File name: | Dox_Tool_V3_Cracked.rar |
Full analysis: | https://app.any.run/tasks/4e1ccdea-9dba-4bb1-8628-aab9c3e34801 |
Verdict: | Malicious activity |
Threats: | Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely. |
Analysis date: | November 25, 2021, 01:00:19 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 3644F99DDF506A39DA30126C9A0ABB6A |
SHA1: | F04F0277FF79AEEA0D5CD0F28E8245F50A2C7D65 |
SHA256: | 9C09DED5AE06EFDB1D52F183D70F6A3FC821618BCD60D6F4A9F0C46D20BF589A |
SSDEEP: | 49152:cjBI5buvPNb4ah+utzurqOeJ35JwzY/yqlY:eC5SXNMKlurqxpyqa |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
444 | "C:\Windows\system32\SubDir\SystemUpdate.exe" | C:\Windows\system32\SubDir\SystemUpdate.exe | WindowsUpdate.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.3.0.0 Modules
| |||||||||||||||
548 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Launcher Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
1032 | "C:\Users\admin\AppData\Local\Temp\HQUHlwGxWA.exe" | C:\Users\admin\AppData\Local\Temp\HQUHlwGxWA.exe | — | svchost.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 4294967295 Version: 1.0.6473.36168 Modules
| |||||||||||||||
1104 | "C:\Users\admin\AppData\Local\Temp\DOX.exe" | C:\Users\admin\AppData\Local\Temp\DOX.exe | Dox Tool V3 Cracked.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: LU OFFICIAL TOOL Exit code: 3489660927 Version: 1.0 Modules
| |||||||||||||||
1232 | "C:\Users\admin\AppData\Roaming\svchost.exe" C:\Users\admin\AppData\Local\Temp\svchost.exe | C:\Users\admin\AppData\Roaming\svchost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft @ 2015 Integrity Level: HIGH Description: Control ACLs Program Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
1792 | "C:\Users\admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe" | C:\Users\admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe | doxsys.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
1984 | "C:\Windows\IMF\Runtime Explorer.exe" | C:\Windows\IMF\Runtime Explorer.exe | — | Windows Services.exe | |||||||||||
User: admin Company: Microsoft Windows Integrity Level: HIGH Exit code: 0 Version: 1.00 Modules
| |||||||||||||||
2128 | "C:\Users\admin\AppData\Local\Temp\WindowsUpdate.exe" | C:\Users\admin\AppData\Local\Temp\WindowsUpdate.exe | Dox Tool V3 Cracked.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.3.0.0 Modules
| |||||||||||||||
2240 | "C:\Windows\IMF\Runtime Explorer.exe" | C:\Windows\IMF\Runtime Explorer.exe | — | Windows Services.exe | |||||||||||
User: admin Company: Microsoft Windows Integrity Level: HIGH Exit code: 0 Version: 1.00 Modules
| |||||||||||||||
2264 | "C:\Windows\IMF\Runtime Explorer.exe" | C:\Windows\IMF\Runtime Explorer.exe | — | Windows Services.exe | |||||||||||
User: admin Company: Microsoft Windows Integrity Level: HIGH Exit code: 0 Version: 1.00 Modules
|
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Dox_Tool_V3_Cracked.rar | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (3652) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\LICENCE.dat | compressed | |
MD5:— | SHA256:— | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\Search.ProtocolHandler.MAPI2.dll | executable | |
MD5:1EFF11CED2866665F101892E9D097D14 | SHA256:A90C1A13965F534565F98B4A7C0DE5804B35482E9668F3D60DF8A1C039E51AD9 | |||
2572 | doxsys.exe | C:\Users\admin\AppData\Local\Temp\svchost.exe | executable | |
MD5:— | SHA256:— | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\Ionic.Zip.dll | executable | |
MD5:F6933BF7CEE0FD6C80CDF207FF15A523 | SHA256:17BB0C9BE45289A2BE56A5F5A68EC9891D7792B886E0054BC86D57FE84D01C89 | |||
2572 | doxsys.exe | C:\Users\admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe | executable | |
MD5:— | SHA256:— | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\Launcher.exe | executable | |
MD5:C6D4C881112022EB30725978ECD7C6EC | SHA256:0D87B9B141A592711C52E7409EC64DE3AB296CDDC890BE761D9AF57CEA381B32 | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\doxsys.exe | executable | |
MD5:8F36CAF603F3F2B192C5FD06A8E3C699 | SHA256:0CA828C630091173CAFD2663393888849459FBC9581D1FD062567D0AFDF79A38 | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\data\sqlmap.conf | text | |
MD5:D996323D71A04CE49F1CCBF36E5269DD | SHA256:BC5836E6E6E97290914AFDE652237450092729EE31634DA6AB71B435A39EBDE6 | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\Newtonsoft.Json.dll | executable | |
MD5:4DF6C8781E70C3A4912B5BE796E6D337 | SHA256:3598CCCAD5B535FEA6F93662107A4183BFD6167BF1D0F80260436093EDC2E3AF | |||
3652 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3652.18599\Dox Tool V3 Cracked\Virus Total\desktop.ini | ini | |
MD5:C279803B27F13369AA54FC9B84B72468 | SHA256:D80758A34364CAB9DE42FF6ED57BCC753A0936DDDDF9952C5B4FB9FF0D7966C9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
444 | SystemUpdate.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 257 b | malicious |
2128 | WindowsUpdate.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 257 b | malicious |
3116 | svchost.exe | GET | 200 | 104.18.115.97:80 | http://icanhazip.com/ | US | text | 13 b | shared |
1232 | svchost.exe | GET | 200 | 104.18.115.97:80 | http://icanhazip.com/ | US | text | 13 b | shared |
1232 | svchost.exe | GET | 404 | 162.243.129.169:80 | http://puu.sh/jMSLc.txt | US | text | 30 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3116 | svchost.exe | 104.18.115.97:80 | icanhazip.com | Cloudflare Inc | US | malicious |
1232 | svchost.exe | 104.18.115.97:80 | icanhazip.com | Cloudflare Inc | US | malicious |
1232 | svchost.exe | 162.243.129.169:80 | puu.sh | Digital Ocean, Inc. | US | suspicious |
— | — | 192.168.100.108:53206 | — | — | — | malicious |
— | — | 192.168.100.108:52518 | — | — | — | malicious |
3116 | svchost.exe | 162.243.129.169:80 | puu.sh | Digital Ocean, Inc. | US | suspicious |
2128 | WindowsUpdate.exe | 208.95.112.1:80 | ip-api.com | IBURST | — | malicious |
1104 | DOX.exe | 104.21.66.166:80 | drizzybot.com | Cloudflare Inc | US | suspicious |
— | — | 208.95.112.1:80 | ip-api.com | IBURST | — | malicious |
— | — | 192.168.100.108:52173 | — | — | — | malicious |
Domain | IP | Reputation |
---|---|---|
puu.sh |
| shared |
ip-api.com |
| malicious |
drizzybot.com |
| malicious |
dns.msftncsi.com |
| shared |
icanhazip.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
— | — | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
— | — | Potentially Bad Traffic | ET INFO GET to Puu.sh for TXT File with Minimal Headers |
— | — | Attempted Information Leak | ET POLICY IP Check Domain (icanhazip. com in HTTP Host) |