| File name: | 3.rar |
| Full analysis: | https://app.any.run/tasks/3de40d48-bcba-43e0-b499-93db36031e42 |
| Verdict: | Malicious activity |
| Analysis date: | December 02, 2023, 21:08:40 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 3C2D3ACCA0A6F4AA1DBDDB3F9F56672D |
| SHA1: | 78D668626AE46490976AA9A806C6FF13E8AA7D17 |
| SHA256: | 125C4B80F91917F505CFECE73AE6F73B1300CF0A0C11B455BDC078B091C5CD1A |
| SSDEEP: | 98304:ZYFGwzKocBggxk0MZwwkZVt++gsBlBP5FZ0k/pLU3bgLMmGAfYP0sp2KE/1pkOVW:6Xx2uQScYgwscEuxDAfnh4Whc |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "C:\Users\admin\AppData\Local\Temp\67B2.tmp" | C:\Users\admin\AppData\Local\Temp\67B2.tmp | — | 66D7.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 124 | "C:\Users\admin\AppData\Local\Temp\CED8.tmp" | C:\Users\admin\AppData\Local\Temp\CED8.tmp | — | CE8A.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 124 | "C:\Users\admin\AppData\Local\Temp\E473.tmp" | C:\Users\admin\AppData\Local\Temp\E473.tmp | — | E3E7.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 128 | "C:\Users\admin\AppData\Local\Temp\D958.tmp" | C:\Users\admin\AppData\Local\Temp\D958.tmp | — | D919.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\EAEC.tmp" | C:\Users\admin\AppData\Local\Temp\EAEC.tmp | — | EAAD.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 284 | "C:\Users\admin\AppData\Local\Temp\16D3.tmp" | C:\Users\admin\AppData\Local\Temp\16D3.tmp | — | 1656.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 292 | "C:\Users\admin\AppData\Local\Temp\D679.tmp" | C:\Users\admin\AppData\Local\Temp\D679.tmp | — | D62B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 296 | "C:\Users\admin\AppData\Local\Temp\CE8A.tmp" | C:\Users\admin\AppData\Local\Temp\CE8A.tmp | — | CE2C.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 296 | "C:\Users\admin\AppData\Local\Temp\E3E7.tmp" | C:\Users\admin\AppData\Local\Temp\E3E7.tmp | — | E3A8.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 300 | "C:\Users\admin\AppData\Local\Temp\79C3.tmp" | C:\Users\admin\AppData\Local\Temp\79C3.tmp | — | 7965.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2332) b7732333c67d9155ebe9c3a11f966143.exe | Key: | HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process |
| Operation: | write | Name: | LO |
Value: 1 | |||
| (PID) Process: | (1152) a8b8df17c34f05be56406fcde37666eb.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\4b543325cf0e11dee26d58cc1ac38cf5.exe | executable | |
MD5:4B543325CF0E11DEE26D58CC1AC38CF5 | SHA256:E9EF5889CBC575FABAE55849EEBC9EFE2C14D9532C6CAFB02AAF78CC5DEE3CA0 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\127277c0097cef5ce18f0002a2456f84.exe | executable | |
MD5:127277C0097CEF5CE18F0002A2456F84 | SHA256:E0E43B3AAAACEA4C53B4723C5A9704C7B9C0EA88A45DA58622B0EA85A5A5CDF8 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\545211f79941424f26866b9f00ad361b.exe | executable | |
MD5:545211F79941424F26866B9F00AD361B | SHA256:235A898FFCD14C165495DEC3B265492F17D09527FE55C6B0072B25727C6A2BAB | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\a8b8df17c34f05be56406fcde37666eb.exe | executable | |
MD5:A8B8DF17C34F05BE56406FCDE37666EB | SHA256:587AF8510E8148E03E4B63EE8C80A1E8F9B96ABA3F9FD229E88AFC1B6C6BE358 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\3bd034caf22f9d14a7d984c31f36cb67.exe | executable | |
MD5:3BD034CAF22F9D14A7D984C31F36CB67 | SHA256:017BC03A3F41D807F6A2FB437DEA72E82F27D4EEC077E48D63EA3984CB55DCB8 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\4a184b64b838a4833419c76951f7eda4.exe | executable | |
MD5:4A184B64B838A4833419C76951F7EDA4 | SHA256:0977FAEDBC532514CBBC5DBAF1B077364555378C7094B3BB1A91095C58870775 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\59a943ed50c22f23b6b4342f1e66c8c6.exe | executable | |
