File name:

ORDER106788.rar

Full analysis: https://app.any.run/tasks/e9a9e116-924d-4411-a454-9a841c51c39d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 31, 2020, 08:40:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
remcos
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

0BAC3D2EB0276331253C1E47CAF19B91

SHA1:

749751CBA2D70797554AD8B69A53F85DC064D757

SHA256:

685401E83DC77515DD629B7446B6D58EB36E8CDDB1981740DF46D102074818C0

SSDEEP:

3072:XLHreRzQdj3CGW0XoQMNzuT/YFjpTvu9vv2MKMYu4rRlnbDUjOgKH5SYooZtv:XL08eluTALu1vNKMY5RlbDbBZpx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Fnthm.exe (PID: 2236)
      • Fnthm.exe (PID: 3052)
      • Fnthm.exe (PID: 2888)
      • vlc.exe (PID: 2528)
      • Fnthm.exe (PID: 2596)
      • vlc.exe (PID: 3564)
      • vlc.exe (PID: 4064)
      • vlc.exe (PID: 3440)
      • vlc.exe (PID: 3356)
      • vlc.exe (PID: 3140)
      • vlc.exe (PID: 1748)
    • Writes to a start menu file

      • Fnthm.exe (PID: 2236)
      • Fnthm.exe (PID: 3052)
      • vlc.exe (PID: 2528)
      • vlc.exe (PID: 3564)
    • Changes the autorun value in the registry

      • Fnthm.exe (PID: 2888)
      • Fnthm.exe (PID: 2596)
      • vlc.exe (PID: 4064)
    • Connects to CnC server

      • vlc.exe (PID: 4064)
    • REMCOS was detected

      • vlc.exe (PID: 4064)
    • Actions looks like stealing of personal data

      • vlc.exe (PID: 3140)
      • vlc.exe (PID: 3440)
    • Uses NirSoft utilities to collect credentials

      • vlc.exe (PID: 3140)
    • Stealing of credential data

      • vlc.exe (PID: 3140)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3176)
      • Fnthm.exe (PID: 2888)
    • Creates files in the user directory

      • Fnthm.exe (PID: 2888)
      • Fnthm.exe (PID: 2236)
      • vlc.exe (PID: 4064)
    • Application launched itself

      • Fnthm.exe (PID: 2236)
      • Fnthm.exe (PID: 3052)
      • vlc.exe (PID: 2528)
      • vlc.exe (PID: 3564)
      • vlc.exe (PID: 4064)
    • Executes scripts

      • Fnthm.exe (PID: 2888)
      • Fnthm.exe (PID: 2596)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 2956)
      • WScript.exe (PID: 3804)
    • Connects to unusual port

      • vlc.exe (PID: 4064)
    • Loads DLL from Mozilla Firefox

      • vlc.exe (PID: 3356)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 3176)
      • Fnthm.exe (PID: 2236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 235844
UncompressedSize: 329728
OperatingSystem: Win32
ModifyDate: 2020:03:31 11:38:03
PackingMethod: Normal
ArchivedFileName: ORDER106788.iso
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
18
Malicious processes
10
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winrar.exe fnthm.exe fnthm.exe fnthm.exe wscript.exe no specs cmd.exe no specs vlc.exe fnthm.exe wscript.exe no specs cmd.exe no specs vlc.exe #REMCOS vlc.exe vlc.exe no specs dxdiag.exe vlc.exe vlc.exe no specs vlc.exe

Process information

PID
CMD
Path
Indicators
Parent process
1748"C:\Users\admin\AppData\Roaming\vlc\vlc.exe"C:\Users\admin\AppData\Roaming\vlc\vlc.exevlc.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
1
Version:
2.1.1.1
Modules
Images
c:\users\admin\appdata\roaming\vlc\vlc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2236"C:\Users\admin\Desktop\Fnthm.exe" C:\Users\admin\Desktop\Fnthm.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
0
Version:
2.1.1.1
Modules
Images
c:\users\admin\desktop\fnthm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2528C:\Users\admin\AppData\Roaming\vlc\vlc.exeC:\Users\admin\AppData\Roaming\vlc\vlc.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
0
Version:
2.1.1.1
Modules
Images
c:\users\admin\appdata\roaming\vlc\vlc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2596"C:\Users\admin\AppData\Local\Temp\Rar$EXa3176.40858\Fnthm.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXa3176.40858\Fnthm.exe
Fnthm.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
0
Version:
2.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3176.40858\fnthm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2860"C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Roaming\vlc\vlc.exe"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2888"C:\Users\admin\Desktop\Fnthm.exe"C:\Users\admin\Desktop\Fnthm.exe
Fnthm.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
0
Version:
2.1.1.1
Modules
Images
c:\users\admin\desktop\fnthm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2952"C:\Windows\System32\dxdiag.exe" /t C:\Users\admin\AppData\Local\Temp\sysinfo.txtC:\Windows\System32\dxdiag.exe
vlc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2956"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\install.vbs" C:\Windows\System32\WScript.exeFnthm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2976"C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Roaming\vlc\vlc.exe"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3052"C:\Users\admin\AppData\Local\Temp\Rar$EXa3176.40858\Fnthm.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3176.40858\Fnthm.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
rFpPG
Exit code:
0
Version:
2.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3176.40858\fnthm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
3 412
Read events
3 212
Write events
184
Delete events
16

Modification events

(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\ORDER106788.rar
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3176) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3176) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
Executable files
2
Suspicious files
8
Text files
2
Unknown types
5

Dropped files

PID
Process
Filename
Type
3176WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3176.38691\Fnthm.exe
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Cab785B.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Tar785C.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Cab78EA.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Tar78EB.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Cab88DA.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Tar88DB.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Cab892A.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Tar892B.tmp
MD5:
SHA256:
2952dxdiag.exeC:\Users\admin\AppData\Local\Temp\Cab893B.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
7
DNS requests
3
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2952
dxdiag.exe
GET
304
23.55.161.162:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.0 Kb
whitelisted
2952
dxdiag.exe
GET
304
23.55.161.162:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.0 Kb
whitelisted
2952
dxdiag.exe
GET
200
23.55.161.162:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2952
dxdiag.exe
23.55.161.162:80
www.download.windowsupdate.com
Akamai International B.V.
US
unknown
4064
vlc.exe
185.244.30.123:5149
kirtasiye.myq-see.com
malicious

DNS requests

Domain
IP
Reputation
kirtasiye.myq-see.com
  • 185.244.30.123
malicious
www.download.windowsupdate.com
  • 23.55.161.162
  • 23.55.161.142
whitelisted

Threats

PID
Process
Class
Message
1052
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query to .myq-see .com DDNS Domain
1052
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query to .myq-see .com DDNS Domain
7 ETPRO signatures available at the full report
No debug info