analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar

Full analysis: https://app.any.run/tasks/e14c9291-a549-4c23-876f-c864f4060a1c
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 13:44:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

8C4A748B0179DB4D2FCE7393745ABC53

SHA1:

806EFFFC4155285A1E418F59C171006F43C2D30F

SHA256:

43FC843B3960612E474AD0E9FD6270E4A298BD8820E1470763D0C8C54728CB1D

SSDEEP:

12288:dAbfuNhQ2+5B92dQBWd4JlvQbCEIwmSUktLe3ptHQJs1LJdR+eNr+XmhfKIt62Jr:ybfEO2+Z2dQBWdcvQeTnSUkepFQOR+eh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
      • bns.exe (PID: 3552)
      • bns.exe (PID: 3012)
    • Changes the autorun value in the registry

      • bns.exe (PID: 3012)
    • REMCOS RAT was detected

      • RegSvcs.exe (PID: 2100)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
      • WinRAR.exe (PID: 2700)
    • Drop AutoIt3 executable file

      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
    • Application launched itself

      • bns.exe (PID: 3552)
    • Connects to unusual port

      • RegSvcs.exe (PID: 2100)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 2100)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • bns.exe (PID: 3552)
      • SHIPPING DOCUMENTS 03 21 2019.exe (PID: 3952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe shipping documents 03 21 2019.exe bns.exe no specs bns.exe #REMCOS regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
2700"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3952"C:\Users\admin\AppData\Local\Temp\Rar$EXa2700.39729\SHIPPING DOCUMENTS 03 21 2019.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2700.39729\SHIPPING DOCUMENTS 03 21 2019.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3552"C:\Users\admin\AppData\Local\Temp\14404544\bns.exe" bfm=gse C:\Users\admin\AppData\Local\Temp\14404544\bns.exeSHIPPING DOCUMENTS 03 21 2019.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
3012C:\Users\admin\AppData\Local\Temp\14404544\bns.exe C:\Users\admin\AppData\Local\Temp\14404544\KIUHDC:\Users\admin\AppData\Local\Temp\14404544\bns.exe
bns.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
2100"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
bns.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.6.1055.0 built by: NETFXREL2
Total events
798
Read events
778
Write events
20
Delete events
0

Modification events

(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2700) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\43fc843b3960612e474ad0e9fd6270e4a298bd8820e1470763d0c8c54728cb1d.rar
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\img.icmtext
MD5:74D9419AF41063B37EBDD3EB99D09800
SHA256:8B5186601DC65AE45D9F98AFAAB55395B602D0B6D6DEFE1CB703EDDAF3EDB061
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\rbu.txttext
MD5:6745591DE6B413BE953369CD6700CAB4
SHA256:ACE7D97C6A1DEBB58D449C0960CA3E40CF2F112C2D53B8B357D397C826A6179C
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\pgq.jpgtext
MD5:A84F12CF5A336C79FC63001316ED53DE
SHA256:90E67FDFC457B9B5EFED080A7DAABFEA02F95E7E9577472B61C9B1956D7D57F2
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\bfm=gsetext
MD5:9FA1687903C55105FC9714D917714CC1
SHA256:FB575FDF7965142FF13453C5A6150E28E15F1ECFA10D0217821A13BA49E7F5A6
2700WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2700.39729\SHIPPING DOCUMENTS 03 21 2019.exeexecutable
MD5:3FAA16F7BAD39637D5043164C51C7767
SHA256:BAE50F3A5AB50CC8630900D9195D4867E0E45E9A1953842F67391DF7F9F224F7
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\hnv.icotext
MD5:0E137E9E74420C9213536BB01B622F52
SHA256:86E38CCB549833203A0FDC15F4D6927BEBA40E61BBEDB01B24639C6402A70045
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\ihu.dattext
MD5:A48EE88E587F18CDB87277287F40EAC6
SHA256:81DFA93B883CB66958D005AB73EF16AA9B1A205D1835D3DB46323F5873FCFD57
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\etv.xltext
MD5:1893905C2D2F9B698A2432910B69389E
SHA256:242D5138846520AFDF08BE2355A428D160D1507C0A7AAEE7E4805D255B75DCC5
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\nto.bmptext
MD5:59B08B81EEC61CEF9F585737EA3FE59B
SHA256:07568E6C45A85D742258234C8721CFD929192E30C799209E33650DB04AAC3BCA
3952SHIPPING DOCUMENTS 03 21 2019.exeC:\Users\admin\AppData\Local\Temp\14404544\phi.ppttext
MD5:74C6017131ED4EC8AE8EF112436608A9
SHA256:5506A805B498DC9680B4A4025184153AA1505E02DAFBEA718A7ADBB4793C15D5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
6
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2100
RegSvcs.exe
91.192.100.4:2404
plus11.duckdns.org
SOFTplus Entwicklungen GmbH
CH
malicious
2100
RegSvcs.exe
105.112.37.181:2404
plus12.duckdns.org
Celtel Nigeria Limited t.a ZAIN
NG
malicious

DNS requests

Domain
IP
Reputation
plus11.duckdns.org
  • 91.192.100.4
malicious
plus12.duckdns.org
  • 105.112.37.181
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info