| File name: | 3.rar |
| Full analysis: | https://app.any.run/tasks/3de40d48-bcba-43e0-b499-93db36031e42 |
| Verdict: | Malicious activity |
| Analysis date: | December 02, 2023, 21:08:40 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 3C2D3ACCA0A6F4AA1DBDDB3F9F56672D |
| SHA1: | 78D668626AE46490976AA9A806C6FF13E8AA7D17 |
| SHA256: | 125C4B80F91917F505CFECE73AE6F73B1300CF0A0C11B455BDC078B091C5CD1A |
| SSDEEP: | 98304:ZYFGwzKocBggxk0MZwwkZVt++gsBlBP5FZ0k/pLU3bgLMmGAfYP0sp2KE/1pkOVW:6Xx2uQScYgwscEuxDAfnh4Whc |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "C:\Users\admin\AppData\Local\Temp\67B2.tmp" | C:\Users\admin\AppData\Local\Temp\67B2.tmp | — | 66D7.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 124 | "C:\Users\admin\AppData\Local\Temp\CED8.tmp" | C:\Users\admin\AppData\Local\Temp\CED8.tmp | — | CE8A.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 124 | "C:\Users\admin\AppData\Local\Temp\E473.tmp" | C:\Users\admin\AppData\Local\Temp\E473.tmp | — | E3E7.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 128 | "C:\Users\admin\AppData\Local\Temp\D958.tmp" | C:\Users\admin\AppData\Local\Temp\D958.tmp | — | D919.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\EAEC.tmp" | C:\Users\admin\AppData\Local\Temp\EAEC.tmp | — | EAAD.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 284 | "C:\Users\admin\AppData\Local\Temp\16D3.tmp" | C:\Users\admin\AppData\Local\Temp\16D3.tmp | — | 1656.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 292 | "C:\Users\admin\AppData\Local\Temp\D679.tmp" | C:\Users\admin\AppData\Local\Temp\D679.tmp | — | D62B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 296 | "C:\Users\admin\AppData\Local\Temp\CE8A.tmp" | C:\Users\admin\AppData\Local\Temp\CE8A.tmp | — | CE2C.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 296 | "C:\Users\admin\AppData\Local\Temp\E3E7.tmp" | C:\Users\admin\AppData\Local\Temp\E3E7.tmp | — | E3A8.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 300 | "C:\Users\admin\AppData\Local\Temp\79C3.tmp" | C:\Users\admin\AppData\Local\Temp\79C3.tmp | — | 7965.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2332) b7732333c67d9155ebe9c3a11f966143.exe | Key: | HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process |
| Operation: | write | Name: | LO |
Value: 1 | |||
| (PID) Process: | (1152) a8b8df17c34f05be56406fcde37666eb.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\33fe4259a21b93c20ef6a920b6311b8f.exe | executable | |
MD5:33FE4259A21B93C20EF6A920B6311B8F | SHA256:3984F62C9C5E3AF60DF7278B321057FCF131B6B30887B4802F4A536277B44589 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\4a184b64b838a4833419c76951f7eda4.exe | executable | |
MD5:4A184B64B838A4833419C76951F7EDA4 | SHA256:0977FAEDBC532514CBBC5DBAF1B077364555378C7094B3BB1A91095C58870775 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\545211f79941424f26866b9f00ad361b.exe | executable | |
MD5:545211F79941424F26866B9F00AD361B | SHA256:235A898FFCD14C165495DEC3B265492F17D09527FE55C6B0072B25727C6A2BAB | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\289c1a8a890a567f4f70235ced85f763.exe | executable | |
MD5:289C1A8A890A567F4F70235CED85F763 | SHA256:4444FC67A93232E1B4F3C9B755AC3B9D0D2D7D0EB86D46F7D7B67EC8DF2D9771 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\1cbc37b142258777469e87ecb0b56c4b.exe | executable | |
MD5:1CBC37B142258777469E87ECB0B56C4B | SHA256:271A8C1DB1786A799AF9652FF82AA7765A81602E5418CEDB3CEA0DDDDB716A70 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\127277c0097cef5ce18f0002a2456f84.exe | executable | |
MD5:127277C0097CEF5CE18F0002A2456F84 | SHA256:E0E43B3AAAACEA4C53B4723C5A9704C7B9C0EA88A45DA58622B0EA85A5A5CDF8 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\4b543325cf0e11dee26d58cc1ac38cf5.exe | executable | |
