analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Deluxe Viewbot.rar

Full analysis: https://app.any.run/tasks/6f92ec43-089d-449a-afa2-b9dca6610e60
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: January 23, 2019, 01:11:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
orcus
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

37699B905519F2EDCC1D62A9025DD39F

SHA1:

DDA44FC5F8B428D012AC73F50DDFC8DF99F69485

SHA256:

323681FFD410D21D66D7E192CFB0D02348F9DE23F4D223237DACABCA742FF283

SSDEEP:

24576:c1GZoqKnrFXSZ6S3dx67PmHo3i4aZ+56op:2+cnBiwS3dxIaZ+56K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Deluxe Viewbot.exe (PID: 2856)
      • File.exe (PID: 2552)
      • svhost.exe (PID: 2464)
    • Runs app for hidden code execution

      • Deluxe Viewbot.exe (PID: 2856)
    • Orcus was detected

      • svhost.exe (PID: 2464)
    • Changes the autorun value in the registry

      • reg.exe (PID: 3968)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • cmd.exe (PID: 3284)
      • Deluxe Viewbot.exe (PID: 2856)
    • Starts CMD.EXE for commands execution

      • Deluxe Viewbot.exe (PID: 2856)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3284)
    • Connects to unusual port

      • svhost.exe (PID: 2464)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs deluxe viewbot.exe file.exe no specs notepad.exe no specs cmd.exe reg.exe #ORCUS svhost.exe csc.exe no specs cvtres.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3072"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Deluxe Viewbot.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2856"C:\Users\admin\Desktop\Deluxe Viewbot.exe" C:\Users\admin\Desktop\Deluxe Viewbot.exe
explorer.exe
User:
admin
Company:
Deluxe VB
Integrity Level:
MEDIUM
Description:
Deluxe Viewbot
Exit code:
0
Version:
1.0.0.0
2552"C:\Users\admin\AppData\Local\Temp\File.exe" C:\Users\admin\AppData\Local\Temp\File.exeDeluxe Viewbot.exe
User:
admin
Company:
Deluxe VB
Integrity Level:
MEDIUM
Description:
Deluxe Viewbot
Exit code:
0
Version:
1.0.0.0
2132"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\license.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3284"cmd.exe"C:\Windows\system32\cmd.exe
Deluxe Viewbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3968reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\admin\AppData\Local\Temp\Windows API\hostapi.exe.lnk" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2464"C:\Users\admin\AppData\Local\Temp\svhost.exe"C:\Users\admin\AppData\Local\Temp\svhost.exe
Deluxe Viewbot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
3.5.30729.4926 built by: NetFXw7
3528"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\xwdt_sru.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exesvhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
2808C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES4C0D.tmp" "c:\Users\admin\AppData\Local\Temp\CSC4BFC.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
Total events
737
Read events
719
Write events
18
Delete events
0

Modification events

(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3072) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Deluxe Viewbot.rar
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2856) Deluxe Viewbot.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2856) Deluxe Viewbot.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
5
Suspicious files
0
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3072.40311\Deluxe Viewbot.exe
MD5:
SHA256:
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3072.40311\license.txt
MD5:
SHA256:
3528csc.exeC:\Users\admin\AppData\Local\Temp\CSC4BFC.tmp
MD5:
SHA256:
2808cvtres.exeC:\Users\admin\AppData\Local\Temp\RES4C0D.tmp
MD5:
SHA256:
3528csc.exeC:\Users\admin\AppData\Local\Temp\xwdt_sru.dll
MD5:
SHA256:
3528csc.exeC:\Users\admin\AppData\Local\Temp\xwdt_sru.out
MD5:
SHA256:
3284cmd.exeC:\Users\admin\AppData\Local\Temp\Windowstext
MD5:0E40EA13692676D80C524704BFCF9EA1
SHA256:1171151FECE673B34DB18CD2BAA4DB135D2801FCBEDAEC818A11542A48699723
2856Deluxe Viewbot.exeC:\Users\admin\AppData\Local\Temp\Windows API\hostapi.exe.jpgexecutable
MD5:D16B9E3688F6A2B2A8B66718EAFA9CC1
SHA256:858CF8F8A4678725485C427DCCB3EFC8673CFDB9605EF6F1DCEA144EE77A8638
2856Deluxe Viewbot.exeC:\Users\admin\AppData\Local\Temp\Windows API\hostapi.exe.lnklnk
MD5:BF3B71E42750541034479A7F77805671
SHA256:E4E86951DD5BEC0D27F8A23BE3C605D927F45962E21430CB9196140729CAF3EE
3284cmd.exeC:\Users\admin\AppData\Local\Temp\Windows API\hostapi.exeexecutable
MD5:D16B9E3688F6A2B2A8B66718EAFA9CC1
SHA256:858CF8F8A4678725485C427DCCB3EFC8673CFDB9605EF6F1DCEA144EE77A8638
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2464
svhost.exe
152.44.44.237:10115
distantcheats.pw
Gardner-Webb University
US
malicious

DNS requests

Domain
IP
Reputation
distantcheats.pw
  • 152.44.44.237
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
No debug info