File name:

Black Hat Rat.zip

Full analysis: https://app.any.run/tasks/db014507-581b-488f-aa62-20b9046a8dc3
Verdict: Malicious activity
Analysis date: June 27, 2023, 06:44:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

46C0A52D5D153B62E9DB80D3DF4AB6D3

SHA1:

DC90337CF116964E810C71FCF6F5844A4AC2ABE6

SHA256:

B3D7AC1B309A709307B5EBAD4CB4108879B2EDB0862FF3B5E7BE7A9957BD8392

SSDEEP:

24576:OxqBExSGxoHItOEPfDnFlZCTBPOYADQBhiPayt5PFAU7L95yLkryP1nmkp/zZHCK:Obt3jPBK9H2QBhiltDZ4INkVIK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Black Hat Rat.exe (PID: 3468)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4052)
    • Starts Visual C# compiler

      • powershell.exe (PID: 4052)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • powershell.exe (PID: 4052)
    • Reads the Internet Settings

      • powershell.exe (PID: 4052)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 3572)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 4052)
  • INFO

    • Manual execution by a user

      • Black Hat Rat.exe (PID: 3468)
      • powershell.exe (PID: 4052)
    • Reads the machine GUID from the registry

      • Black Hat Rat.exe (PID: 3468)
      • csc.exe (PID: 3572)
      • cvtres.exe (PID: 744)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3096)
    • The process checks LSA protection

      • Black Hat Rat.exe (PID: 3468)
      • csc.exe (PID: 3572)
      • cvtres.exe (PID: 744)
    • Reads the computer name

      • Black Hat Rat.exe (PID: 3468)
    • Checks supported languages

      • Black Hat Rat.exe (PID: 3468)
      • csc.exe (PID: 3572)
      • cvtres.exe (PID: 744)
    • Reads Environment values

      • Black Hat Rat.exe (PID: 3468)
    • Create files in a temporary directory

      • csc.exe (PID: 3572)
      • cvtres.exe (PID: 744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Black Hat Rat.exe
ZipUncompressedSize: 2083328
ZipCompressedSize: 817739
ZipCRC: 0xd28ceb7e
ZipModifyDate: 2020:07:23 10:27:06
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe black hat rat.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
744C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES7056.tmp" "c:\Users\admin\AppData\Local\Temp\CSCC87F12261B8A4470A266D1332BB62ED1.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
12.00.51209.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\cryptsp.dll
3096"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Black Hat Rat.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3468"C:\Users\admin\Desktop\Black Hat Rat.exe" C:\Users\admin\Desktop\Black Hat Rat.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Black Hat Rat
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\black hat rat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\rpcrt4.dll
3572"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\pxwo3uni.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
4040"C:\Windows\System32\cmd.exe" /c ver > C:\Users\admin\AppData\Local\Temp\outs.txt & exitC:\Windows\System32\cmd.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
4052"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\Desktop\Stub.ps1" "-Command" "if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
4 168
Read events
4 097
Write events
71
Delete events
0

Modification events

(PID) Process:(3096) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3096) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4052) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4052) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
2
Suspicious files
8
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4052powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZQT675FTSRQYFQKV26RW.tempbinary
MD5:BC94E8ADE0AA1E1EDA10EFEA7807ECCA
SHA256:1D22BA6A334C18138A05BFBDDD29C08D1135E5BA84E09CEFD444976450B9E598
4052powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:BC94E8ADE0AA1E1EDA10EFEA7807ECCA
SHA256:1D22BA6A334C18138A05BFBDDD29C08D1135E5BA84E09CEFD444976450B9E598
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\Black Hat Rat.exeexecutable
MD5:3377B9F67F552E05B131EEB19D9997DF
SHA256:059112D9275D8865783E6A5F7145D07861C72045CD2C703BDCC7A722F07F11C9
4052powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF126970.TMPbinary
MD5:6E746FD7D50D37D308785006CF8D44E1
SHA256:4F3C05CF195C5CB4506CE8A2B921073F18D9FBD807EBA875B51E7B83BD2E1A35
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\GeoIP.datbinary
MD5:C8DB63170E85B35CE51B5D1AEF098708
SHA256:6C15C5F8E3FAEC8ADF4321FD8F9D62F3F4DD645DAFD0F9F6C52B118001654D36
3096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3096.29160\Stub.ps1text
MD5:98D7C085D524E6E5BAADC74EEB446308
SHA256:1B115F64530BFA161404FC74E9626457D95628C1B20BEC1B08A5CD52360C2989
744cvtres.exeC:\Users\admin\AppData\Local\Temp\RES7056.tmpbinary
MD5:BC65AD6A4940F39729C343BE3F28EE2B
SHA256:BC639DA9CA54F94F84184EA8C1A2DF6DB0932D5F9BE51EA4FE157119B5D716E8
3572csc.exeC:\Users\admin\AppData\Local\Temp\pxwo3uni.dllexecutable
MD5:A3195D7606F1377C1F8B24839B360429
SHA256:B94BB0C6302231CE34C991E9AE472C415ED84122F6A6D775013BEA8FEC97C6C9
4040cmd.exeC:\Users\admin\AppData\Local\Temp\outs.txttext
MD5:082F2E97E670228E3B323C6A3A874F40
SHA256:292BF366A534157E5414F344218C9DF828E2F211617FC84352F3AB2564050941
4052powershell.exeC:\Users\admin\AppData\Local\Temp\pxwo3uni.cmdlinetext
MD5:28962EAA43915149B4A03996925DEB01
SHA256:AB10CBBC3D3E461E728E7F6184B513EE0A60E9081207D71183D82A213CA36552
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2624
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info