| File name: | 435356345.rar |
| Full analysis: | https://app.any.run/tasks/854e35ef-0879-4ac6-8150-9976a6bd62a1 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | December 06, 2018, 09:04:59 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v4, os: Win32 |
| MD5: | 11B0B5AC728DC4CC10E531A8EA539591 |
| SHA1: | 36DCD9A07F48035D97A54D836E305A9C7B3CB1B3 |
| SHA256: | 3BFCE702F4EAB83F186D8C4EC4F0B23E0D5F1221581AFFFAA39EFF40B097A931 |
| SSDEEP: | 6144:aM4FVxqKb7MNc6c0m3BP3UMMveD3gnYLWfkExs9dp+LEmSwkwmQOS:an7gKsaN0If+eLgnYLWfkfp+g9Hw5 |
| .rar | | | RAR compressed archive (v-4.x) (58.3) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (41.6) |
| CompressedSize: | 295143 |
|---|---|
| UncompressedSize: | 401408 |
| OperatingSystem: | Win32 |
| ModifyDate: | 2018:12:02 00:41:25 |
| PackingMethod: | Normal |
| ArchivedFileName: | 435623534.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 360 | nltest /domain_trusts /all_trusts | C:\Windows\system32\nltest.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Logon Server Test Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 556 | "C:\Program Files\FileZilla FTP Client\filezilla.exe" | C:\Program Files\FileZilla FTP Client\filezilla.exe | — | explorer.exe | |||||||||||
User: admin Company: FileZilla Project Integrity Level: MEDIUM Description: FileZilla FTP Client Exit code: 0 Version: 3, 36, 0, 0 Modules
| |||||||||||||||
| 608 | nltest /domain_trusts | C:\Windows\system32\nltest.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Logon Server Test Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 772 | "C:\Program Files\FileZilla FTP Client\filezilla.exe" | C:\Program Files\FileZilla FTP Client\filezilla.exe | — | explorer.exe | |||||||||||
User: admin Company: FileZilla Project Integrity Level: MEDIUM Description: FileZilla FTP Client Exit code: 0 Version: 3, 36, 0, 0 Modules
| |||||||||||||||
| 1076 | ipconfig /all | C:\Windows\system32\ipconfig.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: IP Configuration Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1464 | powershell Set-MpPreference -DisableRealtimeMonitoring $true | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1472 | "C:\Program Files\FileZilla FTP Client\filezilla.exe" | C:\Program Files\FileZilla FTP Client\filezilla.exe | — | explorer.exe | |||||||||||
User: admin Company: FileZilla Project Integrity Level: MEDIUM Description: FileZilla FTP Client Exit code: 0 Version: 3, 36, 0, 0 Modules
| |||||||||||||||
| 1484 | "C:\Program Files\FileZilla FTP Client\filezilla.exe" | C:\Program Files\FileZilla FTP Client\filezilla.exe | — | explorer.exe | |||||||||||
User: admin Company: FileZilla Project Integrity Level: MEDIUM Description: FileZilla FTP Client Exit code: 0 Version: 3, 36, 0, 0 Modules
| |||||||||||||||
| 1728 | C:\Users\admin\AppData\Roaming\NetSf\436723634.exe | C:\Users\admin\AppData\Roaming\NetSf\436723634.exe | taskeng.exe | ||||||||||||
User: SYSTEM Company: VIRIIOz Corp hehehe Integrity Level: SYSTEM Description: Game made in 1999 and Alladvantage thingy made in 2000 Exit code: 0 Version: 1.00 Modules
| |||||||||||||||
| 1808 | "C:\Program Files\FileZilla FTP Client\filezilla.exe" | C:\Program Files\FileZilla FTP Client\filezilla.exe | — | explorer.exe | |||||||||||
User: admin Company: FileZilla Project Integrity Level: MEDIUM Description: FileZilla FTP Client Exit code: 0 Version: 3, 36, 0, 0 Modules
| |||||||||||||||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\435356345.rar | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3452) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3868) 435623534.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender |
| Operation: | write | Name: | DisableAntiSpyware |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2952 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2952.12451\435623534.exe | — | |
MD5:— | SHA256:— | |||
| 3452 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y40GFRE5UXMRKQROR0F5.temp | — | |
MD5:— | SHA256:— | |||
| 3216 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XZ1FHB7MXBTMY252O1KB.temp | — | |
MD5:— | SHA256:— | |||
| 3868 | 435623534.exe | C:\Users\admin\AppData\Local\Temp\~DF39A154B9CD4AFA9F.TMP | — | |
MD5:— | SHA256:— | |||
| 2528 | 435623534.exe | C:\Users\admin\AppData\Local\Temp\~DFC0685C2CB10E79DE.TMP | — | |
MD5:— | SHA256:— | |||
