File name:

BoRat Rat.7z

Full analysis: https://app.any.run/tasks/856c8221-06a3-431d-b084-c614b92398c0
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: July 12, 2024, 06:06:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
api-base64
asyncrat
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

320967EA4C3F77C31CF5B8A7C7281DB1

SHA1:

4604180A62E0C5E8DF87B9713213551AEF8F911D

SHA256:

758DA04589FAF3A8AEDEAE4F9E26C90C4A7530F5E8368A368EFE8EF792F167D9

SSDEEP:

98304:tFKpSjCYPyJMSg85p6oVj62iFUCNTeGCYWw9H549XokuXIc9zeBtyMACjnmwWdZm:Mvro8YGfvocaJhGa+I54p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 4780)
    • ASYNCRAT has been detected (YARA)

      • BoratRat_Cracked.exe (PID: 3128)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 4780)
    • The process checks if it is being run in the virtual environment

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates file in the systems drive root

      • BoratRat_Cracked.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • BoratRat_Cracked.exe (PID: 3128)
  • INFO

    • Checks supported languages

      • BoratRat_Cracked.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4780)
    • Reads the computer name

      • BoratRat_Cracked.exe (PID: 3128)
    • Reads the machine GUID from the registry

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates files or folders in the user directory

      • BoratRat_Cracked.exe (PID: 3128)
    • Create files in a temporary directory

      • BoratRat_Cracked.exe (PID: 3128)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • BoratRat_Cracked.exe (PID: 3128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe THREAT boratrat_cracked.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1188C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3128"C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
BoratRat
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4780.24537\boratrat_cracked.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4780"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\BoRat Rat.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
15 672
Read events
15 594
Write events
73
Delete events
5

Modification events

(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\BoRat Rat.7z
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
26
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\ip2region.db
MD5:
SHA256:
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe.configxml
MD5:3E645CCCA1C44A00210924A3B0780955
SHA256:F29E697EFD7C5ECB928C0310EA832325BF6518786C8E1585E1B85CDC8701602F
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Discord.dllexecutable
MD5:7EE673594BBB20F65448AAB05F1361D0
SHA256:8FA7634B7DCA1A451CF8940429BE6AD2440821ED04D5D70B6E727E5968E0B5F6
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Keylogger.exeexecutable
MD5:A45679BDCF30F068032BD37A194FA175
SHA256:16BEB1AE2DE2974CCC2371D9F619F492295E590ABB65D3102E362C8EC27F2BBB
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Fun.dllexecutable
MD5:499FC6AC30B3B342833C79523BE4A60C
SHA256:DCAC599B1BAB37E1A388AC469E6CC5DE1F35EB02BEAA6778F07A1C090CE3EA04
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Netstat.dllexecutable
MD5:12911F5654D6346FE99EF91E90849C13
SHA256:7EED1B90946A6DB1FE978D177A80542B5DB0BF3156C979DC8A8869A94811BF4B
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\FileManager.dllexecutable
MD5:4CCD3DFB14FFDDDFA598D1096F0190EA
SHA256:7F8A306826FCB0EE985A2B6D874C805F7F9B2062A1123EA4BB7F1EBA90FC1B81
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Extra.dllexecutable
MD5:62C231BAFA469AB04F090FCB4475D360
SHA256:6A4F32B0228092CE68E8448C6F4B74B4C654F40FB2D462C1D6BBD4B4EF09053D
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Information.dllexecutable
MD5:87651B12453131DAFD3E91F60D8AEF5A
SHA256:A15D72D990686D06D89D7E11DF2B16BCD5719A40298C19D046FA22C40D56AF44
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Logger.dllexecutable
MD5:872145B37D107144894C9AA8729BAD42
SHA256:2F258949FD95DA6CD912BEB7203A9FD5E99D050309A40341DE67537EDB75AADC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
81
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.163:443
www.bing.com
Akamai International B.V.
DE
unknown
1928
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.177
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.176
  • 104.126.37.123
  • 104.126.37.128
  • 104.126.37.179
  • 104.126.37.129
  • 104.126.37.168
whitelisted
google.com
  • 172.217.18.14
whitelisted

Threats

No threats detected
No debug info