File name:

BoRat Rat.7z

Full analysis: https://app.any.run/tasks/856c8221-06a3-431d-b084-c614b92398c0
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: July 12, 2024, 06:06:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
api-base64
asyncrat
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

320967EA4C3F77C31CF5B8A7C7281DB1

SHA1:

4604180A62E0C5E8DF87B9713213551AEF8F911D

SHA256:

758DA04589FAF3A8AEDEAE4F9E26C90C4A7530F5E8368A368EFE8EF792F167D9

SSDEEP:

98304:tFKpSjCYPyJMSg85p6oVj62iFUCNTeGCYWw9H549XokuXIc9zeBtyMACjnmwWdZm:Mvro8YGfvocaJhGa+I54p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • WinRAR.exe (PID: 4780)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • ASYNCRAT has been detected (YARA)

      • BoratRat_Cracked.exe (PID: 3128)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 4780)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4780)
      • BoratRat_Cracked.exe (PID: 3128)
    • The process checks if it is being run in the virtual environment

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates file in the systems drive root

      • BoratRat_Cracked.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • BoratRat_Cracked.exe (PID: 3128)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4780)
    • Checks supported languages

      • BoratRat_Cracked.exe (PID: 3128)
    • Reads the computer name

      • BoratRat_Cracked.exe (PID: 3128)
    • Creates files or folders in the user directory

      • BoratRat_Cracked.exe (PID: 3128)
    • Reads the machine GUID from the registry

      • BoratRat_Cracked.exe (PID: 3128)
    • Create files in a temporary directory

      • BoratRat_Cracked.exe (PID: 3128)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • BoratRat_Cracked.exe (PID: 3128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe THREAT boratrat_cracked.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1188C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3128"C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
BoratRat
Version:
1.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4780.24537\boratrat_cracked.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4780"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\BoRat Rat.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
15 672
Read events
15 594
Write events
73
Delete events
5

Modification events

(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\BoRat Rat.7z
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
26
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\ip2region.db
MD5:
SHA256:
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\BoratRat_Cracked.exe.configxml
MD5:3E645CCCA1C44A00210924A3B0780955
SHA256:F29E697EFD7C5ECB928C0310EA832325BF6518786C8E1585E1B85CDC8701602F
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Extra.dllexecutable
MD5:62C231BAFA469AB04F090FCB4475D360
SHA256:6A4F32B0228092CE68E8448C6F4B74B4C654F40FB2D462C1D6BBD4B4EF09053D
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Information.dllexecutable
MD5:87651B12453131DAFD3E91F60D8AEF5A
SHA256:A15D72D990686D06D89D7E11DF2B16BCD5719A40298C19D046FA22C40D56AF44
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Options.dllexecutable
MD5:3A474B8DEE059562B31887197D94F382
SHA256:C9B8E795C5A024F9E3C85BA64534B9BF52CC8C3D29B95FF6417DC3A54BC68B95
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\ProcessManager.dllexecutable
MD5:91EDCB945924DF5FBF4FF123AA63199C
SHA256:5B1F80FF787BDCD7EE12AA64BE1F2F5F1F658BD644BBC5FD73527B51DA6CE0D6
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Ransomware.dllexecutable
MD5:EF998529D037FCDB2BDE6D046F99DB45
SHA256:54F554B9E330476B3903756F62B577BAB35CDEF941D3D0F6A3D607862762BF91
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Discord.dllexecutable
MD5:7EE673594BBB20F65448AAB05F1361D0
SHA256:8FA7634B7DCA1A451CF8940429BE6AD2440821ED04D5D70B6E727E5968E0B5F6
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Audio.dllexecutable
MD5:9726D7FE49C8BA43845AD8E5E2802BB8
SHA256:DF31A70CEB0C481646EEAF94189242200FAFD3DF92F8B3EC97C0D0670F0E2259
4780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb4780.24537\bin\Netstat.dllexecutable
MD5:12911F5654D6346FE99EF91E90849C13
SHA256:7EED1B90946A6DB1FE978D177A80542B5DB0BF3156C979DC8A8869A94811BF4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
81
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.163:443
www.bing.com
Akamai International B.V.
DE
unknown
1928
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.177
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.176
  • 104.126.37.123
  • 104.126.37.128
  • 104.126.37.179
  • 104.126.37.129
  • 104.126.37.168
whitelisted
google.com
  • 172.217.18.14
whitelisted

Threats

No threats detected
No debug info