File name:

New folder.rar

Full analysis: https://app.any.run/tasks/c9e4751c-303f-4398-9d2b-99983980992f
Verdict: Malicious activity
Analysis date: August 22, 2024, 10:19:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E55306F05EA1BCF2B1B6E53EF900729F

SHA1:

9113F7633E25DC3E40DFD826C6836B04389DE204

SHA256:

6D0517D589F200CF38DA68BBB13BB5868EB20DA14359001FE967F66854535BA9

SSDEEP:

12288:1hjKmMimg9L6QHn6F6ZBBHOgpw/JGQFor0N2bm/nBFLAzevM:1hOmMdgZni6ZBBHOgpCJGWe82bmfzgeU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • DWRCS.EXE (PID: 6804)
      • DWRCS.EXE (PID: 6940)
      • DWRCS.EXE (PID: 1640)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 6656)
    • There is functionality for taking screenshot (YARA)

      • DWRCS.EXE (PID: 6804)
      • DWRCS.EXE (PID: 6940)
      • DWRCS.EXE (PID: 1640)
  • INFO

    • Failed to create an executable file in Windows directory

      • DWRCS.EXE (PID: 6804)
      • DWRCS.EXE (PID: 6940)
      • DWRCS.EXE (PID: 1640)
    • Creates files or folders in the user directory

      • DWRCS.EXE (PID: 6804)
    • Reads the computer name

      • DWRCS.EXE (PID: 6804)
      • DWRCST.EXE (PID: 6880)
      • DWRCS.EXE (PID: 6940)
      • DWRCST.EXE (PID: 448)
      • DWRCST.EXE (PID: 5700)
      • DWRCS.EXE (PID: 1640)
      • DWRCST.EXE (PID: 6392)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6656)
    • Manual execution by a user

      • DWRCS.EXE (PID: 6804)
      • notepad++.exe (PID: 6196)
      • DWRCS.EXE (PID: 6940)
      • DWRCST.EXE (PID: 5700)
      • DWRCS.EXE (PID: 1640)
      • notepad++.exe (PID: 5128)
      • DWRCW64.exe (PID: 7020)
      • notepad++.exe (PID: 1944)
    • Checks supported languages

      • DWRCS.EXE (PID: 6804)
      • DWRCST.EXE (PID: 6880)
      • DWRCS.EXE (PID: 6940)
      • DWRCST.EXE (PID: 448)
      • DWRCW64.exe (PID: 7020)
      • DWRCS.EXE (PID: 1640)
      • DWRCST.EXE (PID: 6392)
      • DWRCST.EXE (PID: 5700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
14
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs THREAT dwrcs.exe dwrcst.exe no specs notepad++.exe THREAT dwrcs.exe dwrcst.exe no specs notepad++.exe dwrcw64.exe no specs conhost.exe no specs dwrcst.exe no specs THREAT dwrcs.exe dwrcst.exe no specs notepad++.exe

Process information

PID
CMD
Path
Indicators
Parent process
448 6129C:\Users\admin\Desktop\New folder\DWRCST.EXEDWRCS.EXE
User:
admin
Company:
DameWare Development
Integrity Level:
MEDIUM
Description:
DameWare Mini Remote Control User Interface
Exit code:
4294967240
Version:
6, 9, 0, 0
Modules
Images
c:\users\admin\desktop\new folder\dwrcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1640"C:\Users\admin\Desktop\New folder\DWRCS.EXE" C:\Users\admin\Desktop\New folder\DWRCS.EXE
explorer.exe
User:
admin
Company:
DameWare Development LLC
Integrity Level:
MEDIUM
Description:
DameWare Mini Remote Client Agent
Version:
6, 9, 0, 0
Modules
Images
c:\users\admin\desktop\new folder\dwrcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1944"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\New folder\DWRCS.INI"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeDWRCW64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5128"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\New folder\DWRCS.INI"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5700"C:\Users\admin\Desktop\New folder\DWRCST.EXE" C:\Users\admin\Desktop\New folder\DWRCST.EXEexplorer.exe
User:
admin
Company:
DameWare Development
Integrity Level:
MEDIUM
Description:
DameWare Mini Remote Control User Interface
Version:
6, 9, 0, 0
Modules
Images
c:\users\admin\desktop\new folder\dwrcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6196"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\New folder\DWRCS.INI"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6392 6129C:\Users\admin\Desktop\New folder\DWRCST.EXEDWRCS.EXE
User:
admin
Company:
DameWare Development
Integrity Level:
MEDIUM
Description:
DameWare Mini Remote Control User Interface
Exit code:
4294967240
Version:
6, 9, 0, 0
Modules
Images
c:\users\admin\desktop\new folder\dwrcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6432C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6656"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\New folder.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
8 578
Read events
8 550
Write events
26
Delete events
2