MD5:4B543325CF0E11DEE26D58CC1AC38CF5 | SHA256:E9EF5889CBC575FABAE55849EEBC9EFE2C14D9532C6CAFB02AAF78CC5DEE3CA0 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\2278600280b0490ebf08c98c0e27e46c.exe | executable | |
MD5:2278600280B0490EBF08C98C0E27E46C | SHA256:5CA39702956C612AA62BE11B28E0073576D17AC5569157A1D1291543ABCE4B4C | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\26a318ba688442470eb1f247da7d76c1.exe | executable | |
MD5:26A318BA688442470EB1F247DA7D76C1 | SHA256:D11E6B68E509EC7D7D70CF326BDA76768865687B2753E10EBD44C82EB4BAE9DE | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\6a609d65263f2c95ab44b534255b53c9.exe | executable | |
MD5:6A609D65263F2C95AB44B534255B53C9 | SHA256:20DEF0B3ABB9FCE81424CEB394A1E184EF9C504F96B85A4D32637AA5CA069AAA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3140 | ZaccMoMY.exe | GET | 302 | 142.250.186.46:80 | http://google.com/ | unknown | html | 392 b | unknown |
2924 | 779297.exe | GET | 307 | 104.22.74.171:80 | http://whos.amung.us/swidget/78ejo1rdbrrt | unknown | — | — | unknown |
1276 | SkQQcsYU.exe | GET | 302 | 142.250.186.46:80 | http://google.com/ | unknown | html | 392 b | unknown |
2924 | 779297.exe | GET | 200 | 172.67.8.141:80 | http://widgets.amung.us/small/00/1.png | unknown | image | 308 b | unknown |
3872 | budha.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7520324cc12e51a8 | unknown | compressed | 4.66 Kb | unknown |
3872 | budha.exe | GET | 200 | 23.53.40.154:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPfsP04QnEetkZKto7%2FcXU3hA%3D%3D | unknown | binary | 503 b | unknown |
3872 | budha.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0fea42b38746ad67 | unknown | compressed | 65.2 Kb | unknown |
— | — | GET | 404 | 45.56.79.23:80 | http://www.buscaid.com/?adn | unknown | text | 3 b | unknown |
— | — | GET | 404 | 45.56.79.23:80 | http://www.buscaid.com/?adn | unknown | text | 3 b | unknown |
— | — | GET | 404 | 45.56.79.23:80 | http://www.buscaid.com/?adn | unknown | text | 3 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3140 | ZaccMoMY.exe | 142.250.186.46:80 | — | GOOGLE | US | whitelisted |
3784 | 127277c0097cef5ce18f0002a2456f84.exe | 34.41.229.245:80 | pywolwnvd.biz | GOOGLE-CLOUD-PLATFORM | US | unknown |
1276 | SkQQcsYU.exe | 142.250.186.46:80 | — | GOOGLE | US | whitelisted |
2924 | 779297.exe | 104.22.74.171:80 | whos.amung.us | CLOUDFLARENET | — | unknown |
2924 | 779297.exe | 172.67.8.141:80 | whos.amung.us | CLOUDFLARENET | US | unknown |
3872 | budha.exe | 68.178.149.80:443 | gbcno.com | GO-DADDY-COM-LLC | IN | unknown |
Domain | IP | Reputation |
|---|---|---|
ad.much8.com |
| unknown |
pywolwnvd.biz |
| unknown |
c4ba3647.ns1.dnsdynnet.com |
| unknown |
whos.amung.us |
| whitelisted |
widgets.amung.us |
| whitelisted |
agileprepcourse.com |
| unknown |
gbcno.com |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
3140 | ZaccMoMY.exe | A Network Trojan was detected | ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check |
1276 | SkQQcsYU.exe | A Network Trojan was detected | ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check |
1276 | SkQQcsYU.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) |
2924 | 779297.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
2924 | 779297.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
1556 | s5534.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |
1556 | s5534.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |
1080 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
3784 | 127277c0097cef5ce18f0002a2456f84.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |