File name:

Evilcheats.rar

Full analysis: https://app.any.run/tasks/2c4beda5-0297-4bfe-ac91-3f23222b9293
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 06, 2020, 12:54:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
trojan
terdot
zloader
loader
parasite
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

77345A3E798850F18342FD27BE95002A

SHA1:

11A179F61FAA409BABAD6E56760345A21C86ED01

SHA256:

77AFE33C23D55B28F5DF5EE06C2AC0988DBE196AF9A2214DD55CD5CF84CF8B1D

SSDEEP:

49152:nsUXlXclygHofSK9ekVKRPtedieBstPjIGMG29B/66PgPDCbtw2Qlo7O8ks+boRS:nsUXlskdqkVgtA7sRcGMqqNZQG4bM41l

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Evilcheats.exe (PID: 2188)
      • Evilcheats.exe (PID: 3920)
    • Connects to CnC server

      • Evilcheats.exe (PID: 2188)
    • PARASITE was detected

      • Evilcheats.exe (PID: 2188)
    • ZLOADER was detected

      • Evilcheats.exe (PID: 2188)
    • Actions looks like stealing of personal data

      • Evilcheats.exe (PID: 2188)
    • Stealing of credential data

      • Evilcheats.exe (PID: 2188)
  • SUSPICIOUS

    • Connects to server without host name

      • Evilcheats.exe (PID: 2188)
    • Reads the cookies of Google Chrome

      • Evilcheats.exe (PID: 2188)
    • Application launched itself

      • Evilcheats.exe (PID: 3920)
    • Reads Internet Cache Settings

      • Evilcheats.exe (PID: 2188)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2616)
  • INFO

    • Manual execution by user

      • Evilcheats.exe (PID: 3920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe evilcheats.exe #ZLOADER evilcheats.exe

Process information

PID
CMD
Path
Indicators
Parent process
2188"{path}"C:\Users\admin\Desktop\Evilcheats\Evilcheats.exe
Evilcheats.exe
User:
admin
Integrity Level:
HIGH
Description:
GameEngine
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\evilcheats\evilcheats.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2616"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Evilcheats.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3920"C:\Users\admin\Desktop\Evilcheats\Evilcheats.exe" C:\Users\admin\Desktop\Evilcheats\Evilcheats.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
GameEngine
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\evilcheats\evilcheats.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
405
Read events
382
Write events
23
Delete events
0

Modification events

(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2616) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2616) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Evilcheats.rar
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2616) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2616) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
2
Suspicious files
2
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
2188Evilcheats.exeC:\Users\admin\Documents\rr
MD5:
SHA256:
2616WinRAR.exeC:\Users\admin\Desktop\Evilcheats\Evilcheats.exeexecutable
MD5:
SHA256:
2188Evilcheats.exeC:\Users\admin\Documents\{e29ac6c0-7037-11de-816d-806e6f6e6963}\history.logtext
MD5:
SHA256:
2188Evilcheats.exeC:\Users\admin\Documents\{e29ac6c0-7037-11de-816d-806e6f6e6963}\screen.jpegimage
MD5:
SHA256:
2188Evilcheats.exeC:\Users\admin\Documents\{e29ac6c0-7037-11de-816d-806e6f6e6963}\about.logtext
MD5:
SHA256:
2616WinRAR.exeC:\Users\admin\Desktop\Evilcheats\app\aim.cfgimage
MD5:
SHA256:
2188Evilcheats.exeC:\Users\admin\Documents\{e29ac6c0-7037-11de-816d-806e6f6e6963}\Browsers\Google\Autofill.logtext
MD5:
SHA256:
2188Evilcheats.exeC:\Users\admin\Documents\t.zipcompressed
MD5:
SHA256:
2616WinRAR.exeC:\Users\admin\Desktop\Evilcheats\Пароль.txttext
MD5:202CB962AC59075B964B07152D234B70
SHA256:A665A45920422F9D417E4867EFDC4FB8A04A1F3FFF1FA07E998E86F7F7A27AE3
2188Evilcheats.exeC:\Users\admin\Documents\{e29ac6c0-7037-11de-816d-806e6f6e6963}\Browsers\passwords.logtext
MD5:A640963598135A0C15F430BA75B4F5F4
SHA256:4AC31C4EB05CCB66DA83B6C9720DEA16547596BDE30112DF92FDC3A4B2F80C39
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
0
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2188
Evilcheats.exe
POST
185.241.52.175:80
http://185.241.52.175/gate.php
unknown
malicious
2188
Evilcheats.exe
POST
200
185.241.52.175:80
http://185.241.52.175/gate.php
unknown
malicious
2188
Evilcheats.exe
POST
200
185.241.52.175:80
http://185.241.52.175/gate.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2188
Evilcheats.exe
185.241.52.175:80
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no accept headers
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Likely Zbot Generic Request to gate.php Dotted-Quad
2188
Evilcheats.exe
A Network Trojan was detected
STEALER [PTsecurity] Parasite
2188
Evilcheats.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (Client)
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no accept headers
2188
Evilcheats.exe
A Network Trojan was detected
ET TROJAN Likely Zbot Generic Request to gate.php Dotted-Quad
2188
Evilcheats.exe
A Network Trojan was detected
STEALER [PTsecurity] Parasite
2188
Evilcheats.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (Client)
No debug info