File name:

Proxy Grabber.rar

Full analysis: https://app.any.run/tasks/e6714977-4363-4479-8964-e8ea10713a53
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: November 24, 2018, 09:32:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
imminent
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

7E62643C91652A808019DB2CBA0BB3DD

SHA1:

FFB600F2383C0844B4D4CA0EEE24463AB117A280

SHA256:

62DA710E7D5DE85E72000A1F5DCF48E179A2DC0C8FE269F890999431761AB1E7

SSDEEP:

49152:KggulQ/GJGZtfGBI7MW7bPgCCuESdDv9X9O2HYcaixFRtk5jcynnP0JWGnVSP:DgulQqGZtuBIYW7wkDv9HaWFRtA8FVw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • rundll32.exe (PID: 3840)
      • Proxy Grabber v0.2 By X-SLAYER.exe (PID: 3004)
      • TXT Files MERGE by X-SLAYER.exe (PID: 2896)
      • Proxy Grabber v0.2 By X-SLAYER.exe (PID: 712)
      • rundll32.exe (PID: 1288)
    • Detected Imminent RAT

      • rundll32.exe (PID: 1288)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 1288)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3552)
      • Proxy Grabber v0.2 By X-SLAYER.exe (PID: 3004)
      • rundll32.exe (PID: 1288)
    • Starts itself from another location

      • Proxy Grabber v0.2 By X-SLAYER.exe (PID: 3004)
    • Creates files in the user directory

      • Proxy Grabber v0.2 By X-SLAYER.exe (PID: 3004)
      • rundll32.exe (PID: 1288)
    • Application launched itself

      • rundll32.exe (PID: 3840)
    • Creates executable files which already exist in Windows

      • rundll32.exe (PID: 1288)
    • Connects to unusual port

      • rundll32.exe (PID: 1288)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 770348
UncompressedSize: 1825280
OperatingSystem: Win32
ModifyDate: 2018:11:24 07:18:24
PackingMethod: Normal
ArchivedFileName: Proxy Grabber\Proxy Grabber v0.2 By X-SLAYER.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe txt files merge by x-slayer.exe proxy grabber v0.2 by x-slayer.exe proxy grabber v0.2 by x-slayer.exe no specs rundll32.exe no specs #IMMINENT rundll32.exe wmiapsrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
712"C:\Users\admin\AppData\Local\Temp\Proxy Grabber v0.2 By X-SLAYER.exe" C:\Users\admin\AppData\Local\Temp\Proxy Grabber v0.2 By X-SLAYER.exeProxy Grabber v0.2 By X-SLAYER.exe
User:
admin
Integrity Level:
HIGH
Description:
Proxy Grabber v0.1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\proxy grabber v0.2 by x-slayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1288"C:\Users\admin\AppData\Roaming\temp\rundll32.exe"C:\Users\admin\AppData\Roaming\temp\rundll32.exe
rundll32.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\temp\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2896"C:\Users\admin\Desktop\Proxy Grabber\TXT Files MERGE by X-SLAYER.exe" C:\Users\admin\Desktop\Proxy Grabber\TXT Files MERGE by X-SLAYER.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
MERGE
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\proxy grabber\txt files merge by x-slayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3004"C:\Users\admin\Desktop\Proxy Grabber\Proxy Grabber v0.2 By X-SLAYER.exe" C:\Users\admin\Desktop\Proxy Grabber\Proxy Grabber v0.2 By X-SLAYER.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\proxy grabber\proxy grabber v0.2 by x-slayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3216C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3552"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Proxy Grabber.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3840"C:\Users\admin\AppData\Roaming\temp\rundll32.exe"C:\Users\admin\AppData\Roaming\temp\rundll32.exeProxy Grabber v0.2 By X-SLAYER.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\temp\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
1 036
Read events
827
Write events
209
Delete events
0

Modification events

(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3552) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Proxy Grabber.rar
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
5
Suspicious files
9
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3004Proxy Grabber v0.2 By X-SLAYER.exeC:\Users\admin\AppData\Roaming\temp\rundll32.exe:ZoneIdentifier
MD5:
SHA256:
3552WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3552.166\Proxy Grabber\TXT Files MERGE by X-SLAYER.exeexecutable
MD5:
SHA256:
1288rundll32.exeC:\Users\admin\AppData\Roaming\Imminent\Path.datbinary
MD5:
SHA256:
3004Proxy Grabber v0.2 By X-SLAYER.exeC:\Users\admin\AppData\Roaming\temp\rundll32.exeexecutable
MD5:
SHA256:
3552WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3552.166\Proxy Grabber\Proxy Grabber v0.2 By X-SLAYER.exeexecutable
MD5:
SHA256:
3004Proxy Grabber v0.2 By X-SLAYER.exeC:\Users\admin\AppData\Local\Temp\Proxy Grabber v0.2 By X-SLAYER.exeexecutable
MD5:
SHA256:
1288rundll32.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\network.datbinary
MD5:
SHA256:
1288rundll32.exeC:\Users\admin\AppData\Roaming\Windows\svchost.exeexecutable
MD5:
SHA256:
1288rundll32.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\system.datbinary
MD5:
SHA256:
1288rundll32.exeC:\Users\admin\AppData\Roaming\Imminent\Logs\24-11-2018text
MD5:33BE604F8044D5984E8E3E3B694D710A
SHA256:3F785F1CC535B0987139623200C7910B2B28F92DFE3309E8E071C091D0CE7313
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
2
Threats
36

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1288
rundll32.exe
92.222.72.160:8082
playhardgopro.life
OVH SAS
FR
malicious

DNS requests

Domain
IP
Reputation
playhardgopro.life
  • 92.222.72.160
malicious

Threats

PID
Process
Class
Message
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
1288
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Imminent Monitor RAT (outbound)
30 ETPRO signatures available at the full report
No debug info