File name:

HOIC v2.rar

Full analysis: https://app.any.run/tasks/da841dd9-636c-4cc8-9bde-6a5638d6aecb
Verdict: Malicious activity
Analysis date: December 31, 2019, 06:48:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

FE6400B8F86D2F29BBF5ADAE4B1DEAB5

SHA1:

1742A98B0E94897A707C522B80E5B52CB253136E

SHA256:

82EF9A6560C6BBA53BA742C6B3B3D13291F273DB0263576F94CF8EA8740683F9

SSDEEP:

49152:fb/Q8z2vs3EbOpj0NgNwTdcBZTWGg6oKce:fb/QG5OkKgbBFzce

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hoic2.1.exe (PID: 1732)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by user

      • hoic2.1.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs hoic2.1.exe

Process information

PID
CMD
Path
Indicators
Parent process
1732"C:\Users\admin\Desktop\hoic2.1.exe" C:\Users\admin\Desktop\hoic2.1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\hoic2.1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2864"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\HOIC v2.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
443
Read events
423
Write events
20
Delete events
0

Modification events

(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2864) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HOIC v2.rar
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(2864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\hoic2.1.exe
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\LizardSquad.Booster.hoic
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\Tutorial.txt
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\4add.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\6266.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\666.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\6666.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\add.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\add2.png
MD5:
SHA256:
2864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2864.44381\buttons2\buttons\add3.png
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
74
DNS requests
1
Threats
74

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
1732
hoic2.1.exe
GET
301
46.174.50.8:80
http://samoware.xyz/
RU
html
169 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1732
hoic2.1.exe
46.174.50.8:80
samoware.xyz
RS-Media LLC
RU
malicious
46.174.50.8:80
samoware.xyz
RS-Media LLC
RU
malicious

DNS requests

Domain
IP
Reputation
samoware.xyz
  • 46.174.50.8
malicious

Threats

PID
Process
Class
Message
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1732
hoic2.1.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info