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\AncalogBuilder.exeexecutable
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\cap.bintext
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\doc.binbinary
MD5:
SHA256:
2184WinRAR.exeC:\Users\admin\Desktop\radC8EB1.tmp\rad24126.tmpexecutable
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\enable-macro.pngimage
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\chm.binhtml
MD5:
SHA256:
2700WinRAR.exeC:\Users\admin\Desktop\Ancalog Exploit Builder AchillePower.rar\Ancalog Exploit Builder AchillePower\hta.binhtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info