analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

onetap.rar

Full analysis: https://app.any.run/tasks/4020a9b6-2389-469f-869e-f144890e85e8
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 17, 2019, 13:40:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
opendir
loader
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

4ED4BC2EBDBEF22BFE47148E60C353CA

SHA1:

C092620605420BF30595762DE43D6B3BEE842DAA

SHA256:

80D69AA4DC29EB05FD64AA950E92963844DC6255EF2A43854B3D38358FD4424C

SSDEEP:

49152:vP9Bufux6GzCwL5a2HFe1ix9rnaYMV/vno7ZtvhJ8sLAdZuB3ZG8:9BvJzZ5ZJx9rnaZV/vo7Zt38s8nu1ZP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • yzh4alpite4.exe (PID: 2472)
      • sys_win_asdasdl.exe (PID: 3560)
      • DLL Injector.exe (PID: 2964)
      • Wmi64Update.exe (PID: 3296)
      • taskshell.exe (PID: 3516)
    • Downloads executable files from IP

      • yzh4alpite4.exe (PID: 2472)
    • Downloads executable files from the Internet

      • yzh4alpite4.exe (PID: 2472)
    • Changes the login/logoff helper path in the registry

      • yzh4alpite4.exe (PID: 2472)
    • Changes the autorun value in the registry

      • sys_win_asdasdl.exe (PID: 3560)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2100)
    • Uses Task Scheduler to run other applications

      • sys_win_asdasdl.exe (PID: 3560)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3064)
      • DLL Injector.exe (PID: 2964)
      • yzh4alpite4.exe (PID: 2472)
      • sys_win_asdasdl.exe (PID: 3560)
    • Creates files in the user directory

      • DLL Injector.exe (PID: 2964)
    • Creates files in the program directory

      • sys_win_asdasdl.exe (PID: 3560)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 3204)
    • Starts CMD.EXE for commands execution

      • yzh4alpite4.exe (PID: 2472)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start winrar.exe dll injector.exe yzh4alpite4.exe sys_win_asdasdl.exe cmd.exe no specs choice.exe no specs wmi64update.exe no specs schtasks.exe no specs taskshell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3064"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\onetap.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2964"C:\Users\admin\AppData\Local\Temp\Rar$EXa3064.23967\DLL Injector.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3064.23967\DLL Injector.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2472"C:\Users\admin\AppData\Roaming\yzh4alpite4.exe" C:\Users\admin\AppData\Roaming\yzh4alpite4.exe
DLL Injector.exe
User:
admin
Company:
r0u0wnzgkgh
Integrity Level:
MEDIUM
Description:
ietghrwutmp
Exit code:
0
Version:
8.2.6.2
3560"C:\Users\admin\AppData\Local\Temp\sys_win_asdasdl.exe" C:\Users\admin\AppData\Local\Temp\sys_win_asdasdl.exe
yzh4alpite4.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Build 1.6 pro
Exit code:
0
Version:
1.0.0.0
3204"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\admin\AppData\Roaming\yzh4alpite4.exeC:\Windows\System32\cmd.exeyzh4alpite4.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
4020choice /C Y /N /D Y /T 3 C:\Windows\system32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3296"C:\ProgramData\WMI Provider Host\Wmi64Update.exe" C:\ProgramData\WMI Provider Host\Wmi64Update.exesys_win_asdasdl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Provider Host
Version:
10.0.17134.1
2100"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "WMI Host Updater" /tr "C:\ProgramData\WMI Provider Host\\Wmi64Update.exe" /fC:\Windows\System32\schtasks.exesys_win_asdasdl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3516"C:\ProgramData\taskshell.exe" C:\ProgramData\taskshell.exeWmi64Update.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Perflib Event Messages
Version:
10.0.17134.1 (WinBuild.160101.0800)
Total events
1 386
Read events
1 312
Write events
0
Delete events
0

