File name:

Hoic.rar

Full analysis: https://app.any.run/tasks/4eb4015b-fe70-43c9-9bc1-266729894aaa
Verdict: Malicious activity
Analysis date: March 22, 2024, 10:49:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

BA60FE26A85D5F5B6338D562930AEFF2

SHA1:

499B6643DD5A7F1DD4D57506041C1207E657BCE0

SHA256:

59E0D15FCDF92551A204C7E71776A88F54EA9DF74E2BA2CFB04E7582C04DEC81

SSDEEP:

49152:YQs04R8oXUEgIRnwN/INLZw8NoibprkwSIdwHQa:zSRYfNANLZw8NLbZudh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3500)
  • SUSPICIOUS

    • Connects to the server without a host name

      • hoic2.1.exe (PID: 3996)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3500)
    • Checks supported languages

      • hoic2.1.exe (PID: 3996)
    • Manual execution by a user

      • hoic2.1.exe (PID: 3996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 4091
UncompressedSize: 4040
OperatingSystem: Win32
ModifyDate: 2010:12:09 03:32:12
PackingMethod: Stored
ArchivedFileName: Hoic\buttons2\buttons\4add.png
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe hoic2.1.exe

Process information

PID
CMD
Path
Indicators
Parent process
3500"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Hoic.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3996"C:\Users\admin\Desktop\Hoic\hoic2.1.exe" C:\Users\admin\Desktop\Hoic\hoic2.1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\hoic\hoic2.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
3 805
Read events
3 791
Write events
14
Delete events
0

Modification events

(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3500) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Hoic.rar
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
1
Suspicious files
2
Text files
24
Unknown types
1

Dropped files

PID
Process
Filename
Type
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\add.pngimage
MD5:8ADE13213352F64D34E561D2E0A0F454
SHA256:720EDC5F500B86904DA5161206834EE942D3B60040A856898BD95F61DA53B2DA
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\6266.pngimage
MD5:D899F1C4072365D42DD6EACBDF8D9280
SHA256:239E9707383ED676A3ED85C707F72A7CEA6877056EF688FE6EFE8545210CD013
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\button.pngimage
MD5:3E759A1FDC0A9CB94239284AF36AE651
SHA256:F094C46AAB2663470C88BF883E8B641941DE70FF4D198C56A568D0EF74EEF94F
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\add3.pngimage
MD5:AE39F32971BA9B649E1E817C2CF61E8E
SHA256:A92E7C8347EE769A0A3D69866A7925C79E2AC885D14116DD882223B6D752572A
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\add2.pngimage
MD5:D98F80EDFA546F413106FAC5B1DE9877
SHA256:CEBC482785696D2814F5ADB747BD0D5FA5A172186E1872D4F2253EBB05F43373
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\666.pngimage
MD5:59FF8D3A3539122B35142116A3A8A0AC
SHA256:B40B057BF44E38C0C2B69CB78BE8E95AE40A0A20B2FAC826D5AAF97F931C660C
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\button - Copy.pngimage
MD5:3E759A1FDC0A9CB94239284AF36AE651
SHA256:F094C46AAB2663470C88BF883E8B641941DE70FF4D198C56A568D0EF74EEF94F
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\button4.pngimage
MD5:01DCD72AB51E145129EC54CAE7CBF1E5
SHA256:0CFC00FEE98B9E9560F2BF5EDA15F664FB8AD73343E1FE6E3F99AB3A8CE0DC34
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\button5y.pngimage
MD5:01DCD72AB51E145129EC54CAE7CBF1E5
SHA256:0CFC00FEE98B9E9560F2BF5EDA15F664FB8AD73343E1FE6E3F99AB3A8CE0DC34
3500WinRAR.exeC:\Users\admin\Desktop\Hoic\buttons2\buttons\remove.pngimage
MD5:0EFFF1A2C8D7D86CEE7B9963A7662A20
SHA256:389F835A4174533A078DDA49F9E3130A6317A73DF98090C5E2ECAC2331A31C50
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4 408
TCP/UDP connections
4 429
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
3996
hoic2.1.exe
GET
139.59.115.223:80
http://139.59.115.223/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3996
hoic2.1.exe
139.59.115.223:80
DIGITALOCEAN-ASN
SG
unknown

DNS requests

No data

Threats

No threats detected
No debug info