MD5:59A943ED50C22F23B6B4342F1E66C8C6 | SHA256:5F69663DDD3C274B74A7DF5E474C9F4933BCBD6A9DE14B8A1F09916031DFA64F | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\8191224f863e0d5287aafa7a08cdcdb3.exe | executable | |
MD5:8191224F863E0D5287AAFA7A08CDCDB3 | SHA256:512E198C86A1DF61FF512EFDD25106A557B9A3EB0DA264F9BC247C487F6678E1 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\33fe4259a21b93c20ef6a920b6311b8f.exe | executable | |
MD5:33FE4259A21B93C20EF6A920B6311B8F | SHA256:3984F62C9C5E3AF60DF7278B321057FCF131B6B30887B4802F4A536277B44589 | |||
| 3060 | WinRAR.exe | C:\Users\admin\Desktop\6699cf459391b430d49cbc80b2722bee.exe | executable | |
MD5:6699CF459391B430D49CBC80B2722BEE | SHA256:6BEFC06A5DDEAF215EDBC2ECC66DE6AF13602BA316A3F724A9E32CAFA2CBAF3A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 404 | 45.56.79.23:80 | http://www.buscaid.com/?adn | unknown | text | 3 b | unknown |
1276 | SkQQcsYU.exe | GET | 302 | 142.250.186.46:80 | http://google.com/ | unknown | html | 392 b | unknown |
3140 | ZaccMoMY.exe | GET | 302 | 142.250.186.46:80 | http://google.com/ | unknown | html | 392 b | unknown |
2924 | 779297.exe | GET | 307 | 104.22.74.171:80 | http://whos.amung.us/swidget/78ejo1rdbrrt | unknown | — | — | unknown |
2924 | 779297.exe | GET | 200 | 172.67.8.141:80 | http://widgets.amung.us/small/00/1.png | unknown | image | 308 b | unknown |
3872 | budha.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7520324cc12e51a8 | unknown | compressed | 4.66 Kb | unknown |
3872 | budha.exe | GET | 200 | 23.53.40.154:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPfsP04QnEetkZKto7%2FcXU3hA%3D%3D | unknown | binary | 503 b | unknown |
3872 | budha.exe | GET | 200 | 23.49.30.152:80 | http://x1.c.lencr.org/ | unknown | binary | 717 b | unknown |
3872 | budha.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0fea42b38746ad67 | unknown | compressed | 65.2 Kb | unknown |
1556 | s5534.exe | GET | 200 | 76.223.26.96:80 | http://8bd8fb.api.socdn.com/installer/52fe2c91-49dc-40b7-b209-1f140a000013/12412046/config | unknown | html | 2.21 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3140 | ZaccMoMY.exe | 142.250.186.46:80 | — | GOOGLE | US | whitelisted |
3784 | 127277c0097cef5ce18f0002a2456f84.exe | 34.41.229.245:80 | pywolwnvd.biz | GOOGLE-CLOUD-PLATFORM | US | unknown |
1276 | SkQQcsYU.exe | 142.250.186.46:80 | — | GOOGLE | US | whitelisted |
2924 | 779297.exe | 104.22.74.171:80 | whos.amung.us | CLOUDFLARENET | — | unknown |
2924 | 779297.exe | 172.67.8.141:80 | whos.amung.us | CLOUDFLARENET | US | unknown |
3872 | budha.exe | 68.178.149.80:443 | gbcno.com | GO-DADDY-COM-LLC | IN | unknown |
Domain | IP | Reputation |
|---|---|---|
ad.much8.com |
| unknown |
pywolwnvd.biz |
| unknown |
c4ba3647.ns1.dnsdynnet.com |
| unknown |
whos.amung.us |
| whitelisted |
widgets.amung.us |
| whitelisted |
agileprepcourse.com |
| unknown |
gbcno.com |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
3140 | ZaccMoMY.exe | A Network Trojan was detected | ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check |
1276 | SkQQcsYU.exe | A Network Trojan was detected | ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check |
1276 | SkQQcsYU.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com) |
2924 | 779297.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
2924 | 779297.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Windows NT Version 5.0 |
1556 | s5534.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |
1556 | s5534.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |
1080 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
3784 | 127277c0097cef5ce18f0002a2456f84.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |