analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Desktop.rar

Full analysis: https://app.any.run/tasks/8d0c7a88-9066-40c1-b751-9e6a3248b327
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: October 05, 2022, 03:48:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
redline
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

6A4BA5C4BB02CE87D05F1C966EE40F10

SHA1:

E21F7F52CC10B6322236C176FDC4F841B3A14CE5

SHA256:

1BEDD92DAC7E43F220AB2A66AEF17600463E05BE273EE0C600D40DB067C792CE

SSDEEP:

49152:4Rh3un9ehyl3tRuXqrX4v/kQGmEr6Xv/onzU:4LCt3toX4o/ZGTr6//ozU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3824)
      • RedLine.MainPanel-cracked.exe (PID: 3000)
    • Application was dropped or rewritten from another process

      • RedLine.MainPanel-cracked.exe (PID: 3000)
      • builder.exe (PID: 904)
    • REDLINE detected by memory dumps

      • RedLine.MainPanel-cracked.exe (PID: 3000)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 1300)
      • RedLine.MainPanel-cracked.exe (PID: 3000)
      • builder.exe (PID: 904)
    • Reads the computer name

      • WinRAR.exe (PID: 1300)
      • RedLine.MainPanel-cracked.exe (PID: 3000)
      • builder.exe (PID: 904)
    • Reads Environment values

      • RedLine.MainPanel-cracked.exe (PID: 3000)
  • INFO

    • Manual execution by user

      • RedLine.MainPanel-cracked.exe (PID: 3000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs searchprotocolhost.exe no specs #REDLINE redline.mainpanel-cracked.exe no specs builder.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1300"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Desktop.rar"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
3824"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
3000"C:\Users\admin\Desktop\RedLine.MainPanel-cracked.exe" C:\Users\admin\Desktop\RedLine.MainPanel-cracked.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
RedLinePanel
Exit code:
0
Version:
1.0.0.0
904"C:\Users\admin\Desktop\Libraries\builder.exe" C:\Users\admin\Desktop\Libraries\builder.exeRedLine.MainPanel-cracked.exe
User:
admin
Integrity Level:
MEDIUM
Description:
builder
Version:
1.0.0.0
Total events
2 322
Read events
2 300
Write events
22
Delete events
0

Modification events

(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1300) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Desktop.rar
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1300) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
14
Suspicious files
5
Text files
7
Unknown types
2

Dropped files

PID
Process
Filename
Type
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\Mono.Cecil.Mdb.dllexecutable
MD5:DC80F588F513D998A5DF1CA415EDB700
SHA256:90CFC73BEFD43FC3FD876E23DCC3F5CE6E9D21D396BBB346513302E2215DB8C9
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\README.mdtext
MD5:E2DB1441B03414CCD5627075A7F567CF
SHA256:41DED26595B824BD680E0B2E895A6B1CA3AE6D0D2260653175DCA35A6A56B54A
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\Mono.Cecil.dllexecutable
MD5:7546ACEBC5A5213DEE2A5ED18D7EBC6C
SHA256:7744C9C84C28033BC3606F4DFCE2ADCD6F632E2BE7827893C3E2257100F1CF9E
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\RedLine.MainPanel.exe.configxml
MD5:6EBC9B76090C8C4BF6B65C02503C6CD6
SHA256:EF9352989527D16CF5BE708B0D8E6D384618746A3999230F477CF50F34FF67C9
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\OpenPort.battext
MD5:CF1CC90281E28CEE22DCE7ED013C2678
SHA256:84399F8BCCEFA404E156A5351B1DE75A2D5290B4FDDD1754EFB16401ED7218EF
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\Mono.Cecil.pdbbinary
MD5:C0A69F1B0C50D4F133CD0B278AC2A531
SHA256:A4F79C99D8923BD6C30EFAFA39363C18BABE95F6609BBAD242BCA44342CCC7BB
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\RedLine.MainPanel-cracked.exeexecutable
MD5:BAF102927947289E4D589028620CE291
SHA256:A6D2D1BA6765E5245B0F62E37D9298E20C913C5A33912B98BD65A76FC5AB28AE
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\builder.exeexecutable
MD5:DE6F68CDF350FCE9BE13803D84BE98C4
SHA256:51BBC69942823B84C2A1F0EFDB9D63FB04612B223E86AF8A83B4B307DD15CD24
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\MetroSet UI.dllodttf
MD5:F13DC3CFFEF729D26C4DA102674561CF
SHA256:D490C04E6E89462FD46099D3454985F319F57032176C67403B3B92C86CA58BCB
1300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1300.35853\Libraries\GuiLib.dllexecutable
MD5:EAF9C55793CD26F133708714ED3A5397
SHA256:87CFC70BEC2D2A37BCD5D46F9E6F0051F82E015FF96E8F2BC2D81B85F2632F15
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info