| File name: | Black Hat Rat.zip |
| Full analysis: | https://app.any.run/tasks/db014507-581b-488f-aa62-20b9046a8dc3 |
| Verdict: | Malicious activity |
| Analysis date: | June 27, 2023, 06:44:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | 46C0A52D5D153B62E9DB80D3DF4AB6D3 |
| SHA1: | DC90337CF116964E810C71FCF6F5844A4AC2ABE6 |
| SHA256: | B3D7AC1B309A709307B5EBAD4CB4108879B2EDB0862FF3B5E7BE7A9957BD8392 |
| SSDEEP: | 24576:OxqBExSGxoHItOEPfDnFlZCTBPOYADQBhiPayt5PFAU7L95yLkryP1nmkp/zZHCK:Obt3jPBK9H2QBhiltDZ4INkVIK |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipFileName: | Black Hat Rat.exe |
|---|---|
| ZipUncompressedSize: | 2083328 |
| ZipCompressedSize: | 817739 |
| ZipCRC: | 0xd28ceb7e |
| ZipModifyDate: | 2020:07:23 10:27:06 |
| ZipCompression: | Deflated |
| ZipBitFlag: | - |
| ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 744 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES7056.tmp" "c:\Users\admin\AppData\Local\Temp\CSCC87F12261B8A4470A266D1332BB62ED1.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.51209.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
| 3096 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Black Hat Rat.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 3468 | "C:\Users\admin\Desktop\Black Hat Rat.exe" | C:\Users\admin\Desktop\Black Hat Rat.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Black Hat Rat Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 3572 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\pxwo3uni.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
| 4040 | "C:\Windows\System32\cmd.exe" /c ver > C:\Users\admin\AppData\Local\Temp\outs.txt & exit | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 4052 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\Desktop\Stub.ps1" "-Command" "if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3096) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (4052) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (4052) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4052 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZQT675FTSRQYFQKV26RW.temp | binary | |
MD5:BC94E8ADE0AA1E1EDA10EFEA7807ECCA | SHA256:1D22BA6A334C18138A05BFBDDD29C08D1135E5BA84E09CEFD444976450B9E598 | |||
| 4052 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:BC94E8ADE0AA1E1EDA10EFEA7807ECCA | SHA256:1D22BA6A334C18138A05BFBDDD29C08D1135E5BA84E09CEFD444976450B9E598 | |||
| 3096 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\Black Hat Rat.exe | executable | |
MD5:3377B9F67F552E05B131EEB19D9997DF | SHA256:059112D9275D8865783E6A5F7145D07861C72045CD2C703BDCC7A722F07F11C9 | |||
| 4052 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF126970.TMP | binary | |
MD5:6E746FD7D50D37D308785006CF8D44E1 | SHA256:4F3C05CF195C5CB4506CE8A2B921073F18D9FBD807EBA875B51E7B83BD2E1A35 | |||
| 3096 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\GeoIP.dat | binary | |
MD5:C8DB63170E85B35CE51B5D1AEF098708 | SHA256:6C15C5F8E3FAEC8ADF4321FD8F9D62F3F4DD645DAFD0F9F6C52B118001654D36 | |||
| 3096 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\Stub.ps1 | text | |
MD5:98D7C085D524E6E5BAADC74EEB446308 | SHA256:1B115F64530BFA161404FC74E9626457D95628C1B20BEC1B08A5CD52360C2989 | |||
| 744 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RES7056.tmp | binary | |
MD5:BC65AD6A4940F39729C343BE3F28EE2B | SHA256:BC639DA9CA54F94F84184EA8C1A2DF6DB0932D5F9BE51EA4FE157119B5D716E8 | |||
| 3572 | csc.exe | C:\Users\admin\AppData\Local\Temp\pxwo3uni.dll | executable | |
MD5:A3195D7606F1377C1F8B24839B360429 | SHA256:B94BB0C6302231CE34C991E9AE472C415ED84122F6A6D775013BEA8FEC97C6C9 | |||
| 4040 | cmd.exe | C:\Users\admin\AppData\Local\Temp\outs.txt | text | |
MD5:082F2E97E670228E3B323C6A3A874F40 | SHA256:292BF366A534157E5414F344218C9DF828E2F211617FC84352F3AB2564050941 | |||
| 4052 | powershell.exe | C:\Users\admin\AppData\Local\Temp\pxwo3uni.cmdline | text | |
MD5:28962EAA43915149B4A03996925DEB01 | SHA256:AB10CBBC3D3E461E728E7F6184B513EE0A60E9081207D71183D82A213CA36552 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2624 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1076 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |