File name:

Документы за февраль.gz

Full analysis: https://app.any.run/tasks/70f410e9-b40b-45c6-b52c-51c9569ac254
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 11:35:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redaman
Indicators:
MIME: application/gzip
File info: gzip compressed data, was "\304\356\352\363\354\345\355\362\373 \347\340 \364\345\342\360\340\353\374.exe", last modified: Tue Mar 19 21:03:23 2019, max speed, from FAT filesystem (MS-DOS, OS/2, NT)
MD5:

018DB4BC43FC12E865D2D1CB9B4F36E4

SHA1:

431CD209F57D158F42ACA0CBE1E68FDB4BBB1FC0

SHA256:

A4175C87C8474D1BB7F606B1481761E5BD5E39F88B368539051A730EF47075B1

SSDEEP:

6144:IN3CJY6QsctcUWFHLaEH7nkSPHYc+aM/UIBuViq3tnbDaiPaRIk4w5065Y8O43b:IBJ6zc2LFHL/wAYc+HuViqdnbDaiPWpr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Loads the Task Scheduler COM API

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Loads dropped or rewritten executable

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
      • rundll32.exe (PID: 3912)
      • explorer.exe (PID: 2036)
      • WinRAR.exe (PID: 3088)
    • REDAMAN was detected

      • rundll32.exe (PID: 3912)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3088)
      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Creates files in the user directory

      • explorer.exe (PID: 2036)
    • Creates files in the program directory

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Connects to unusual port

      • rundll32.exe (PID: 3912)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 2036)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: FileName
ModifyDate: 2019:03:19 22:03:23+01:00
ExtraFlags: Fastest Algorithm
OperatingSystem: FAT filesystem (MS-DOS, OS/2, NT/Win32)
ArchivedFileName: ????????? ?? ???????.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winrar.exe äîêóìåíòû çà ôåâðàëü.exe #REDAMAN rundll32.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2036C:\Windows\Explorer.EXEC:\Windows\explorer.exeSearchFilterHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
3088"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Документы за февраль.gz.z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3456"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Документы за февраль.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3584"C:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3088.15244\äîêóìåíòû çà ôåâðàëü.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\odbctrac.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3912rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
1 633
Read events
1 584
Write events
49
Delete events
0

Modification events

(PID) Process:(3456) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3456) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3456) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.z\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.z\OpenWithList
Operation:writeName:MRUList
Value:
a
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\JvaENE\JvaENE.rkr
Value:
00000000010000000000000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF30E8EB33DADFD40100000000
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.z\OpenWithProgids
Operation:writeName:WinRAR
Value:
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
Operation:writeName:1
Value:
14043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A000000B20036000000000000000000000014043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A002E006C006E006B000000680008000400EFBE00000000000000002A0000000000000000000000000000000000000000000000000014043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A002E006C006E006B0000004A000000
(PID) Process:(2036) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\.z
Operation:writeName:0
Value:
14043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A000000B20036000000000000000000000014043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A002E006C006E006B000000680008000400EFBE00000000000000002A0000000000000000000000000000000000000000000000000014043E043A0443043C0435043D0442044B042000370430042000440435043204400430043B044C042E0067007A002E007A002E006C006E006B0000004A000000
Executable files
3
Suspicious files
0
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\57B7.tmp
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\hemeohoemedfcbop
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\ohppcjdphgichgng
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019032120190322\index.datdat
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Документы за февраль.gz.z.lnklnk
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
3584Äîêóìåíòû çà ôåâðàëü.exeC:\Users\admin\AppData\Local\Temp\57B7.tmpexecutable
MD5:
SHA256:
3088WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
1
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3912
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
323 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3912
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious
3912
rundll32.exe
82.102.20.254:31315
GB
suspicious
3912
rundll32.exe
185.198.26.149:9001
HostHatch, Inc
NL
suspicious
3912
rundll32.exe
172.105.198.191:9100
US
suspicious
3912
rundll32.exe
94.23.247.42:443
OVH SAS
FR
suspicious
3912
rundll32.exe
37.187.177.2:9001
OVH SAS
FR
suspicious
3912
rundll32.exe
23.129.64.101:443
US
suspicious

DNS requests

Domain
IP
Reputation
myip.ru
  • 178.62.9.171
unknown

Threats

PID
Process
Class
Message
3912
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
3912
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 612
3912
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 233
3912
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 450
No debug info