| 1464 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JUCLRYY6CFT19WYKSQGR.temp | — | |
MD5:— | SHA256:— | |||
| 2152 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VFV99X62JUYWRRIEZI1N.temp | — | |
MD5:— | SHA256:— | |||
| 3708 | 436723634.exe | C:\Users\admin\AppData\Local\Temp\~DF9802E51D518DA17A.TMP | — | |
MD5:— | SHA256:— | |||
| 2260 | filezilla.exe | C:\Users\admin\AppData\Roaming\FileZilla\layout.xml~ | — | |
MD5:— | SHA256:— | |||
| 3356 | filezilla.exe | C:\Users\admin\AppData\Roaming\FileZilla\layout.xml~ | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1728 | 436723634.exe | GET | 200 | 216.239.32.21:80 | http://ipinfo.io/ip | US | text | 15 b | shared |
3876 | svchost.exe | POST | 200 | 24.247.181.125:8082 | http://24.247.181.125:8082/lib364/USER-PC_W617601.2EA620F4C057BD914DFE5DE236C051CD/81/ | US | text | 3 b | suspicious |
3772 | 436723634.exe | GET | 200 | 107.23.175.217:80 | http://checkip.amazonaws.com/ | US | text | 15 b | malicious |
3876 | svchost.exe | POST | 200 | 24.247.181.125:8082 | http://24.247.181.125:8082/lib364/USER-PC_W617601.2EA620F4C057BD914DFE5DE236C051CD/81/ | US | text | 3 b | suspicious |
3020 | svchost.exe | GET | 200 | 145.239.25.101:80 | http://145.239.25.101/radiance.png | FR | executable | 377 Kb | suspicious |
3876 | svchost.exe | POST | 200 | 24.247.181.125:8082 | http://24.247.181.125:8082/lib364/USER-PC_W617601.2EA620F4C057BD914DFE5DE236C051CD/81/ | US | text | 3 b | suspicious |
1728 | 436723634.exe | GET | 200 | 205.185.216.10:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | US | compressed | 55.2 Kb | whitelisted |
2984 | svchost.exe | GET | 200 | 145.239.25.101:80 | http://145.239.25.101/table.png | FR | executable | 377 Kb | suspicious |
3072 | svchost.exe | POST | 200 | 24.247.181.125:8082 | http://24.247.181.125:8082/lib364/USER-PC_W617601.2EA620F4C057BD914DFE5DE236C051CD/90 | US | text | 3 b | suspicious |
3876 | svchost.exe | POST | 200 | 24.247.181.125:8082 | http://24.247.181.125:8082/lib364/USER-PC_W617601.2EA620F4C057BD914DFE5DE236C051CD/83/ | US | text | 3 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1728 | 436723634.exe | 198.46.196.109:447 | — | ColoCrossing | US | suspicious |
3876 | svchost.exe | 24.247.181.125:8082 | — | Charter Communications | US | suspicious |
1728 | 436723634.exe | 198.46.160.217:443 | — | ColoCrossing | US | suspicious |
3772 | 436723634.exe | 107.23.175.217:80 | checkip.amazonaws.com | Amazon.com, Inc. | US | shared |
1728 | 436723634.exe | 216.239.32.21:80 | ipinfo.io | Google Inc. | US | whitelisted |
1728 | 436723634.exe | 109.234.38.17:447 | — | Webzilla B.V. | RU | suspicious |
3072 | svchost.exe | 24.247.181.125:8082 | — | Charter Communications | US | suspicious |
2984 | svchost.exe | 145.239.25.101:80 | — | OVH SAS | FR | suspicious |
3020 | svchost.exe | 145.239.25.101:80 | — | OVH SAS | FR | suspicious |
1728 | 436723634.exe | 64.128.175.37:449 | — | Level 3 Communications, Inc. | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
checkip.amazonaws.com |
| malicious |
ipinfo.io |
| shared |
www.download.windowsupdate.com |
| whitelisted |
166.129.187.37.zen.spamhaus.org |
| unknown |
166.129.187.37.b.barracudacentral.org |
| unknown |
166.129.187.37.cbl.abuseat.org |
| unknown |
166.129.187.37.dnsbl-1.uceprotect.net |
| unknown |
166.129.187.37.spam.dnsbl.sorbs.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1728 | 436723634.exe | Potential Corporate Privacy Violation | ET POLICY Possible External IP Lookup ipinfo.io |
1728 | 436723634.exe | Not Suspicious Traffic | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
1728 | 436723634.exe | A Network Trojan was detected | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC) |
1728 | 436723634.exe | Not Suspicious Traffic | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
1728 | 436723634.exe | Not Suspicious Traffic | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
1728 | 436723634.exe | Not Suspicious Traffic | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
3876 | svchost.exe | Potentially Bad Traffic | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
1728 | 436723634.exe | A Network Trojan was detected | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC) |
1728 | 436723634.exe | A Network Trojan was detected | ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC) |
3876 | svchost.exe | Potentially Bad Traffic | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |