File name:

DoxRapist.rar

Full analysis: https://app.any.run/tasks/16b24894-3948-4b34-852e-61e039badd4b
Verdict: Malicious activity
Analysis date: July 13, 2020, 02:18:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

CF34FB5A2B91838EDE42E1C053DBF22B

SHA1:

7A9ADE4F00B502615276CDADFAD02F1762086C2D

SHA256:

6838EBD274C81502325AD44283C1065CB9A76FFFC3731552BBE8EB41A064C29D

SSDEEP:

98304:nNCZr0/D9OC+8ArkNLdgGKLn+pI3oqjHYlfl+ioTOqkp9:UG9SVYdgGKLnGIxHYlflR9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DoxRapist.exe (PID: 2328)
      • DoxRapist.exe (PID: 2544)
    • Changes settings of System certificates

      • DoxRapist.exe (PID: 2544)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2580)
    • Reads Internet Cache Settings

      • DoxRapist.exe (PID: 2544)
    • Reads internet explorer settings

      • DoxRapist.exe (PID: 2544)
    • Creates files in the user directory

      • DoxRapist.exe (PID: 2544)
    • Adds / modifies Windows certificates

      • DoxRapist.exe (PID: 2544)
  • INFO

    • Reads settings of System Certificates

      • DoxRapist.exe (PID: 2544)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe doxrapist.exe no specs doxrapist.exe

Process information

PID
CMD
Path
Indicators
Parent process
2328"C:\Users\admin\AppData\Local\Temp\Rar$EXa2580.5684\DoxRapist.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2580.5684\DoxRapist.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DoxRapist
Exit code:
3221226540
Version:
4.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2580.5684\doxrapist.exe
c:\systemroot\system32\ntdll.dll
2544"C:\Users\admin\AppData\Local\Temp\Rar$EXa2580.5684\DoxRapist.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2580.5684\DoxRapist.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Description:
DoxRapist
Exit code:
0
Version:
4.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2580.5684\doxrapist.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2580"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\DoxRapist.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
1 783
Read events
552
Write events
1 231
Delete events
0

Modification events

(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2580) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2580) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DoxRapist.rar
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2580) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
1
Suspicious files
6
Text files
5
Unknown types
3

Dropped files

PID
Process
Filename
Type
2544DoxRapist.exeC:\Users\admin\AppData\Local\Temp\Cab97FF.tmp
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\Local\Temp\Tar9800.tmp
MD5:
SHA256:
2580WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2580.5684\DoxRapist.exeexecutable
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_21186D07D721C0F54AF48F7972D0ED1Bbinary
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_21186D07D721C0F54AF48F7972D0ED1Bder
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\8Y2NAEZC.txttext
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_E922AD58644B813DAC336E7D2F393E13der
MD5:
SHA256:
2544DoxRapist.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\CRJGE3JP.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
4
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2544
DoxRapist.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2544
DoxRapist.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEDCBDbuX62tRAgAAAABvB68%3D
US
der
471 b
whitelisted
2544
DoxRapist.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQD9bz4kmMJbHQgAAAAAR%2FAz
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2544
DoxRapist.exe
172.217.16.164:443
www.google.com
Google Inc.
US
whitelisted
2544
DoxRapist.exe
145.14.144.119:443
doxrapistdatabase.000webhostapp.com
Hostinger International Limited
US
shared
2544
DoxRapist.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2544
DoxRapist.exe
172.217.21.227:443
www.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
doxrapistdatabase.000webhostapp.com
  • 145.14.144.119
shared
www.google.com
  • 172.217.16.164
malicious
ocsp.pki.goog
  • 172.217.16.131
whitelisted
www.gstatic.com
  • 172.217.21.227
whitelisted

Threats

PID
Process
Class
Message
1040
svchost.exe
Not Suspicious Traffic
ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup)
2544
DoxRapist.exe
Not Suspicious Traffic
ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com)
No debug info