analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Nouveau Archive WinRAR.rar

Full analysis: https://app.any.run/tasks/5e4a59d6-bd9d-4bf9-ac89-09efa350d854
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 24, 2019, 14:09:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
imminent
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

82A9D44192044D8CD854C857B255BC0E

SHA1:

D7F577A94EE23B0CA3AEBB8763C1EF53349112DE

SHA256:

416A09FC8C80277E2A926CB3DE672366CB3B033F6A5447F2880F778ED27E1BD9

SSDEEP:

12288:arwMvlrZojKOfjnthtyUIYXu6ZNxuKRuIRUSWRc2ZzzTjWidKWdk:a8MdZoj9tPyOX3uWKtnGirk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • RegAsm.exe (PID: 2152)
      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 2452)
      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 3736)
    • Connects to CnC server

      • RegAsm.exe (PID: 2152)
    • Writes to a start menu file

      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 3736)
    • Known privilege escalation attack

      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 2452)
    • Detected Imminent RAT

      • RegAsm.exe (PID: 2152)
    • Changes the autorun value in the registry

      • RegAsm.exe (PID: 2152)
    • Changes settings of System certificates

      • RegAsm.exe (PID: 2152)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3532)
      • RegAsm.exe (PID: 2152)
      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 3736)
    • Modifies the open verb of a shell class

      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 2452)
    • Creates files in the user directory

      • scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr (PID: 3736)
      • RegAsm.exe (PID: 2152)
    • Starts application with an unusual extension

      • eventvwr.exe (PID: 2432)
      • WinRAR.exe (PID: 3532)
    • Adds / modifies Windows certificates

      • RegAsm.exe (PID: 2152)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe scann001_swift transfert mt109 afriland first bank.scr no specs eventvwr.exe no specs eventvwr.exe scann001_swift transfert mt109 afriland first bank.scr #IMMINENT regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
3532"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Nouveau Archive WinRAR.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2452"C:\Users\admin\AppData\Local\Temp\Rar$DIb3532.3170\scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr" /SC:\Users\admin\AppData\Local\Temp\Rar$DIb3532.3170\scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scrWinRAR.exe
User:
admin
Company:
Gfxv2_0
Integrity Level:
MEDIUM
Description:
Magnify
Exit code:
0
Version:
281.505.910.143
1900"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exescann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Event Viewer Snapin Launcher
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2432"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exe
scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Event Viewer Snapin Launcher
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3736"C:\Users\admin\AppData\Local\Temp\Rar$DIb3532.3170\scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr" C:\Users\admin\AppData\Local\Temp\Rar$DIb3532.3170\scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr
eventvwr.exe
User:
admin
Company:
Gfxv2_0
Integrity Level:
HIGH
Description:
Magnify
Version:
281.505.910.143
2152"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Assembly Registration Utility
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Total events
668
Read events
576
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3736scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scrC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chglogon.urltext
MD5:7B5348C76625C3C1FF7F71EE9ECE762D
SHA256:F128BAA5C07E3E64B2904D55F4B62D0F4F07742AFAA168202EEDCD4DDA9AE746
3736scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scrC:\Users\admin\AppData\Local\Temp\igfxSDK\chglogon.vbstext
MD5:E30E3E4327A38E49F926F5B81E325927
SHA256:D8C6CC01E8F7B823B84D54526B9B7D82790A21429B233CFAFD5EFFD1BD7F235F
3736scann001_Swift Transfert MT109 AFRILAND FIRST BANK.scrC:\Users\admin\AppData\Local\Temp\igfxSDK\LicenseManagerShellext.exeexecutable
MD5:DE28D3B8DD174C6C630E6371EFF47F06
SHA256:6B151D9EAFFFA62AACB09675AD6AA468A8E739EFD4812E2EBE769EB3C14DF809
3532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3532.3170\scann001_Swift Transfert MT109 AFRILAND FIRST BANK.screxecutable
MD5:7C13FBB9CF8E060F815ACC9F52CFB0F0
SHA256:884A79D66F15E7BBFE8A24BAFBCE9C47282A95C0ADAEEDEB8E06E217F0F450FB
2152RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Geo.datbinary
MD5:6D0C0BC6FCC9C36DB12A6AD870D2D93E
SHA256:9293A79EAC8CD4F314F75D8CDC47CDDE91FE56609CF8F4255F30AC246D438D2D
2152RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Path.datbinary
MD5:7344A83E4C384C9022DBC3FCCF7D7FA9
SHA256:57537C3475475032AE15B01DFFA6666A748F77B8CF2B3F391A98702A219F3FFE
2152RegAsm.exeC:\Users\admin\AppData\Roaming\AppData\UNPUXLauncher.exeexecutable
MD5:278EDBD499374BF73621F8C1F969D894
SHA256:C6999B9F79932C3B4F1C461A69D9DC8DC301D6A155ABC33EFE1B6E9E4A038391
2152RegAsm.exeC:\Users\admin\AppData\Roaming\Imminent\Logs\24-05-2019text
MD5:33BE604F8044D5984E8E3E3B694D710A
SHA256:3F785F1CC535B0987139623200C7910B2B28F92DFE3309E8E071C091D0CE7313
2152RegAsm.exeC:\AppData\UNPUXLauncher.exeexecutable
MD5:278EDBD499374BF73621F8C1F969D894
SHA256:C6999B9F79932C3B4F1C461A69D9DC8DC301D6A155ABC33EFE1B6E9E4A038391
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2152
RegAsm.exe
GET
301
45.55.57.244:80
http://www.iptrackeronline.com/
US
html
240 b
shared
2152
RegAsm.exe
GET
301
45.55.57.244:80
http://www.iptrackeronline.com/
US
html
240 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2152
RegAsm.exe
185.244.31.7:47583
worldcoupe.ddns.net
malicious
2152
RegAsm.exe
45.55.57.244:443
www.iptrackeronline.com
Digital Ocean, Inc.
US
malicious
2152
RegAsm.exe
45.55.57.244:80
www.iptrackeronline.com
Digital Ocean, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
worldcoupe.ddns.net
  • 185.244.31.7
malicious
www.iptrackeronline.com
  • 45.55.57.244
shared

Threats

PID
Process
Class
Message
2152
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
2152
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
2152
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
5 ETPRO signatures available at the full report
No debug info