File name:

DoppelVirus.rar

Full analysis: https://app.any.run/tasks/6f5fd91f-5d87-4af5-8c5f-d65651b2da34
Verdict: Malicious activity
Analysis date: December 05, 2022, 19:58:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

F8046215A13324EDCD05E8638576749E

SHA1:

A1B1D740116899756922AD50AFC384CCCF8AD176

SHA256:

3124B4A081A85FA01FFDB0037E0BF3D1969228B12DDC9CCC939F59A2D9FE947C

SSDEEP:

393216:wvPlvD+Hz+fZGA5sHsFqg95dKGvQS9GtjAkrYnale:wlqTxsFq89vQYSjAkrYale

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 3272)
      • DoppelVirus.exe (PID: 1832)
      • DoppelVirus.exe (PID: 3184)
      • DoppelVirus.exe (PID: 1588)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 2648)
      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 3272)
      • DoppelVirus.exe (PID: 1832)
      • WerFault.exe (PID: 2924)
      • DoppelVirus.exe (PID: 3184)
      • DoppelVirus.exe (PID: 1588)
  • SUSPICIOUS

    • Reads the Internet Settings

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 1832)
      • DoppelVirus.exe (PID: 1588)
  • INFO

    • Checks supported languages

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 3272)
      • DoppelVirus.exe (PID: 1832)
      • DoppelVirus.exe (PID: 3184)
      • DoppelVirus.exe (PID: 1588)
    • Reads the computer name

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 3272)
      • DoppelVirus.exe (PID: 1832)
      • DoppelVirus.exe (PID: 3184)
      • DoppelVirus.exe (PID: 1588)
    • Manual execution by a user

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 3272)
      • DoppelVirus.exe (PID: 1832)
      • NOTEPAD.EXE (PID: 3952)
      • DoppelVirus.exe (PID: 1588)
      • DoppelVirus.exe (PID: 3184)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1636)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 1636)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1636)
    • Reads Environment values

      • DoppelVirus.exe (PID: 3172)
      • DoppelVirus.exe (PID: 2280)
      • DoppelVirus.exe (PID: 1832)
      • DoppelVirus.exe (PID: 1588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
10
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs doppelvirus.exe doppelvirus.exe doppelvirus.exe no specs doppelvirus.exe werfault.exe notepad.exe no specs doppelvirus.exe no specs doppelvirus.exe

Process information

PID
CMD
Path
Indicators
Parent process
1636"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\DoppelVirus.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2648"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3172"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
3762504530
Version:
1.0.7417.41804
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2280"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.7417.41804
Modules
Images
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3272"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.7417.41804
Modules
Images
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1832"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Version:
1.0.7417.41804
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
2924C:\Windows\system32\WerFault.exe -u -p 1832 -s 1140C:\Windows\system32\WerFault.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3952"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\DoppelVirus\READ ME.txtC:\Windows\system32\NOTEPAD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3184"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.7417.41804
Modules
Images
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1588"C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe" C:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Version:
1.0.7417.41804
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\doppelvirus\doppelvirus.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
3 706
Read events
3 656
Write events
50
Delete events
0

Modification events

(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1636) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\DoppelVirus.rar
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1636) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
0
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2924WerFault.exeC:\Users\admin\AppData\Local\Temp\WERBCEA.tmp.hdmp
MD5:
SHA256:
2924WerFault.exeC:\Users\admin\AppData\Local\Temp\WERD390.tmp.mdmp
MD5:
SHA256:
2924WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DoppelVirus.exe_2dd80bc77e54f52a15d31ef57a54f43a3dc084_cab_0a6bd4f4\WERBCEA.tmp.hdmp
MD5:
SHA256:
2924WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DoppelVirus.exe_2dd80bc77e54f52a15d31ef57a54f43a3dc084_cab_0a6bd4f4\WERD390.tmp.mdmp
MD5:
SHA256:
2924WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DoppelVirus.exe_2dd80bc77e54f52a15d31ef57a54f43a3dc084_cab_0a6bd4f4\Report.wer
MD5:
SHA256:
2924WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\DoppelVirus.exe.1832.dmp
MD5:
SHA256:
1636WinRAR.exeC:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exe.configxml
MD5:50400654D9D0665C0553F35839F1FD89
SHA256:D635D56F6D1BD958309253803E5800DBF1059A495D3ABC7A9F33812D33EF0752
2924WerFault.exeC:\Users\admin\AppData\Local\Temp\WERA2A9.tmp.WERInternalMetadata.xmlxml
MD5:0687CC0CDB67DCB2EE47F4626FF1A516
SHA256:2AFA09176CE4EE329A651F54FA4E8B4389C43A1AB5816F369823FF15B30D2B55
1636WinRAR.exeC:\Users\admin\Desktop\DoppelVirus\Newtonsoft.Json.dllexecutable
MD5:8F81C9520104B730C25D90A9DD511148
SHA256:F1F01B3474B92D6E1C3D6ADFAE74EE0EA0EBA6E9935565FE2317686D80A2E886
1636WinRAR.exeC:\Users\admin\Desktop\DoppelVirus\DoppelVirus.exeexecutable
MD5:D219F7D1189912C96BB536E74D0FEB7C
SHA256:AD96874E8772874D652C21C0B66559D82DC0D9A539C2E298539A929838BB654C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
11
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2924
WerFault.exe
104.208.16.93:443
watson.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
suspicious
2280
DoppelVirus.exe
66.203.125.13:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
66.203.125.11:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
1832
DoppelVirus.exe
66.203.125.11:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
1588
DoppelVirus.exe
66.203.125.11:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
2280
DoppelVirus.exe
66.203.125.15:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
2280
DoppelVirus.exe
66.203.125.14:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown

DNS requests

Domain
IP
Reputation
g.api.mega.co.nz
  • 66.203.125.11
  • 66.203.125.13
  • 66.203.125.14
  • 66.203.125.15
  • 66.203.125.12
shared
watson.microsoft.com
  • 104.208.16.93
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info