| File name: | Dangerous RAT 2020 Cracked by Unknown Venom.exe |
| Full analysis: | https://app.any.run/tasks/20eb47ad-05ce-47c4-94f2-27b917eaca2a |
| Verdict: | Malicious activity |
| Threats: | Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth. |
| Analysis date: | February 07, 2024, 08:54:25 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 85A3BEE5F0A4D07474804479A2510C69 |
| SHA1: | C8C904A8B2B3FB2CAD156162A26F43461444AF77 |
| SHA256: | 2204AD2477B47B58702C87E8E0AC7BB08B0D2094D6A92B771AE2422EFB6C583F |
| SSDEEP: | 196608:4bugwpWPL7J3mHJxqJzw8mGFDAoLSk3/YLG9GYOfCZ/88x9Nl:Oug2g7J3c7qxhmGa+Sw/OGQjC2ODl |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2015:12:27 06:38:52+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24064 |
| InitializedDataSize: | 120320 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x324f |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 848 | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1028 | "C:\Users\admin\AppData\Local\Temp\Runtime Broker.exe" | C:\Users\admin\AppData\Local\Temp\Runtime Broker.exe | Dangerous RAT 2020 Cracked by Unknown Venom.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1408 | "C:\Users\admin\Desktop\Dangerous RAT 2020 Cracked by Unknown Venom.exe" | C:\Users\admin\Desktop\Dangerous RAT 2020 Cracked by Unknown Venom.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1832 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2248 | -a RandomX -o stratum+tcp://xmrpool.eu:3333 -u 42LWroKkaot7k6VU59vZyz7kxmhQGgWJhfdrEhV5GBkQ1Q6DqNRmoDALTM4PoM5n2JcS4t4wYDXTfWR8oyM8XfQhQxXhvdU -p x -t 2 | C:\Windows\System32\attrib.exe | Helper.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2508 | "C:\Users\admin\AppData\Local\Temp\COM Surrogate.exe" | C:\Users\admin\AppData\Local\Temp\COM Surrogate.exe | Dangerous RAT 2020 Cracked by Unknown Venom.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2536 | C:\Users\admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\admin\AppData\Local\Temp\" | C:\Users\admin\AppData\Local\Temp\CL_Debug_Log.txt | COM Surrogate.exe | ||||||||||||
User: admin Company: Igor Pavlov Integrity Level: HIGH Description: 7-Zip Standalone Console Exit code: 0 Version: 19.00 Modules
| |||||||||||||||
| 2556 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Sound.js" | C:\Windows\System32\wscript.exe | — | Dangerous RAT 2020 Cracked by Unknown Venom.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2560 | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2568 | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Helper.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1408) Dangerous RAT 2020 Cracked by Unknown Venom.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1408) Dangerous RAT 2020 Cracked by Unknown Venom.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1408) Dangerous RAT 2020 Cracked by Unknown Venom.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1408) Dangerous RAT 2020 Cracked by Unknown Venom.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1028) Runtime Broker.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1028) Runtime Broker.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1028) Runtime Broker.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1028) Runtime Broker.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3040) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3040) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\nsk5EBF.tmp | — | |
MD5:— | SHA256:— | |||
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\COM Surrogate.exe | executable | |
MD5:5839FB085C72CFC7015D2EE9C8908DE4 | SHA256:FF78908DFF76001CCBE16D0C52D486BA699621A0299A0AD3DB8655DC31B5C145 | |||
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\Sound.js | text | |
MD5:0BFD65241852C649635C90DD2344867F | SHA256:4B44A962C5F45E87884342C7E7C0DB1B168E3696894FE46D14048E803FEE8C3E | |||
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\Runtime Broker.exe | executable | |
MD5:46C4197009A17F3F4FFDE6463D93945C | SHA256:64B9E7E19DC3F56DB827AF53FFB423F0A0C4AF170EBDC130EF8FFDF9B18840CF | |||
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\VideoUI.js | text | |
MD5:99D3FCB737ED9BB3071A240B995F5C41 | SHA256:8276599D057E7892F4C0C6D70E0FF754469DDD82F71900202CEFF485BB128058 | |||
| 1408 | Dangerous RAT 2020 Cracked by Unknown Venom.exe | C:\Users\admin\AppData\Local\Temp\Camera.exe | executable | |
MD5:A44F1B06D351B36E43AB10FB43922ED4 | SHA256:622FAAF7A1652F3F988312DD024FABCB51DDE490EE2B9A18113EB399C472E61B | |||
| 1028 | Runtime Broker.exe | C:\Users\admin\AppData\Local\Temp\3582-490\Runtime Broker.exe | executable | |
MD5:07553DC3F883BB3EFFBD9E769578C62E | SHA256:6A2DAD1F06D85CDE8E0EF2DDD901B86DBD0F8A2E1E0B70BD0FD0BC0B5987F9B6 | |||
| 1028 | Runtime Broker.exe | C:\MSOCache\All Users\{90140000-006E-0410-0000-0000000FF1CE}-C\dwtrig20.exe | executable | |
MD5:CF6C595D3E5E9667667AF096762FD9C4 | SHA256:593E60CC30AE0789448547195AF77F550387F6648D45847EA244DD0DD7ABF03D | |||
| 1028 | Runtime Broker.exe | C:\MSOCache\All Users\{90140000-003D-0000-0000-0000000FF1CE}-C\setup.exe | executable | |
MD5:566ED4F62FDC96F175AFEDD811FA0370 | SHA256:E17CD94C08FC0E001A49F43A0801CEA4625FB9AEE211B6DFEBEBEC446C21F460 | |||
| 1028 | Runtime Broker.exe | C:\Windows\svchost.com | executable | |
MD5:36FD5E09C417C767A952B4609D73A54B | SHA256:980BAC6C9AFE8EFC9C6FE459A5F77213B0D8524EB00DE82437288EB96138B9A2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3548 | wscript.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 293 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3548 | wscript.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
3548 | wscript.exe | 194.132.123.111:8000 | redlan.linkpc.net | PVDataNet AB | IN | unknown |
3304 | tor.exe | 172.98.193.43:443 | — | DACEN-2 | US | unknown |
3304 | tor.exe | 185.220.101.32:20032 | — | Zwiebelfreunde e.V. | DE | unknown |
3304 | tor.exe | 37.120.174.249:443 | — | netcup GmbH | DE | unknown |
3304 | tor.exe | 85.214.212.219:9010 | — | Strato AG | DE | unknown |
3304 | tor.exe | 179.43.182.16:9001 | — | Private Layer INC | CH | unknown |
Domain | IP | Reputation |
|---|---|---|
ip-api.com |
| shared |
redlan.linkpc.net |
| unknown |
xmrpool.eu |
| unknown |
fee.ssl.xexi.xyz |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3548 | wscript.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
3548 | wscript.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
1080 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to DynDNS Domain (linkpc .net) |
3304 | tor.exe | Misc Attack | ET TOR Known Tor Exit Node Traffic group 43 |
3304 | tor.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 43 |
3304 | tor.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 638 |
3304 | tor.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 794 |
3304 | tor.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 257 |
3304 | tor.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
3304 | tor.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |