File name:

RakSAMP Lite.rar

Full analysis: https://app.any.run/tasks/3a4f8a58-b834-4e71-8709-4ca15576b76c
Verdict: Malicious activity
Analysis date: August 23, 2024, 18:53:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

811E03C940278C5CE0F499E28FA101B5

SHA1:

59DDA3E1550DB96181B9CF552E45E3BA2CC0425E

SHA256:

7B8358BEF78109E14EDA409CACBF4EE6C2E0204D0DF9340C5BB732331A5357AA

SSDEEP:

98304:FhkkQM+CXmDRPSdvRzDNo7LC+QbL0LtdUF+JijCE1nFdVulf75PfI0yxH2Qc0cLV:WVkxXA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the date of Windows installation

      • RakLaunch Lite.exe (PID: 5464)
    • Reads security settings of Internet Explorer

      • RakLaunch Lite.exe (PID: 5464)
    • Potential Corporate Privacy Violation

      • RakSAMP Lite.exe (PID: 7068)
  • INFO

    • Manual execution by a user

      • RakLaunch Lite.exe (PID: 5464)
    • Checks supported languages

      • RakLaunch Lite.exe (PID: 5464)
      • RakSAMP Lite.exe (PID: 7068)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6660)
    • Process checks computer location settings

      • RakLaunch Lite.exe (PID: 5464)
    • Reads the computer name

      • RakSAMP Lite.exe (PID: 7068)
      • RakLaunch Lite.exe (PID: 5464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
5
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs raklaunch lite.exe raksamp lite.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5464"C:\Users\admin\Desktop\RakSAMP Lite\RakLaunch Lite.exe" C:\Users\admin\Desktop\RakSAMP Lite\RakLaunch Lite.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\raksamp lite\raklaunch lite.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5552C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6660"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RakSAMP Lite.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7068"C:\Users\admin\Desktop\RakSAMP Lite\RakSAMP Lite.exe" -h 80.66.82.82 -p 7777 -n nick -z C:\Users\admin\Desktop\RakSAMP Lite\RakSAMP Lite.exe
RakLaunch Lite.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\raksamp lite\raksamp lite.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRakSAMP Lite.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
6 800
Read events
6 773
Write events
27
Delete events
0

Modification events

(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\RakSAMP Lite.rar
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
17
Suspicious files
17
Text files
66
Unknown types
0

Dropped files

PID
Process
Filename
Type
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\libs\config.ldtext
MD5:511280DD4B2302E2ABD75B491D842F63
SHA256:8AF159F04A37A25112D6A6235C812233DAD1883DAC524F4744167E712BD9EF4F
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\libs\addon.luatext
MD5:0A08857B250D7A30646C46BC5D26F910
SHA256:22297CF758E7FA6C93E663DA2EAC22DA0D3746987F27BBD5FB86296C4BB3DB15
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\RakSAMP Lite.logtext
MD5:F2E9A882F05E60B40158C85A20E843BA
SHA256:8BD603593BC0E090092E04ACA45BAF1704C3E9D627A361B830D24B9BCB1322A6
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\clitorfix.luabinary
MD5:622D759107C9DB4BF2E91A5988E9AA32
SHA256:623AE83AF7572FCEAA303106B445B1D2CD8D055E62994C7C384BB54E5B33D882
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\RakSAMP Lite.exeexecutable
MD5:9802AC594BD6245E31C5E640A23F1652
SHA256:0C1AEEAB9ADCF23318A04837CCB1D4EA1210DA2943AC1AF4A9D94A450F733D87
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\aim_fix.luabinary
MD5:DE2C0E4F9ACECD6BD2C1819B0874EC6C
SHA256:9C61CC4F3F87C92696989450230C5046DACCE96FB3CDA16B33F70BCC3B220362
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\AutoRegistrationBySURVERS.luabinary
MD5:8FF494DD25EA9C55ACA13FA80DF21D40
SHA256:371FE963EC7D01BF8A23839B345D84017CF7F700C57B83AC6BF949BA9A070E7C
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\libs\autobus.luatext
MD5:EB9032303580667E2D4ACD66F32FE313
SHA256:D7EB520D3D500C3C6EC2BC4606F11A95B3341C92276BAFC8558CACFD3B3FFE6C
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\libs\base64.dllexecutable
MD5:A7B7CE324277FF19D9BA081C4DFDCB1D
SHA256:4E19BAC2A3E0A3E854143ED9259B82A4F405409B0D2928E10A27DB672BF346BE
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6660.7253\RakSAMP Lite\scripts\libs\cjson\cjson.dllexecutable
MD5:1607C33BADD1E7B251C366D9D15FC180
SHA256:7D402147FB093813D20432AA3C6211CD9CDE3848AB8F4BE3ED977C67DBDDFCED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
36
DNS requests
15
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5400
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5400
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5400
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6828
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6344
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
608
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
400
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
608
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5400
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5400
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 216.58.212.174
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.4
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.11
whitelisted

Threats

PID
Process
Class
Message
7068
RakSAMP Lite.exe
Potential Corporate Privacy Violation
ET P2P Edonkey Publicize File ACK
7068
RakSAMP Lite.exe
Potential Corporate Privacy Violation
ET P2P Edonkey Publicize File ACK
7068
RakSAMP Lite.exe
Potential Corporate Privacy Violation
ET P2P Edonkey Publicize File ACK
7068
RakSAMP Lite.exe
Potential Corporate Privacy Violation
ET P2P Edonkey Publicize File ACK
No debug info