analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PayPal Software - [Licensed to Julia (@julia_pcret) & Abigor (@Abigor30)].rar

Full analysis: https://app.any.run/tasks/4c98a88e-c31e-4381-a748-f9ed147851f5
Verdict: Malicious activity
Analysis date: December 06, 2018, 08:35:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

F5443739B05DEA5665AB259FB1B3AD3B

SHA1:

3786C7E93F802E9D0F97613D03EE6F3C5560D226

SHA256:

3E515765A83C99F0E63237F8F982DCEE15FA1F6BEF4F58CBF9061C42CF6B07A3

SSDEEP:

196608:1tXnmIgTaa+QiGppEzVwV3siXhHWylbizhFSe1iBRE+5OI0MhD:1MI8d9ft3siRHWAeQRl5D5hD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • explorer.exe (PID: 3812)
      • PayPal SoftWare.exe (PID: 3764)
      • PayPal SoftWare.exe (PID: 3724)
      • SeafkoAgent.exe (PID: 4068)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1904)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PayPal SoftWare.exe (PID: 3764)
      • SeafkoAgent.exe (PID: 4068)
      • explorer.exe (PID: 3812)
    • Starts itself from another location

      • SeafkoAgent.exe (PID: 4068)
    • Creates executable files which already exist in Windows

      • SeafkoAgent.exe (PID: 4068)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs searchprotocolhost.exe no specs paypal software.exe paypal software.exe no specs seafkoagent.exe explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
3096"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PayPal Software - [Licensed to Julia (@julia_pcret) & Abigor (@Abigor30)].rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1904"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3764"C:\Users\admin\Desktop\PayPal SoftWare.exe" C:\Users\admin\Desktop\PayPal SoftWare.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\paypal software.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3724"C:\Users\admin\AppData\Local\Temp\PayPal SoftWare.exe" C:\Users\admin\AppData\Local\Temp\PayPal SoftWare.exePayPal SoftWare.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225781
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\paypal software.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
4068"C:\Users\admin\AppData\Local\Temp\SeafkoAgent.exe" C:\Users\admin\AppData\Local\Temp\SeafkoAgent.exe
PayPal SoftWare.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Windows Explorer
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\seafkoagent.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3812"C:\Users\admin\AppData\Local\explorer.exe" C:\Users\admin\AppData\Local\explorer.exe
SeafkoAgent.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 488
Read events
1 470
Write events
18
Delete events
0

Modification events

(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3096) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PayPal Software - [Licensed to Julia (@julia_pcret) & Abigor (@Abigor30)].rar
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1904) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1904) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
9
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.34212\msvcr71.dll
MD5:
SHA256:
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.34212\PayPal SoftWare.exe
MD5:
SHA256:
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.34212\ssleay32.dll
MD5:
SHA256:
3812explorer.exeC:\Users\admin\AppData\Local\CommonData.dllexecutable
MD5:A0728C8159A1DCF30A4722FBDC627539
SHA256:74301172AB2CBF250183BD49127FC4BBF5AD8A87C11161AC5465AA33FFEFF69A
3764PayPal SoftWare.exeC:\Users\admin\AppData\Local\Temp\PayPal SoftWare.exeexecutable
MD5:FAAFBEB06EF7DA90AC83B842538F2246
SHA256:3CA31CCCBBD3CD5B3F3767DA6CFBD498BF49D71C299F5D1E2F9E37699F3DE8B5
4068SeafkoAgent.exeC:\Users\admin\AppData\Local\explorer.exeexecutable
MD5:CE8E8120B521D78FDB8544946F3AFCCA
SHA256:FD55513987E9848F0438884D9B3237AB12495E828A8D740F29953119BC6F9B8F
3812explorer.exeC:\Users\admin\AppData\Local\Newtonsoft.Json.dllexecutable
MD5:83222120C8095B8623FE827FB70FAF6B
SHA256:EFF79DE319CA8941A2E62FB573230D82B79B80958E5A26AB1A4E87193EB13503
3812explorer.exeC:\Users\admin\AppData\Local\AForge.Video.DirectShow.dllexecutable
MD5:17ED442E8485AC3F7DC5B3C089654A61
SHA256:666D44798D94EAFA1ED21AF79E9BC0293FFD96F863AB5D87F78BCEE9EF9FFD6B
3764PayPal SoftWare.exeC:\Users\admin\AppData\Local\Temp\SeafkoAgent.exeexecutable
MD5:CE8E8120B521D78FDB8544946F3AFCCA
SHA256:FD55513987E9848F0438884D9B3237AB12495E828A8D740F29953119BC6F9B8F
3812explorer.exeC:\Users\admin\AppData\Local\sqlite3.dllexecutable
MD5:87F9E5A6318AC1EC5EE05AA94A919D7A
SHA256:7705B87603E0D772E1753441001FCF1AC2643EE41BF14A8177DE2C056628665C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
25
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
3812
explorer.exe
GET
404
172.217.21.238:80
http://clients3.google.com/generate_204
US
xml
345 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3812
explorer.exe
172.217.21.238:80
clients3.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clients3.google.com
  • 172.217.21.238
whitelisted

Threats

No threats detected
No debug info