File name:

Dragon-Crypter-main.zip

Full analysis: https://app.any.run/tasks/e80cdc3d-0195-477a-ba94-e866503f9eb2
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 18, 2021, 18:57:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

5ACE4B67989AAD9296409372950D4817

SHA1:

009E4E93EA7CC2B2E4E052548FA6A72095907667

SHA256:

3677D4B66E362639B6D651A465D1ACC9437A7EC90314356E53D4669F418C9D19

SSDEEP:

12288:KRDH6wi197somS69jVmmWfzec7UoN+3WqAzCU05rRLhWxn0r9439KDBpgWvDyCu:K96ws7GcmOqYZgmHr01Rnr9YwDNbyR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • stub.exe (PID: 2356)
      • stub.exe (PID: 3412)
      • rat.exe (PID: 1260)
      • Dragon Crypter.exe (PID: 3728)
    • Uses Task Scheduler to autorun other applications

      • stub.exe (PID: 3412)
      • rat.exe (PID: 1260)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3064)
      • schtasks.exe (PID: 2348)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 2356)
      • stub.exe (PID: 3412)
      • WinRAR.exe (PID: 1384)
      • rat.exe (PID: 1260)
      • Dragon Crypter.exe (PID: 3728)
    • Checks supported languages

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 2356)
      • stub.exe (PID: 3412)
      • WinRAR.exe (PID: 1384)
      • cmd.exe (PID: 3728)
      • rat.exe (PID: 1260)
      • Dragon Crypter.exe (PID: 3728)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 3412)
      • WinRAR.exe (PID: 1384)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 3412)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 3412)
    • Reads Environment values

      • stub.exe (PID: 2356)
      • stub.exe (PID: 3412)
      • rat.exe (PID: 1260)
    • Application launched itself

      • stub.exe (PID: 2356)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 3728)
    • Starts CMD.EXE for commands execution

      • stub.exe (PID: 3412)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2916)
      • stub.exe (PID: 3412)
    • Manual execution by user

      • stub.exe (PID: 2356)
      • WinRAR.exe (PID: 1384)
      • Dragon Crypter.exe (PID: 3728)
    • Checks supported languages

      • schtasks.exe (PID: 3064)
      • tasklist.exe (PID: 3080)
      • find.exe (PID: 3948)
      • timeout.exe (PID: 1780)
      • schtasks.exe (PID: 2348)
    • Reads the computer name

      • schtasks.exe (PID: 3064)
      • tasklist.exe (PID: 3080)
      • schtasks.exe (PID: 2348)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Dragon-Crypter-main/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2021:12:17 12:45:10
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
12
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe stub.exe no specs stub.exe winrar.exe schtasks.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs rat.exe schtasks.exe no specs dragon crypter.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1260"rat.exe" C:\Users\ToxicEye\rat.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Description:
TelegramRAT
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\toxiceye\rat.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1384"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Dragon Crypter.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1780Timeout /T 1 /NobreakC:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2348"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"C:\Windows\System32\schtasks.exerat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2356"C:\Users\admin\Desktop\stub.exe" C:\Users\admin\Desktop\stub.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
TelegramRAT
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\stub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2916"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Dragon-Crypter-main.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3064"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"C:\Windows\System32\schtasks.exestub.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
3080Tasklist /fi "PID eq 3412" C:\Windows\system32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3412"C:\Users\admin\Desktop\stub.exe" C:\Users\admin\Desktop\stub.exe
stub.exe
User:
admin
Integrity Level:
HIGH
Description:
TelegramRAT
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\stub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3728"C:\Windows\System32\cmd.exe" /C C:\Users\admin\AppData\Local\Temp\tmp62A8.tmp.bat & Del C:\Users\admin\AppData\Local\Temp\tmp62A8.tmp.batC:\Windows\System32\cmd.exestub.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
2 885
Read events
2 805
Write events
80
Delete events
0

Modification events

(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2916) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Dragon-Crypter-main.zip
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2916) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3412stub.exeC:\Users\admin\AppData\Local\Temp\tmp62A8.tmp.battext
MD5:
SHA256:
2916WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2916.901\Dragon-Crypter-main\Dragon Crypter.zipcompressed
MD5:A4E0D5624D7A5436115BA5A5044D0E8E
SHA256:D74E9787FFC5ADB8A1FD5DAA4A63D40F07008F0FEB2CE008E1BD015EFD89FBF7
2916WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2916.901\Dragon-Crypter-main\README.mdtext
MD5:0A2A7A27DD058D8E880995DC280B47CA
SHA256:62DF7CAD6CFF3551FAE11E3122B814A07AEAF5AB711337BFB25B38E3E86B89B8
3412stub.exeC:\Users\ToxicEye\rat.exeexecutable
MD5:3790A8CA28D2349943BE10F2EE8D1520
SHA256:C96B4D0BA354BF4F245146339EB27238D3BB68ADC302BDEE8D895213C55EECFA
2916WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2916.901\Dragon-Crypter-main\stub.exeexecutable
MD5:3790A8CA28D2349943BE10F2EE8D1520
SHA256:C96B4D0BA354BF4F245146339EB27238D3BB68ADC302BDEE8D895213C55EECFA
1384WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1384.2165\Dragon Crypter.exeexecutable
MD5:54E2F48C5E04337CE93B7F3EDD8A4B2B
SHA256:63BB27FD8DCA191AC832312DC08B93A31BEFEC77C5DFC747BA2E40ABEA60D9C1
1384WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1384.2165\Stub.exeexecutable
MD5:3575593C79F70411DC129916489DAE21
SHA256:8AF4B1F28454F02065CDB529E62CBE9BEFE9473A8C1B644FC61EB46B90346C16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
2
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
149.154.167.220:443
api.telegram.org
Telegram Messenger LLP
GB
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
malicious
api.telegram.org
  • 149.154.167.220
shared

Threats

PID
Process
Class
Message
Misc activity
ET INFO Telegram API Domain in DNS Lookup
No debug info