File name:

TSP Dork generator v8.0.rar

Full analysis: https://app.any.run/tasks/3f4036d5-dabd-4ee5-baa7-60ce90189ccf
Verdict: Malicious activity
Analysis date: October 29, 2018, 11:35:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

FD6F4E94278D5A6778B7B2AD491A81B6

SHA1:

E77116C37A43345D1932E045AB0C82F3BC9C69F7

SHA256:

42EA276F57E0C94ACCEEBB3073B5A04F377530BF5C4EFF6C4D65435253C6FFD1

SSDEEP:

3072:ulIjgFtA7AZd36w4CZbwb2jn5+JCEsRfcy5wMcnUPNCd24XA:ulUgvA7AZd36w4YVgCEsu8SnqNk2P

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TSP Dork generator hot edition.exe (PID: 3108)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1688)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 1688)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe tsp dork generator hot edition.exe

Process information

PID
CMD
Path
Indicators
Parent process
1688"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\TSP Dork generator v8.0.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3108"C:\Users\admin\Desktop\TSP Dork generator v8.0\TSP Dork generator hot edition.exe" C:\Users\admin\Desktop\TSP Dork generator v8.0\TSP Dork generator hot edition.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TSP Dork generator hot edition
Exit code:
0
Version:
8.0
Modules
Images
c:\users\admin\desktop\tsp dork generator v8.0\tsp dork generator hot edition.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
490
Read events
449
Write events
41
Delete events
0

Modification events

(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1688) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\TSP Dork generator v8.0.rar
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(1688) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
1
Suspicious files
0
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\pageformats\preset2.txttext
MD5:C8630823238A94802DAC85F7E44161FB
SHA256:3836540F46CEC7DA1593DBDB58F24D5775D1F0C4D67AACDD91ECEBAA41F7F13D
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\keywords\preset1.txttext
MD5:1CAC10EAA2C203DAC5AA4C230BF19FCE
SHA256:6F022B8F33BA04FC4F5421898415406601E3CD1750AEF978B1295429814C5C4B
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\pageformats\preset1.txttext
MD5:2B5731A9F0CE7D2F2A072722CBE79B0E
SHA256:581D58A3C96630D424548CF351407F0BB391C4626FFA688B9B11AB76E9877F1D
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\keywords\preset2.txttext
MD5:3B5F91B1BED803B285B6201E23C1DF93
SHA256:5579FE58E9B7ED2CC17C034DC08DF1CC5996094154F49AEE275B3593C53D5E45
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\domainextentions\preset1.txttext
MD5:67815BB37D3B3D1BF9CD8D247DF71921
SHA256:AB11A70EEF7BA2A8F146864EC8A4E675C0834A71E02087B86815EEF7F3B1F4AD
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\domainextentions\preset4.txttext
MD5:D226F5E0575E845DDB610E0DAB8654AA
SHA256:946666992DBD0B0F4FE9021F312C616AAD550091D1097524B4FF1DF738B64B7E
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\pageformats\preset3.txttext
MD5:87F4C2439DDD025A233BD5AAF3656168
SHA256:516BF2DA52790E61DF36EB8AD74FF5A458D44312E0CCE3D08CA6FD5CD4619835
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\pageformats\preset4.txttext
MD5:6C7FC3EB438D36797CD28BB6FC12D41F
SHA256:61D2085D7FFB226B76A13E885E9FEF6CB3B77B6D1E54943E9FF3282C17526E1C
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\pagetypes\preset1.txttext
MD5:BAB63182B97F9E5678786AECEA52700F
SHA256:F5F82368C882677ED966753CFA4371DE6EF5214CCFC3EBAEE050E3AFDDFFBC5D
1688WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1688.13048\TSP Dork generator v8.0\presets\keywords\preset3.txttext
MD5:FE3B7AD87D2546B67915E710C73AB2E8
SHA256:7258DDB3ADB38169E5A4192A52829963F83C9F9F2311D124D516B3D46CD9937A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3108
TSP Dork generator hot edition.exe
162.125.66.6:443
dl.dropbox.com
Dropbox, Inc.
DE
shared

DNS requests

Domain
IP
Reputation
dl.dropbox.com
  • 162.125.66.6
shared
dl.dropboxusercontent.com
  • 162.125.66.6
shared

Threats

PID
Process
Class
Message
3108
TSP Dork generator hot edition.exe
Misc activity
SUSPICIOUS [PTsecurity] Dropbox SSL Payload Request
3108
TSP Dork generator hot edition.exe
Misc activity
SUSPICIOUS [PTsecurity] Dropbox SSL Payload Request
No debug info