analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

AutoScriptWriter.rar

Full analysis: https://app.any.run/tasks/7fff3827-b7a3-4c1a-9fff-d0bb4eb96dd8
Verdict: Malicious activity
Analysis date: May 20, 2019, 20:54:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

D4F452DCF52261CA544221AFF43E54D5

SHA1:

5F67372B60E733139265EBC557356B680B22FE3A

SHA256:

A601A9871B943AF9AB6A68AFA193839657A98A49058331ABC677D0896BE2C718

SSDEEP:

384:NvV9O6ofH+Sv5PMnmrDYR0yU7Db+SGytoMIX1HOdTmwQwQACyV:D9OjHJ5MnmPYRY7OPytoxX18SwBtB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • explorer.exe (PID: 2044)
      • AutoScriptWriter.exe (PID: 3580)
      • WinRAR.exe (PID: 3552)
    • Application was dropped or rewritten from another process

      • AutoScriptWriter.exe (PID: 3580)
  • SUSPICIOUS

    • Creates files in the user directory

      • notepad++.exe (PID: 3312)
      • explorer.exe (PID: 2044)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3552)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: AutoScriptWriter\ASWHook.dll
PackingMethod: Normal
ModifyDate: 2003:03:10 16:47:25
OperatingSystem: Win32
UncompressedSize: 20480
CompressedSize: 1233
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start winrar.exe autoscriptwriter.exe no specs explorer.exe no specs explorer.exe no specs notepad++.exe gup.exe

Process information

PID
CMD
Path
Indicators
Parent process
3552"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\AutoScriptWriter.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3580"C:\Users\admin\AppData\Local\Temp\Rar$EXa3552.19008\AutoScriptWriter\AutoScriptWriter.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3552.19008\AutoScriptWriter\AutoScriptWriter.exeWinRAR.exe
User:
admin
Company:
DaloozaSoft
Integrity Level:
MEDIUM
Description:
Automatic AutoIt Script Writer
Exit code:
0
Version:
2.0
2044C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
920"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3312"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Documents\jj.ahk"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Version:
7.51
3516"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Version:
4.1
Total events
1 441
Read events
1 274
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
4
Unknown types
2

Dropped files

PID
Process
Filename
Type
2044explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:B7573869AE5DD9CFD34C0E6624FC6DFE
SHA256:4E8D6EC1CB9C122B9E67F99ADD1C837EB55C57BB7D495504CF52C231A050815C
3552WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3552.19008\AutoScriptWriter\ASWHook.dllexecutable
MD5:F70072EC0E290D42769402516E9FAA81
SHA256:5068223268F3562F649C41563EAC0300F95CBFBEF53A06EACB05A4C5FB14F261
3552WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3552.19008\AutoScriptWriter\AutoScriptWriter.exeexecutable
MD5:B3FA428197881ADF33E0ACF633F2B638
SHA256:7B700CAFE4E11F86B2C84AD479CE33EA71D0EC33ECC098076BF7CA8DA93118F4
2044explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Documents.lnklnk
MD5:3D448E4FBA303447B0931C8850673C7D
SHA256:60D5D45F94EF87EF1BE867E3F411E126213E67E484EB13CD169CC49682EF1D00
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\langs.xmlxml
MD5:E792264BEC29005B9044A435FBA185AB
SHA256:5298FD2F119C43D04F6CF831F379EC25B4156192278E40E458EC356F9B49D624
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\shortcuts.xmltext
MD5:AD21A64014891793DD9B21D835278F36
SHA256:C24699C9D00ABDD510140FE1B2ACE97BFC70D8B21BF3462DED85AFC4F73FE52F
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\stylers.xmlxml
MD5:44982E1D48434C0AB3E8277E322DD1E4
SHA256:3E661D3F1FF3977B022A0ACC26B840B5E57D600BC03DCFC6BEFDB408C665904C
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\plugins\Config\converter.initext
MD5:F70F579156C93B097E656CABA577A5C9
SHA256:B926498A19CA95DC28964B7336E5847107DD3C0F52C85195C135D9DD6CA402D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.35.177.64:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
US
der
896 b
whitelisted
GET
200
2.20.190.11:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.35.177.64:80
crl.identrust.com
IdenTrust
US
malicious
3516
gup.exe
37.59.28.236:443
notepad-plus-plus.org
OVH SAS
FR
whitelisted
2.20.190.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
2.20.189.204:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
notepad-plus-plus.org
  • 37.59.28.236
whitelisted
isrg.trustid.ocsp.identrust.com
  • 2.20.189.204
  • 2.20.190.11
whitelisted
crl.identrust.com
  • 192.35.177.64
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093