File name:

43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar

Full analysis: https://app.any.run/tasks/e14c9291-a549-4c23-876f-c864f4060a1c
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 13:44:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

8C4A748B0179DB4D2FCE7393745ABC53

SHA1:

806EFFFC4155285A1E418F59C171006F43C2D30F

SHA256:

43FC843B3960612E474AD0E9FD6270E4A298BD8820E1470763D0C8C54728CB1D

SSDEEP:

12288:dAbfuNhQ2+5B92dQBWd4JlvQbCEIwmSUktLe3ptHQJs1LJdR+eNr+XmhfKIt62Jr:ybfEO2+Z2dQBWdcvQeTnSUkepFQOR+eh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • bns.exe (PID: 3552)
      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
      • bns.exe (PID: 3012)
    • Changes the autorun value in the registry

      • bns.exe (PID: 3012)
    • REMCOS RAT was detected

      • RegSvcs.exe (PID: 2100)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2700)
      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
    • Application launched itself

      • bns.exe (PID: 3552)
    • Drop AutoIt3 executable file

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
    • Connects to unusual port

      • RegSvcs.exe (PID: 2100)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 2100)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
      • bns.exe (PID: 3552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe shipping documents 03 21 2019.exe bns.exe no specs bns.exe #REMCOS regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
2100"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
bns.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2700"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3012C:\Users\admin\AppData\Local\Temp\14404544\bns.exe C:\Users\admin\AppData\Local\Temp\14404544\KIUHDC:\Users\admin\AppData\Local\Temp\14404544\bns.exe
bns.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\14404544\bns.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3552"C:\Users\admin\AppData\Local\Temp\14404544\bns.exe" bfm=gse C:\Users\admin\AppData\Local\Temp\14404544\bns.exeSHIPPING DOCUMENTS 03 21 2019.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\14404544\bns.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3952"C:\Users\admin\AppData\Local\Temp\Rar$EXa2700.39729\SHIPPING DOCUMENTS 03 21 2019.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2700.39729\SHIPPING DOCUMENTS 03 21 2019.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2700.39729\shipping documents 03 21 2019.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
798
Read events
778
Write events
20
Delete events
0

Modification events

(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2700) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\phi.ppttext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\hnv.icotext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\wdu.txttext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\fbo.mp3text
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\afj.mp4text
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\hno.dattext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\etv.xltext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\ina.jpgtext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\nrh.icmtext
MD5:
SHA256:
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\ihu.dattext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
6
Threats
4

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2100
RegSvcs.exe
91.192.100.4:2404
plus11.duckdns.org
SOFTplus Entwicklungen GmbH
CH
malicious
2100
RegSvcs.exe
105.112.37.181:2404
plus12.duckdns.org
Celtel Nigeria Limited t.a ZAIN
NG
malicious

DNS requests

Domain
IP
Reputation
plus11.duckdns.org
  • 91.192.100.4
malicious
plus12.duckdns.org
  • 105.112.37.181
malicious

Threats

PID
Process
Class
Message
1048
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1048
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1048
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1048
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info