analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Poison ivy.rar

Full analysis: https://app.any.run/tasks/459b3cc7-90ad-4e7a-bad8-e70167dcbd84
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 14, 2019, 15:30:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

22C5682EB32697A9A962221F89E0F092

SHA1:

3F3965AC23D824A6ED68634CBF9ACF9D30FF809F

SHA256:

A6F60B65513C18C51DC6959D3B09BFF1C9A75A03710EFAB1D5B7C241523B7C11

SSDEEP:

49152:KI57hrmfqgHPfUyzJuXhpEi0+RgCkwjCGBnUDgsvRc:bbr14shuiXRgFGBMgs+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Poison Ivy 2.3.2.exe (PID: 2400)
      • SearchProtocolHost.exe (PID: 3420)
    • Application was dropped or rewritten from another process

      • Poison Ivy 2.3.2.exe (PID: 2400)
    • Connects to CnC server

      • Poison Ivy 2.3.2.exe (PID: 2400)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Poison Ivy 2.3.2.exe (PID: 2400)
  • INFO

    • Manual execution by user

      • Poison Ivy 2.3.2.exe (PID: 2400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs searchprotocolhost.exe no specs poison ivy 2.3.2.exe

Process information

PID
CMD
Path
Indicators
Parent process
1972"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Poison ivy.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3420"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
2400"C:\Users\admin\Desktop\Poison Ivy 2.3.2.exe" C:\Users\admin\Desktop\Poison Ivy 2.3.2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Poison Ivy Remote Administration
Exit code:
0
Version:
2.3.2
Total events
831
Read events
794
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\PILib.dll
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\Poison Ivy 2.3.2.exe
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\Poison Ivy.ini
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\Uninstall.exe
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\Uninstall.ini
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\Data\MainC
MD5:
SHA256:
1972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1972.7810\PI2.3.2.pdf
MD5:
SHA256:
2400Poison Ivy 2.3.2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\ww7_poisonivy-rat_com[1].txt
MD5:
SHA256:
2400Poison Ivy 2.3.2.exeC:\Users\admin\Desktop\PILib.dllexecutable
MD5:A8BB2EF9F6D3BB6DB348C00E750EE705
SHA256:439464983845661A641ECA7AC0147354D96C51870B4CA8FA042F02E27783122E
2400Poison Ivy 2.3.2.exeC:\Users\admin\Desktop\Poison Ivy.initext
MD5:F1CA00D0C908EEE3489D461F43B4FF54
SHA256:5F3C036450AFCF5DD4A9B8F5235BA713542839186F05E8E007DA3E049AE976A7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2400
Poison Ivy 2.3.2.exe
GET
200
199.59.242.152:80
http://ww7.poisonivy-rat.com/
US
html
3.93 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2400
Poison Ivy 2.3.2.exe
199.59.242.152:80
ww7.poisonivy-rat.com
Bodis, LLC
US
malicious
2400
Poison Ivy 2.3.2.exe
67.227.226.240:80
www.poisonivy-rat.com
Liquid Web, L.L.C
US
malicious

DNS requests

Domain
IP
Reputation
www.poisonivy-rat.com
  • 67.227.226.240
malicious
ww7.poisonivy-rat.com
  • 199.59.242.152
malicious

Threats

PID
Process
Class
Message
2400
Poison Ivy 2.3.2.exe
A Network Trojan was detected
REMOTE [PTsecurity] PoisonIvy.RAT
2400
Poison Ivy 2.3.2.exe
A Network Trojan was detected
REMOTE [PTsecurity] PoisonIvy.RAT
2400
Poison Ivy 2.3.2.exe
A Network Trojan was detected
REMOTE [PTsecurity] PoisonIvy.RAT
1 ETPRO signatures available at the full report
No debug info