analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

C:\Users\admin\Desktop\2.rar

Full analysis: https://app.any.run/tasks/7e5e37bc-5931-43e1-a761-3f817f5ae907
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: February 18, 2019, 12:43:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

D58473A193F03EB693E11E3D8F60EFF4

SHA1:

4F3DF521E8D81328459AF0D912FC8949654F2049

SHA256:

96766CCF5ECCE29D89D4AE68C71DEBA7AA6FF2B76D54A3E6D9FF06D3EFC7DA96

SSDEEP:

98304:Wc8XML8NgqyK7eLyud6PkCfiv83VkcdImU08n72NCDakHibCEPi:b4h2DK7Sd6Pl+kImCnUuqbCE6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 2.exe (PID: 3836)
      • CCleaner.exe (PID: 3396)
      • CCleaner.exe (PID: 2712)
      • 1.exe (PID: 3620)
      • firefox.exe (PID: 3984)
    • Changes the autorun value in the registry

      • 1.exe (PID: 3620)
    • Loads the Task Scheduler COM API

      • CCleaner.exe (PID: 3396)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 2712)
      • 1.exe (PID: 3620)
    • Renames files like Ransomware

      • 1.exe (PID: 3620)
    • Writes to a start menu file

      • 1.exe (PID: 3620)
    • Modifies files in Chrome extension folder

      • 1.exe (PID: 3620)
  • SUSPICIOUS

    • Loads DLL from Mozilla Firefox

      • firefox.exe (PID: 3984)
    • Executable content was dropped or overwritten

      • 1.exe (PID: 3620)
      • 2.exe (PID: 3836)
    • Application launched itself

      • CCleaner.exe (PID: 3396)
    • Reads internet explorer settings

      • CCleaner.exe (PID: 2712)
    • Low-level read access rights to disk partition

      • CCleaner.exe (PID: 2712)
    • Reads the cookies of Mozilla Firefox

      • CCleaner.exe (PID: 2712)
    • Creates files in the user directory

      • CCleaner.exe (PID: 2712)
      • 1.exe (PID: 3620)
    • Reads the cookies of Google Chrome

      • CCleaner.exe (PID: 2712)
    • Creates files like Ransomware instruction

      • 1.exe (PID: 3620)
    • Creates files in the program directory

      • 1.exe (PID: 3620)
  • INFO

    • Reads settings of System Certificates

      • CCleaner.exe (PID: 2712)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs 2.exe ccleaner.exe no specs 1.exe firefox.exe no specs ccleaner.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3104"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\2.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3836"C:\Users\admin\Desktop\2.exe" C:\Users\admin\Desktop\2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
3396"C:\Users\admin\AppData\Local\Temp\CCleaner.exe" C:\Users\admin\AppData\Local\Temp\CCleaner.exe2.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
3620"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
2.exe
User:
admin
Integrity Level:
MEDIUM
3984"C:\Users\admin\AppData\Local\Temp\firefox.exe" C:\Users\admin\AppData\Local\Temp\firefox.exe2.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
255
Version:
61.0.2
2712"C:\Users\admin\AppData\Local\Temp\CCleaner.exe" /uacC:\Users\admin\AppData\Local\Temp\CCleaner.exe
CCleaner.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
3476"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 970
Read events
1 747
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
17
Text files
2 960
Unknown types
65

Dropped files

PID
Process
Filename
Type
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3104.32495\2.exe
MD5:
SHA256:
36201.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Benioku.htm
MD5:
SHA256:
36201.exe\Device\HarddiskVolume2\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Benioku.htm.Mcafee
MD5:
SHA256:
36201.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Berime.htm
MD5:
SHA256:
36201.exe\Device\HarddiskVolume2\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Berime.htm.Mcafee
MD5:
SHA256:
36201.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\IrakHau.htm
MD5:
SHA256:
36201.exe\Device\HarddiskVolume2\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\IrakHau.htm.Mcafee
MD5:
SHA256:
36201.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Leame.htm
MD5:
SHA256:
36201.exe\Device\HarddiskVolume2\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\Leame.htm.Mcafee
MD5:
SHA256:
36201.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat Reader DC\LeesMij.htm
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2712
CCleaner.exe
GET
301
151.101.0.64:80
http://www.piriform.com/auto?a=0&p=cc&v=5.35.6210&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=e7d8e083-0d61-410c-9bfe-932401b5580f
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2712
CCleaner.exe
151.101.0.64:443
www.piriform.com
Fastly
US
whitelisted
2712
CCleaner.exe
151.101.0.64:80
www.piriform.com
Fastly
US
whitelisted
2712
CCleaner.exe
151.101.2.202:443
www.ccleaner.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
www.piriform.com
  • 151.101.0.64
  • 151.101.64.64
  • 151.101.128.64
  • 151.101.192.64
whitelisted
www.ccleaner.com
  • 151.101.2.202
  • 151.101.66.202
  • 151.101.130.202
  • 151.101.194.202
whitelisted

Threats

No threats detected
No debug info