analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Payment_Copy_PDF.rar

Full analysis: https://app.any.run/tasks/095dabc8-04e6-480d-8eb5-6b7a1d7a1a4e
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: January 22, 2019, 15:45:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

805E262D5EB053BEF10E5FB7FB63333F

SHA1:

A98052040541340C79A69B9834A2BF9A4B2C52A4

SHA256:

9D76BB56B57FB7D783A61B368C1F7913325DB5D10554B60BFA6A5A7F12143D6B

SSDEEP:

6144:yHpEE/AUJYrEBOzuiS/N19XwuzkwST12869Dcl32mAyi/4Qo6:e/AUJYr91S/N/k7T1a2XO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hhhhhhhhhk.exe (PID: 4056)
      • hhhhhhhhhk.exe (PID: 3364)
      • hhhhhhhhhk.exe (PID: 1968)
      • hhhhhhhhhk.exe (PID: 2192)
    • Writes to a start menu file

      • hhhhhhhhhk.exe (PID: 4056)
      • hhhhhhhhhk.exe (PID: 2192)
    • REMCOS RAT was detected

      • hhhhhhhhhk.exe (PID: 3364)
  • SUSPICIOUS

    • Application launched itself

      • hhhhhhhhhk.exe (PID: 4056)
      • hhhhhhhhhk.exe (PID: 2192)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3000)
    • Creates files in the user directory

      • hhhhhhhhhk.exe (PID: 4056)
      • hhhhhhhhhk.exe (PID: 2192)
    • Connects to unusual port

      • hhhhhhhhhk.exe (PID: 3364)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 286649
UncompressedSize: 296448
OperatingSystem: Win32
ModifyDate: 2019:01:20 21:03:13
PackingMethod: Normal
ArchivedFileName: hhhhhhhhhk.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe hhhhhhhhhk.exe #REMCOS hhhhhhhhhk.exe hhhhhhhhhk.exe hhhhhhhhhk.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3000"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Payment_Copy_PDF.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
4056"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.45948\hhhhhhhhhk.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.45948\hhhhhhhhhk.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3364"C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.45948\hhhhhhhhhk.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3000.45948\hhhhhhhhhk.exe
hhhhhhhhhk.exe
User:
admin
Integrity Level:
MEDIUM
2192"C:\Users\admin\Desktop\hhhhhhhhhk.exe" C:\Users\admin\Desktop\hhhhhhhhhk.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1968"C:\Users\admin\Desktop\hhhhhhhhhk.exe" C:\Users\admin\Desktop\hhhhhhhhhk.exehhhhhhhhhk.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Total events
463
Read events
437
Write events
26
Delete events
0

Modification events

(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3000) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Payment_Copy_PDF.rar
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4056hhhhhhhhhk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uy.vbstext
MD5:D6F9D052FCC03AE85F8B44531C8EC435
SHA256:ACC221AF5DE2DC091D2D965599F76EABC0BFDB525B0806D5E4B637C35908989E
3000WinRAR.exeC:\Users\admin\Desktop\hhhhhhhhhk.exeexecutable
MD5:C2EAF72AD57E443681C14E5ADA2B13C2
SHA256:7C2CC2EA36BF5DF5B1FA2551A7707C4F99C2B3B53E9089F2869A74FF4FB8C5C9
3000WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3000.45948\hhhhhhhhhk.exeexecutable
MD5:C2EAF72AD57E443681C14E5ADA2B13C2
SHA256:7C2CC2EA36BF5DF5B1FA2551A7707C4F99C2B3B53E9089F2869A74FF4FB8C5C9
2192hhhhhhhhhk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uy.vbstext
MD5:1C570BDAED38FEDFDDC45E50449AA808
SHA256:A38E40E4336C5F063AFED11C406C4C9EC782FB07349D004ABDD311FE5C36F094
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3364
hhhhhhhhhk.exe
192.152.0.92:5680
Choopa, LLC
US
malicious

DNS requests

No data

Threats

No threats detected
No debug info