Modification events

(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\New folder.rar
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(6656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
5
Suspicious files
0
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
6196notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\stylers.xmlxml
MD5:312281C4126FA897EF21A7E8CCB8D495
SHA256:53B4BE3ED1CFD712E53542B30CFE30C5DB35CC48BE7C57727DFEC26C9E882E90
6196notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\config.xmlxml
MD5:A2ED875AA42589077C4D08F4F8912018
SHA256:77B0174D655F327C1FC9520B4F8831ECD82E98351B26BB9C2EDD98FF0CD63A2D
6804DWRCS.EXEC:\Users\admin\AppData\Local\VirtualStore\Windows\SysWOW64\DWRCS.initext
MD5:171751B77BAF9C6B3DC1B3504D8CEE9A
SHA256:67CC27BF148B75F126CEFBDA43A460C46F469BB7A3ED2571CD2CD7A5F050B8B0
6656WinRAR.exeC:\Users\admin\Desktop\New folder\DWRCST.EXEexecutable
MD5:6F4A630434695EFE2E1605E26486C14D
SHA256:C44AEF3C05F5579143E977CD195B73796E53B53A8EFAB3E491C47CF219AE078B
6196notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\session.xmltext
MD5:1D3B3B37A40B9D34B5619563616046AA
SHA256:691ECC4707217B81524047BB43FB687320AE5D4F4799154DB03FCD18C7C6B4D8
6656WinRAR.exeC:\Users\admin\Desktop\New folder\DWRCS.INItext
MD5:171751B77BAF9C6B3DC1B3504D8CEE9A
SHA256:67CC27BF148B75F126CEFBDA43A460C46F469BB7A3ED2571CD2CD7A5F050B8B0
6196notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\plugins\config\converter.initext
MD5:F70F579156C93B097E656CABA577A5C9
SHA256:B926498A19CA95DC28964B7336E5847107DD3C0F52C85195C135D9DD6CA402D4
6656WinRAR.exeC:\Users\admin\Desktop\New folder\DWRCSET.DLLexecutable
MD5:AF38915FDEF1ADBAE212454CE31B34CF
SHA256:A68F70CDAE7B185EB8B2CD644D9899362002A1166959EE53EE89F0254B19CF5B
6656WinRAR.exeC:\Users\admin\Desktop\New folder\DWRCSh64.dllexecutable
MD5:263E6A7A561C293926BC113E542A8C61
SHA256:764AFF110CF0C084E0021786A14BD0C914CCDEA8FBFD43DD2E7AEA4C470AEB31
6196notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\backup\DWRCS.INI@2024-08-22_102050text
MD5:E07AC2D32380AD9652A46A36ABF72741
SHA256:560BFDABCBDCEBA3865F8936BDB8E3632227BD61C87433C10AEA40146F3A0D63
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
31
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6996
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3412
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4592
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2208
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1360
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2208
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3412
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3412
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
  • 52.183.220.149
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: error while getting certificate informations
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll