analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Документы 15е апреля.gz

Full analysis: https://app.any.run/tasks/7a6645a5-5d52-4752-9164-635f2009fa69
Verdict: Malicious activity
Analysis date: April 15, 2019, 09:22:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

CA734A85D3B9E6FB19C9074E7A301089

SHA1:

7BFD71CC5BE2736A17B964B9260268751D1FE329

SHA256:

50B8C34F3F7DAEF4333A776B53B0D47220B30BFFB2DC3905A630B87DA582C715

SSDEEP:

6144:CCaoo/AqV3oM6eDB6RB4Nm+2uEO+ffhnkwkwyyU:CCDDqloABCx+9Enf5nk8yj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 3296)
      • explorer.exe (PID: 116)
      • WinRAR.exe (PID: 2516)
      • rundll32.exe (PID: 996)
      • rundll32.exe (PID: 3324)
      • rundll32.exe (PID: 2468)
    • Changes the autorun value in the registry

      • Документы 15е апреля.exe (PID: 1548)
      • Документы 15е апреля.exe (PID: 4012)
      • Документы 15е апреля.exe (PID: 3796)
    • Loads the Task Scheduler COM API

      • rundll32.exe (PID: 3296)
    • Application was dropped or rewritten from another process

      • Документы 15е апреля.exe (PID: 1548)
      • Документы 15е апреля.exe (PID: 4012)
      • Документы 15е апреля.exe (PID: 3796)
    • Changes settings of System certificates

      • rundll32.exe (PID: 996)
  • SUSPICIOUS

    • Creates files in the program directory

      • rundll32.exe (PID: 3296)
    • Uses RUNDLL32.EXE to load library

      • Документы 15е апреля.exe (PID: 1548)
      • Документы 15е апреля.exe (PID: 4012)
      • Документы 15е апреля.exe (PID: 3796)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 3296)
      • Документы 15е апреля.exe (PID: 1548)
      • WinRAR.exe (PID: 2516)
      • Документы 15е апреля.exe (PID: 3796)
      • explorer.exe (PID: 116)
    • Connects to server without host name

      • rundll32.exe (PID: 996)
    • Adds / modifies Windows certificates

      • rundll32.exe (PID: 996)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
9
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start winrar.exe документы 15е апреля.exe rundll32.exe rundll32.exe explorer.exe документы 15е апреля.exe rundll32.exe no specs документы 15е апреля.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2516"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Документы 15е апреля.gz.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1548"C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.18754\Документы 15е апреля.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.18754\Документы 15е апреля.exe
WinRAR.exe
User:
admin
Company:
Корпорация Майкрософт
Integrity Level:
MEDIUM
Description:
Самоизвлечение CAB-файлов Win32
Exit code:
0
Version:
6.00.2900.5512 (xpsp.080413-2105)
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2516.18754\документы 15е апреля.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3296rundll32.exe 467.dll,DllGetClassObject root 000000000000 Post Install program: <None>C:\Windows\system32\rundll32.exe
Документы 15е апреля.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
996rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
116C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
4012"C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.27651\Документы 15е апреля.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2516.27651\Документы 15е апреля.exe
WinRAR.exe
User:
admin
Company:
Корпорация Майкрософт
Integrity Level:
MEDIUM
Description:
Самоизвлечение CAB-файлов Win32
Exit code:
0
Version:
6.00.2900.5512 (xpsp.080413-2105)
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2516.27651\документы 15е апреля.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3324rundll32.exe 467.dll,DllGetClassObject root 000000000000 Post Install program: <None>C:\Windows\system32\rundll32.exeДокументы 15е апреля.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3796"C:\Users\admin\Desktop\Документы 15е апреля.exe" C:\Users\admin\Desktop\Документы 15е апреля.exe
explorer.exe
User:
admin
Company:
Корпорация Майкрософт
Integrity Level:
MEDIUM
Description:
Самоизвлечение CAB-файлов Win32
Exit code:
0
Version:
6.00.2900.5512 (xpsp.080413-2105)
Modules
Images
c:\users\admin\desktop\документы 15е апреля.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2468rundll32.exe 467.dll,DllGetClassObject root 000000000000 Post Install program: <None>C:\Windows\system32\rundll32.exeДокументы 15е апреля.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
1 361
Read events
1 317
Write events
41
Delete events
3

Modification events

(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2516) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Документы 15е апреля.gz.rar
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
(PID) Process:(116) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:MRUList
Value:
a
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2516) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
6
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4012Документы 15е апреля.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\467.dll
MD5:
SHA256:
2516WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2516.28701\Документы 15е апреля.exe
MD5:
SHA256:
3296rundll32.exeC:\ProgramData\2401bf603c90\2702bc633f93.datexecutable
MD5:A33B3C4565CC61ECC2771A0105A8B8B6
SHA256:33CBA9145F53DC22C8F5CEE83C692B671FA088099BB5E592BC4F5A4543A4742E
1548Документы 15е апреля.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\467.dllexecutable
MD5:A33B3C4565CC61ECC2771A0105A8B8B6
SHA256:33CBA9145F53DC22C8F5CEE83C692B671FA088099BB5E592BC4F5A4543A4742E
116explorer.exeC:\Users\admin\Desktop\Документы 15е апреля.exeexecutable
MD5:B4847906E21457D8CF1CC78C819833A9
SHA256:3AEF332D23FE5FF97B5E8DD47EAA2A02F97B8444D5F7DE839543BBD6F70008C8
3796Документы 15е апреля.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\467.dllexecutable
MD5:A33B3C4565CC61ECC2771A0105A8B8B6
SHA256:33CBA9145F53DC22C8F5CEE83C692B671FA088099BB5E592BC4F5A4543A4742E
2516WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2516.27651\Документы 15е апреля.exeexecutable
MD5:B4847906E21457D8CF1CC78C819833A9
SHA256:3AEF332D23FE5FF97B5E8DD47EAA2A02F97B8444D5F7DE839543BBD6F70008C8
2516WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2516.18754\Документы 15е апреля.exeexecutable
MD5:B4847906E21457D8CF1CC78C819833A9
SHA256:3AEF332D23FE5FF97B5E8DD47EAA2A02F97B8444D5F7DE839543BBD6F70008C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
996
rundll32.exe
POST
200
185.203.119.104:80
http://185.203.119.104/index.php
BG
text
9 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
996
rundll32.exe
52.36.204.116:443
namecoin.cyphrs.com
Amazon.com, Inc.
US
unknown
996
rundll32.exe
185.203.119.104:80
BelCloud Hosting Corporation
BG
unknown

DNS requests

Domain
IP
Reputation
namecoin.cyphrs.com
  • 52.36.204.116
unknown

Threats

No threats detected
No debug info