analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

v1.rar

Full analysis: https://app.any.run/tasks/86f7076c-7f48-4f59-8a4e-79bcf222cc0c
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: June 12, 2019, 06:21:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
orcus
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

85B776ED7C09ACFF0D734E7C61F080B7

SHA1:

C1F7C1DC24877C44736CC15DE89B4E280C3588AC

SHA256:

8804ED6AD42B96A09201E265E9A3A6F3930C36C7E31AC9BC3C30EC8257C26A2D

SSDEEP:

12288:IUv/R3ASL9vSyxUHle5NVoJMVbs+DAThGoDZ2vIfxUhdnnPIXo+G+dAuzoUyvEb4:IU3GC9vSyxUFeu0TDKNOjrirTGdn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • v1.exe (PID: 2144)
      • v1.exe (PID: 3956)
      • v1.exe (PID: 2928)
      • v1.exe (PID: 4084)
      • v1.exe (PID: 704)
    • Orcus was detected

      • v1.exe (PID: 2144)
      • v1.exe (PID: 2928)
      • v1.exe (PID: 3956)
      • v1.exe (PID: 4084)
      • v1.exe (PID: 704)
    • Starts Visual C# compiler

      • v1.exe (PID: 2144)
      • v1.exe (PID: 2928)
      • v1.exe (PID: 3956)
      • v1.exe (PID: 4084)
      • v1.exe (PID: 704)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Black Crypter v4.0.exe (PID: 1932)
  • INFO

    • Manual execution by user

      • NOTEPAD.EXE (PID: 2504)
      • Black Crypter v4.0.exe (PID: 1932)
      • v1.exe (PID: 2144)
      • v1.exe (PID: 3956)
      • v1.exe (PID: 2928)
      • v1.exe (PID: 4084)
      • taskmgr.exe (PID: 4004)
      • v1.exe (PID: 704)
      • explorer.exe (PID: 3032)
    • Application was crashed

      • v1.exe (PID: 2144)
      • v1.exe (PID: 2928)
      • v1.exe (PID: 3956)
      • v1.exe (PID: 4084)
      • v1.exe (PID: 704)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
25
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs notepad.exe no specs black crypter v4.0.exe #ORCUS v1.exe #ORCUS v1.exe csc.exe no specs cvtres.exe no specs dw20.exe no specs #ORCUS v1.exe csc.exe no specs cvtres.exe no specs dw20.exe no specs csc.exe no specs cvtres.exe no specs dw20.exe no specs #ORCUS v1.exe taskmgr.exe no specs csc.exe no specs cvtres.exe no specs dw20.exe no specs #ORCUS v1.exe csc.exe no specs cvtres.exe no specs dw20.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2628"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\v1.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2504"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\v1\Black Crypter v4.0\الحقوق.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1932"C:\Users\admin\Desktop\v1\Black Crypter v4.0\Black Crypter v4.0.exe" C:\Users\admin\Desktop\v1\Black Crypter v4.0\Black Crypter v4.0.exe
explorer.exe
User:
admin
Company:
Black.Hacker | Darkness Software
Integrity Level:
MEDIUM
Description:
Black Crypter v4.0 | Legend Edition
Exit code:
0
Version:
4.0.0.0
2144"C:\Users\admin\Desktop\v1\v1.exe" C:\Users\admin\Desktop\v1\v1.exe
explorer.exe
User:
admin
Company:
auvt1KNhOBVo
Integrity Level:
MEDIUM
Description:
ad3WzXCZNIHB
Exit code:
3762507597
Version:
7.9.11.45
3956"C:\Users\admin\Desktop\v1\v1.exe" C:\Users\admin\Desktop\v1\v1.exe
explorer.exe
User:
admin
Company:
auvt1KNhOBVo
Integrity Level:
MEDIUM
Description:
ad3WzXCZNIHB
Exit code:
3762507597
Version:
7.9.11.45
2644"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\cznzrcqx.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exev1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
3892C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES6418.tmp" "c:\Users\admin\AppData\Local\Temp\CSC6417.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
3420dw20.exe -x -s 628C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exev1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Error Reporting Shim
Exit code:
0
Version:
2.0.50727.4927 (NetFXspW7.050727-4900)
2928"C:\Users\admin\Desktop\v1\v1.exe" C:\Users\admin\Desktop\v1\v1.exe
explorer.exe
User:
admin
Company:
auvt1KNhOBVo
Integrity Level:
MEDIUM
Description:
ad3WzXCZNIHB
Exit code:
3762507597
Version:
7.9.11.45
2716"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\zujmfywj.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exev1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
Total events
1 236
Read events
1 114
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
5
Text files
5
Unknown types
1

Dropped files

PID
Process
Filename
Type
2628WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2628.861\v1\Black Crypter v4.0\Black Crypter v4.0.exe
MD5:
SHA256:
2628WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2628.861\v1\Black Crypter v4.0\الحقوق.txt
MD5:
SHA256:
2628WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2628.861\v1\v1.exe
MD5:
SHA256:
1932Black Crypter v4.0.exeC:\Users\admin\Desktop\v1\RCX1B37.tmp
MD5:
SHA256:
1932Black Crypter v4.0.exeC:\Users\admin\Desktop\v1\RCX1B48.tmp
MD5:
SHA256:
1932Black Crypter v4.0.exeC:\Users\admin\Desktop\v1\RCX1B49.tmp
MD5:
SHA256:
2144v1.exeC:\Users\admin\AppData\Local\Temp\cznzrcqx.0.cs
MD5:
SHA256:
2144v1.exeC:\Users\admin\AppData\Local\Temp\cznzrcqx.cmdline
MD5:
SHA256:
2644csc.exeC:\Users\admin\AppData\Local\Temp\CSC6417.tmp
MD5:
SHA256:
3892cvtres.exeC:\Users\admin\AppData\Local\Temp\RES6418.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info