File name:

flx7zh.rar

Full analysis: https://app.any.run/tasks/017c7342-aa41-4076-b525-ccda241fe04a
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 23, 2019, 03:31:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

09FDFEC5D7AB5B0D1B7BB1217CB75475

SHA1:

7A35701696A7B08A736B1F446B02A5C45BC28749

SHA256:

24DA9FE3364B1FB79818B781BAB9142E7BD55AF23A66E7361BC8FD9160C4AE60

SSDEEP:

196608:+TuKdz/qpK1ecBWr36pYZqK5dWsO6KLTkb4+uVFGLpHzKdF8vjxo3Vh2e/8A9:WTl/r1JxKSsO6KUUTsLpHzWF8do3b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • mako.exe (PID: 3108)
      • mako.exe (PID: 1860)
    • Loads dropped or rewritten executable

      • mako.exe (PID: 1860)
    • Stealing of credential data

      • mako.exe (PID: 1860)
    • Actions looks like stealing of personal data

      • mako.exe (PID: 1860)
    • Writes to a start menu file

      • mako.exe (PID: 1860)
  • SUSPICIOUS

    • Loads Python modules

      • mako.exe (PID: 1860)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3376)
      • mako.exe (PID: 3108)
      • mako.exe (PID: 1860)
    • Creates files in the user directory

      • mako.exe (PID: 1860)
    • Connects to unusual port

      • mako.exe (PID: 1860)
    • Reads the cookies of Google Chrome

      • mako.exe (PID: 1860)
    • Reads the cookies of Mozilla Firefox

      • mako.exe (PID: 1860)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • mako.exe (PID: 3108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe mako.exe mako.exe wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1860"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe
mako.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3376.32679\mako.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\users\admin\appdata\local\temp\_mei31082\python36.dll
3108"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3376.32679\mako.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\apphelp.dll
3376"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\flx7zh.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3472wmic csproduct get uuidC:\Windows\System32\Wbem\wmic.exemako.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
520
Read events
507
Write events
13
Delete events
0

Modification events

(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\flx7zh.rar
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
36
Suspicious files
1
Text files
17
Unknown types
4

Dropped files

PID
Process
Filename
Type
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_decimal.pydexecutable
MD5:
SHA256:
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\PIL\_webp.cp36-win32.pydexecutable
MD5:
SHA256:
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_cffi_backend.cp36-win32.pydexecutable
MD5:CE66B910E3E42F5AA1B8D943AA1F1A6E
SHA256:85D5389214ECBD128337CEA2AFF02C8497426260F843F5E3322C97A3856C4C20
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\VCRUNTIME140.dllexecutable
MD5:A2523EA6950E248CBDF18C9EA1A844F6
SHA256:6823B98C3E922490A2F97F54862D32193900077E49F0360522B19E06E6DA24B4
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_elementtree.pydexecutable
MD5:
SHA256:
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_distutils_findvs.pydexecutable
MD5:
SHA256:
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\cryptography\hazmat\bindings\_constant_time.cp36-win32.pydexecutable
MD5:
SHA256:
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_socket.pydexecutable
MD5:FAF98549FC9628E0C075DF0AD08BC55C
SHA256:4094DF5353182F0466FCF14846E599BDE35974F0EE5C74FF94AE32211BB79E5B
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_ssl.pydexecutable
MD5:13AE1D7E27FB0A4813C66F59BB819050
SHA256:91FB71EA70A2F2E53634880B552A2A6B279E6C53A29714A2EDDA9F651E73CB39
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_ctypes.pydexecutable
MD5:A16F470D30984E246B3A46C840F58B7F
SHA256:D0A6D8690846DE6645D8874A6F6FE8FDAB5C1CDC612AB45CA2BCF23B7EEF154B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
24
DNS requests
2
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1860
mako.exe
CONNECT
199.21.98.8:80
http://199.21.98.8:80api.telegram.org:443
US
whitelisted
1860
mako.exe
CONNECT
41.216.148.140:32372
http://41.216.148.140:32372api.telegram.org:443
BF
unknown
1860
mako.exe
CONNECT
191.187.33.49:8080
http://191.187.33.49:8080api.telegram.org:443
BR
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281core.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
138.185.156.174:4145
http://138.185.156.174:4145api.telegram.org:443
BR
unknown
1860
mako.exe
GET
200
79.98.145.42:80
http://ip.42.pl/raw
PL
text
13 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1860
mako.exe
79.98.145.42:80
ip.42.pl
Nitronet Sp. z o.o.
PL
suspicious
1860
mako.exe
88.99.195.6:443
api.getproxylist.com
Hetzner Online GmbH
DE
unknown
1860
mako.exe
190.248.17.30:48794
EPM Telecomunicaciones S.A. E.S.P.
CO
unknown
1860
mako.exe
199.21.98.8:80
YANDEX LLC
US
whitelisted
1860
mako.exe
41.216.148.140:32372
IPP-burkina-as
BF
unknown
1860
mako.exe
191.187.33.49:8080
CLARO S.A.
BR
unknown
1860
mako.exe
138.185.156.174:4145
UPNET PROVEDOR DE ACESSO E TELECOM
BR
unknown
1860
mako.exe
109.172.160.93:53281
Magticom Ltd.
GE
unknown
1860
mako.exe
103.12.20.25:9000
PT. Bens Data Solusi
ID
unknown
1860
mako.exe
176.112.110.40:61142
MediaKvant Ltd.
RU
unknown

DNS requests

Domain
IP
Reputation
ip.42.pl
  • 79.98.145.42
suspicious
api.getproxylist.com
  • 88.99.195.6
unknown

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info