File name:

Project Genocide (V5.1).rar

Full analysis: https://app.any.run/tasks/8c7c6976-980a-4585-ac11-18bc82468b33
Verdict: Malicious activity
Analysis date: November 28, 2020, 12:23:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

3215B14DDB5C374B11B9563377C046FD

SHA1:

B6F77B063644967778DB5E214623B0FFFB237F7C

SHA256:

51779628BDD48BF85655AFD67B3BB8B17B246CC923BAE9E9732753B86756680C

SSDEEP:

196608:BSXlfFu9c68YD0OEXrHw8l+nQcfR4DKJXhyww8c/UXn/Mh6ep6MpTlSNUi2PUPj7:BWlWZZCHUQuJQMXK6eJSL2Yf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3352)
      • explorer.exe (PID: 356)
      • Project Genocide.exe (PID: 3608)
    • Application was dropped or rewritten from another process

      • Project Genocide.exe (PID: 3608)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2832)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2832)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2832)
    • Checks for external IP

      • Project Genocide.exe (PID: 3608)
    • Creates files in the user directory

      • explorer.exe (PID: 356)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs explorer.exe no specs project genocide.exe notepad.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
356C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
2340"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Project Genocide (V5.1)\42134.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2544"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Project Genocide (V5.1)\DBs\OUI.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2832"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Project Genocide (V5.1).rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3352"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3608"C:\Users\admin\Desktop\Project Genocide (V5.1)\Project Genocide.exe" C:\Users\admin\Desktop\Project Genocide (V5.1)\Project Genocide.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
KiekoTool
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\project genocide (v5.1)\project genocide.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
3 428
Read events
3 104
Write events
324
Delete events
0

Modification events

(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2832) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Project Genocide (V5.1).rar
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2832) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(356) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
(PID) Process:(356) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:MRUList
Value:
a
Executable files
13
Suspicious files
1
Text files
7
Unknown types
8

Dropped files

PID
Process
Filename
Type
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\!MUST INSTALL\MUST INSTALL to use Sniffer\Install If Exodius Sniffer wont open.rar
MD5:
SHA256:
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\paping.exeexecutable
MD5:AA32A25FA1FA895F7AB709B88349C933
SHA256:A54EAA578AF16919B4A582C687DA350038DB018A9748F9A0EE3C4A5C01AF9BD2
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\DBs\ports.txthtml
MD5:9F93D65F2B9EEF7BF579EBAD1794823C
SHA256:049655CE1572A2B17B3445C4092C83ADD299841B944794EAA48ED591E4D1AF2B
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\ManagedWifi.dllexecutable
MD5:E05F0BC5B6CFBCCDB29F22F2A4B57DE9
SHA256:1F34E970ACB3AE1D7F84B20A2A64C7B8B5F23821DA74370CFB62CFBD99C8EE13
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\database.dattext
MD5:C204FD133C3C496D7270A54A5B3E8D89
SHA256:CF0D342926D25DA2595C49FD34608647032D6E620B39B4005F0CFDC23708FCBF
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\LoginTheme.dllexecutable
MD5:78C847DA2E3C7FD889E24F4756CACFA7
SHA256:1AF039906D73069B2A2D5F09552EB5807FB16121414EFD0989040578806D6609
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\MetroFramework.dllexecutable
MD5:463D3B29B398E0240B5309A0E05BA3E0
SHA256:5B1074FC3110E41D9FA5DB4F32A67C6B19693C66B35E84200AEAB3F746E49085
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\MetroSuite 2.0.dllexecutable
MD5:0D30A398CEC0FF006B6EA2B52D11E744
SHA256:8604BF2A1FE2E94DC1EA1FBD0CF54E77303493B93994DF48479DC683580AA654
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\PcapDotNet.Base.dllexecutable
MD5:6F2E6B9046E7ED3CE43A34A7B701FBF9
SHA256:39D850B2412D78580EA842730BB56F59474A8DE4C2D9218D7593CD5B96AC9BAF
2832WinRAR.exeC:\Users\admin\Desktop\Project Genocide (V5.1)\Newtonsoft.Json.dllexecutable
MD5:6815034209687816D8CF401877EC8133
SHA256:7F912B28A07C226E0BE3ACFB2F57F050538ABA0100FA1F0BF2C39F1A1F1DA814
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
5
DNS requests
7
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3608
Project Genocide.exe
GET
200
172.67.68.191:80
http://free.ipwhois.io/json/
US
text
788 b
suspicious
3608
Project Genocide.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/
unknown
text
205 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3608
Project Genocide.exe
104.23.98.190:443
pastebin.com
Cloudflare Inc
US
malicious
3608
Project Genocide.exe
54.243.161.145:443
api.ipify.org
Amazon.com, Inc.
US
suspicious
3608
Project Genocide.exe
172.67.68.191:80
free.ipwhois.io
US
suspicious
3608
Project Genocide.exe
208.95.112.1:80
ip-api.com
IBURST
malicious
3608
Project Genocide.exe
104.23.99.190:443
pastebin.com
Cloudflare Inc
US
malicious

DNS requests

Domain
IP
Reputation
pastebin.com
  • 104.23.98.190
  • 104.23.99.190
malicious
api.ipify.org
  • 54.243.161.145
  • 23.21.126.66
  • 54.204.14.42
  • 54.225.220.115
  • 54.235.182.194
  • 23.21.252.4
  • 54.235.142.93
  • 174.129.214.20
shared
free.ipwhois.io
  • 172.67.68.191
  • 104.26.13.219
  • 104.26.12.219
suspicious
ip-api.com
  • 208.95.112.1
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3608
Project Genocide.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3608
Project Genocide.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
3608
Project Genocide.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup - free .ipwhois .io
3608
Project Genocide.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3608
Project Genocide.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
1 ETPRO signatures available at the full report
No debug info