File name:

BoRat Rat.7z

Full analysis: https://app.any.run/tasks/856c8221-06a3-431d-b084-c614b92398c0
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: July 12, 2024, 06:06:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
api-base64
asyncrat
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

320967EA4C3F77C31CF5B8A7C7281DB1

SHA1:

4604180A62E0C5E8DF87B9713213551AEF8F911D

SHA256:

758DA04589FAF3A8AEDEAE4F9E26C90C4A7530F5E8368A368EFE8EF792F167D9

SSDEEP:

98304:tFKpSjCYPyJMSg85p6oVj62iFUCNTeGCYWw9H549XokuXIc9zeBtyMACjnmwWdZm:Mvro8YGfvocaJhGa+I54p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 4780)
    • ASYNCRAT has been detected (YARA)

      • BoratRat_Cracked.exe (PID: 3128)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 4780)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • The process checks if it is being run in the virtual environment

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates file in the systems drive root

      • BoratRat_Cracked.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • BoratRat_Cracked.exe (PID: 3128)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4780)
    • Reads the computer name

      • BoratRat_Cracked.exe (PID: 3128)
    • Checks supported languages

      • BoratRat_Cracked.exe (PID: 3128)
    • Reads the machine GUID from the registry

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates files or folders in the user directory

      • BoratRat_Cracked.exe (PID: 3128)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • BoratRat_Cracked.exe (PID: 3128)
    • Create files in a temporary directory

      • BoratRat_Cracked.exe (PID: 3128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe THREAT boratrat_cracked.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1188C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3128"C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
BoratRat
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4780.24537\boratrat_cracked.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4780"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\BoRat Rat.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
15 672
Read events
15 594
Write events
73
Delete events
5

Modification events

(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\BoRat Rat.7z
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
26
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\ip2region.db
MD5:
SHA256:
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe.configxml
MD5:3E645CCCA1C44A00210924A3B0780955
SHA256:F29E697EFD7C5ECB928C0310EA832325BF6518786C8E1585E1B85CDC8701602F
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Audio.dllexecutable
MD5:9726D7FE49C8BA43845AD8E5E2802BB8
SHA256:DF31A70CEB0C481646EEAF94189242200FAFD3DF92F8B3EC97C0D0670F0E2259
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Discord.dllexecutable
MD5:7EE673594BBB20F65448AAB05F1361D0
SHA256:8FA7634B7DCA1A451CF8940429BE6AD2440821ED04D5D70B6E727E5968E0B5F6
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Options.dllexecutable
MD5:3A474B8DEE059562B31887197D94F382
SHA256:C9B8E795C5A024F9E3C85BA64534B9BF52CC8C3D29B95FF6417DC3A54BC68B95
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Netstat.dllexecutable
MD5:12911F5654D6346FE99EF91E90849C13
SHA256:7EED1B90946A6DB1FE978D177A80542B5DB0BF3156C979DC8A8869A94811BF4B
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Logger.dllexecutable
MD5:872145B37D107144894C9AA8729BAD42
SHA256:2F258949FD95DA6CD912BEB7203A9FD5E99D050309A40341DE67537EDB75AADC
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Miscellaneous.dllexecutable
MD5:509D41DA4A688A2E50FC8E3AFCA074C7
SHA256:F91973113FD01465999CE317F3E7A89DF8C91A5EFADCFA61E5CCCE687BF3580A
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\RemoteCamera.dllexecutable
MD5:ACBF0F8B09320F3E967EE83FCDA26F5D
SHA256:203300BE75AD8F57972324519B2583A44E759CDD57390D6765DF10288E249789
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\ProcessManager.dllexecutable
MD5:91EDCB945924DF5FBF4FF123AA63199C
SHA256:5B1F80FF787BDCD7EE12AA64BE1F2F5F1F658BD644BBC5FD73527B51DA6CE0D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
81
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.163:443
www.bing.com
Akamai International B.V.
DE
unknown
1928
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.177
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.176
  • 104.126.37.123
  • 104.126.37.128
  • 104.126.37.179
  • 104.126.37.129
  • 104.126.37.168
whitelisted
google.com
  • 172.217.18.14
whitelisted

Threats

No threats detected
No debug info