Modification events

No data
Executable files
11
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2472yzh4alpite4.exeC:\Users\admin\yzh4alpite4.exe
MD5:
SHA256:
3560sys_win_asdasdl.exeC:\ProgramData\WMI Provider Host\WmiHost.exeexecutable
MD5:E72D9E00161D7EDE92730DA84F1FDC74
SHA256:110770DA318AA1884C9AD2F3A00A8761CFA076FA679D0F022DABB1DC360167DE
3560sys_win_asdasdl.exeC:\ProgramData\taskshell.exeexecutable
MD5:245B363E4CCD16ECD8442B60DFB44AFF
SHA256:D37C6FB632120B2DAE53CCAA4BEF644D19C608500EA96027247E329662A64A2A
3064WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3064.23967\onetap.dllexecutable
MD5:28968DC06C7457569DF6B6BDF608018F
SHA256:CD31E5611FAEF2D711B2C9BFA52654739D41BE47A530549258FF625CA2815E01
3560sys_win_asdasdl.exeC:\ProgramData\config.jsontext
MD5:C953421CFF315BFD649C2DBA9CC9ACC5
SHA256:B6C5E741FDB7A5685C3BAEE713912EA226CB4BE237798A6463A40750CC543521
3560sys_win_asdasdl.exeC:\ProgramData\WMI Provider Host\nvrtc64_100_0.dllexecutable
MD5:4D75E1F6D7AA5B4A6C0E5919387A48D2
SHA256:D2CBA3352A6EB26E7871BD1D7D66F24893ADEC7787A2707FCE08D640C2CAE9F0
3064WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3064.23967\patcher.dllexecutable
MD5:7739E2F32659C10FEEBF2BBC1EF2B32F
SHA256:24541E7483B98714E281FFF245C488D99647C2DB3A82BA655E146DCE4D8851F5
2472yzh4alpite4.exeC:\Users\admin\AppData\Local\Temp\sys_win_asdasdl.exeexecutable
MD5:2EB545210FDC7F283571E5990394F235
SHA256:32FF329DB7D7E6D3B5DEA0770EDC882FF8C119606E6D485DB0C7156461CF281D
2964DLL Injector.exeC:\Users\admin\AppData\Roaming\DLL Injector .exeexecutable
MD5:10AB8E4E0015E98C431B5AA4188DC782
SHA256:090C80C0C994B7E9560B27CA8B979C4CE723D5578788B3C404EDF11D49B9B96C
3560sys_win_asdasdl.exeC:\ProgramData\WMI Provider Host\Wmi64Update.exeexecutable
MD5:317A68FA2B5D95BCE3722DD67F1CC699
SHA256:1FE7C7B1F4FFB05E43CF09717783DC8D2599CE41C6E45B9D0222C3A0D8D29A00
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2472
yzh4alpite4.exe
GET
200
37.230.210.84:80
http://37.230.210.84/still/miner.exe
RU
executable
56.7 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2472
yzh4alpite4.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
3560
sys_win_asdasdl.exe
145.14.145.130:443
cwnyfyxugire.000webhostapp.com
Hostinger International Limited
US
shared
2472
yzh4alpite4.exe
37.230.210.84:80
RS-Media LLC
RU
suspicious
3560
sys_win_asdasdl.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
iplogger.org
  • 88.99.66.31
shared
cwnyfyxugire.000webhostapp.com
  • 145.14.145.130
shared

Threats

PID
Process
Class
Message
2472
yzh4alpite4.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
2472
yzh4alpite4.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
2472
yzh4alpite4.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2472
yzh4alpite4.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2472
yzh4alpite4.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2472
yzh4alpite4.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
Not Suspicious Traffic
ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup)
3560
sys_win_asdasdl.exe
Not Suspicious Traffic
ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com)
3560
sys_win_asdasdl.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3560
sys_win_asdasdl.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3 ETPRO signatures available at the full report
No debug info