analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

SLAYER Leecher v0.3.rar

Full analysis: https://app.any.run/tasks/3b44a1fe-32f1-4a02-877e-5812d7d883d9
Verdict: Malicious activity
Analysis date: May 30, 2020, 13:04:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

05E446BED0DD438C6C4A0281B6E2BA5F

SHA1:

48328ACB900A01D0F014BF7472369C3C3C1A97AD

SHA256:

13FC15C1184FF37E87D345A2744D9CA1D75ECAAFB27336012849EC7D609521F7

SSDEEP:

12288:ARx63hpSy7Q7EZE1wNOs7ql6/H2pGKmGthNBd75Nyko5J8l4oew8Zr2uBY1QMa0O:ARx6RpSy07EZGwQs79P6GTGVvlm8G7wQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SLAYER Leecher v0.3.exe (PID: 2556)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3372)
  • SUSPICIOUS

    • Starts Internet Explorer

      • SLAYER Leecher v0.3.exe (PID: 2556)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2384)
    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3548)
  • INFO

    • Manual execution by user

      • SLAYER Leecher v0.3.exe (PID: 2556)
    • Reads settings of System Certificates

      • SLAYER Leecher v0.3.exe (PID: 2556)
      • iexplore.exe (PID: 3032)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3476)
    • Creates files in the user directory

      • iexplore.exe (PID: 3476)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3548)
    • Changes internet zones settings

      • iexplore.exe (PID: 3032)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3032)
      • iexplore.exe (PID: 3476)
    • Application launched itself

      • iexplore.exe (PID: 3032)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3032)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs slayer leecher v0.3.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2384"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SLAYER Leecher v0.3.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3372"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
2556"C:\Users\admin\Desktop\SLAYER Leecher v0.3\SLAYER Leecher v0.3.exe" C:\Users\admin\Desktop\SLAYER Leecher v0.3\SLAYER Leecher v0.3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SLAYER Combo Searcher v 0.4
Version:
0.4
3032"C:\Program Files\Internet Explorer\iexplore.exe" http://exe.io/pdbKe5MC:\Program Files\Internet Explorer\iexplore.exe
SLAYER Leecher v0.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3476"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3032 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3548C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
8 293
Read events
1 853
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
70
Text files
47
Unknown types
39

Dropped files

PID
Process
Filename
Type
3476iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabF28F.tmp
MD5:
SHA256:
3476iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarF290.tmp
MD5:
SHA256:
3476iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\59G5GTIY.txttext
MD5:76F3F5767D052B06C8124FE497C75163
SHA256:2A2F30F51BA1ECC47764CCB53EDA6620FE59F1CB83C94E02BB3DB7CFC843F5E4
3476iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\3U85BWFV.txttext
MD5:1C1389CB0F31111752AC8C4530BA26D7
SHA256:1181F00276450652977E1D78355337B51ABA454BC81CA68E003E8FFBFD570ADC
3476iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_74167E25E5476CCA2A5946AAA61BF9E1der
MD5:1ACA50EC477964C4D861F2701CF66EEA
SHA256:0F11ACD16954DCCA31CFFED26AD2DEB75FF3409E4810EC46DE67F8CBEF4EB2B9
3476iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_74167E25E5476CCA2A5946AAA61BF9E1binary
MD5:10961ECD9204F7C60059BB7030CE78BD
SHA256:A5C93FFAE2EDC15DD79427D8226B0D502EC972152A22B140B14C5F56D12ABCB4
3476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\pdbKe5M[2].htmhtml
MD5:6790655A73DEBCAB03AD0E32EE5069A1
SHA256:F5889EF3D8E2F96940F5320B0038FF2711CFF8A9DC267339B9A1C37E99E4153D
3476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\pdbKe5M[1].htmhtml
MD5:D3DB56D3965A294463C85D4AE60E2DC2
SHA256:4134ABB11D9A378438C5C31F476B22851A6424B932A5420924A5AB9D61EE8CE6
3476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ad-m[1].jstext
MD5:A1156DE59A80948BE7DF7842C5CF334D
SHA256:EE09B944B431B1848ADE62EB078488F9D27EB0C3234BAA0186C1877D17A96B16
2384WinRAR.exeC:\Users\admin\Desktop\SLAYER Leecher v0.3\xNet.dllexecutable
MD5:3DF8D87A482EFAD957D83819ADB3020F
SHA256:2AC175B4D44245EE8E7AEE9CC36DF86925EF903D8516F20A2C51D84E35F23DA4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
68
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3476
iexplore.exe
GET
301
104.26.2.103:80
http://exe.io/pdbKe5M
US
malicious
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
3476
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCDt7vp1xkTBAgAAAAAPr2u
US
der
472 b
whitelisted
GET
304
52.222.168.58:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
3476
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
3476
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3476
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAyO4MkNaokViAQGHuJB%2Ba8%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2556
SLAYER Leecher v0.3.exe
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious
3476
iexplore.exe
172.64.163.34:443
exee.io
Cloudflare Inc
US
shared
3476
iexplore.exe
216.58.210.10:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3476
iexplore.exe
104.26.2.103:80
exe.io
Cloudflare Inc
US
shared
3476
iexplore.exe
104.26.2.103:443
exe.io
Cloudflare Inc
US
shared
3476
iexplore.exe
72.21.91.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3032
iexplore.exe
104.26.2.103:443
exe.io
Cloudflare Inc
US
shared
3476
iexplore.exe
172.255.6.239:443
sayfibhat.club
NL
suspicious
3476
iexplore.exe
52.222.167.94:443
cdn.linearicons.com
Amazon.com, Inc.
US
whitelisted
23.37.43.27:80
s.symcd.com
Akamai Technologies, Inc.
NL
whitelisted

DNS requests

Domain
IP
Reputation
pastebin.com
  • 104.23.99.190
  • 104.23.98.190
shared
exe.io
  • 104.26.2.103
  • 104.26.3.103
malicious
ocsp.digicert.com
  • 72.21.91.29
whitelisted
exee.io
  • 172.64.163.34
  • 172.64.162.34
malicious
fonts.googleapis.com
  • 216.58.210.10
whitelisted
cdn.linearicons.com
  • 52.222.167.94
  • 52.222.167.233
  • 52.222.167.131
  • 52.222.167.62
shared
dc5k8fg5ioc8s.cloudfront.net
  • 52.222.168.166
  • 52.222.168.225
  • 52.222.168.212
  • 52.222.168.84
shared
sayfibhat.club
  • 172.255.6.239
  • 51.68.161.29
  • 51.195.21.157
  • 172.255.6.234
  • 172.255.6.244
  • 172.255.6.249
suspicious
d3c3uihon9kmp.cloudfront.net
  • 52.222.168.88
  • 52.222.168.188
  • 52.222.168.145
  • 52.222.168.89
whitelisted
www.googletagmanager.com
  • 172.217.23.136
whitelisted

Threats

No threats detected
No debug info