File name:

Sentry Mba 2020.rar

Full analysis: https://app.any.run/tasks/4bc0df69-3b36-47cc-82c2-371282355869
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: March 30, 2021, 04:04:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
evasion
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2408484B39868ADC66BD5730CCB4D1D1

SHA1:

5EC56B0976703E4CF3F594F35D5F22E2023BF1B2

SHA256:

B585A78AD9CA7D5DEA84647B43B1EAFA2949A63BAB838BB69D668967FF1CE450

SSDEEP:

196608:LDVklQyCPX8MEvlroN4o34zfJUNGEbeML3NDyGCJBDSQ:ryCPXOrroIKNGEb77NDmGQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3180)
    • Drops executable file immediately after starts

      • CTEagles_MBY.exe (PID: 1836)
    • Application was dropped or rewritten from another process

      • CTEagles_MBY.exe (PID: 1836)
      • CTEAGLES_MBY.EXE (PID: 988)
      • WVDEVIWW.EXE (PID: 924)
    • Connects to CnC server

      • WVDEVIWW.EXE (PID: 924)
    • AZORULT was detected

      • WVDEVIWW.EXE (PID: 924)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2984)
      • CTEagles_MBY.exe (PID: 1836)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2984)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2984)
      • CTEagles_MBY.exe (PID: 1836)
    • Reads Environment values

      • CTEAGLES_MBY.EXE (PID: 988)
    • Checks for external IP

      • CTEAGLES_MBY.EXE (PID: 988)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2984)
    • Manual execution by user

      • CTEagles_MBY.exe (PID: 1836)
    • Reads settings of System Certificates

      • CTEAGLES_MBY.EXE (PID: 988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe searchprotocolhost.exe no specs cteagles_mby.exe cteagles_mby.exe #AZORULT wvdeviww.exe

Process information

PID
CMD
Path
Indicators
Parent process
924"C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE" C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE
CTEagles_MBY.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\wvdeviww.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
988"C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE" C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE
CTEagles_MBY.exe
User:
admin
Company:
yp140
Integrity Level:
MEDIUM
Description:
CTEagles_MBY
Exit code:
4294967295
Version:
2.2.0.3
Modules
Images
c:\users\admin\appdata\local\temp\cteagles_mby.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1836"C:\Users\admin\Desktop\Eagle2203\CTEagles_MBY.exe" C:\Users\admin\Desktop\Eagle2203\CTEagles_MBY.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\eagle2203\cteagles_mby.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2984"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Sentry Mba 2020.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3180"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 349
Read events
1 280
Write events
69
Delete events
0

Modification events

(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Sentry Mba 2020.rar
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3180) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3180) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
34
Suspicious files
9
Text files
21
Unknown types
1

Dropped files

PID
Process
Filename
Type
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\AForge.dllexecutable
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\2Captcha.dllexecutable
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.exeexecutable
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.xmlxml
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.exe.configxml
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\GlobalKeys.inihtml
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Debug.htmlhtml
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp1.tiffimage
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp2.tiffimage
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp4.tiffimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
8
DNS requests
5
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
988
CTEAGLES_MBY.EXE
GET
301
172.67.180.162:80
http://crackerteam.com/cracker.php
US
suspicious
924
WVDEVIWW.EXE
POST
170.39.77.7:443
http://tenntechs.com:443/access/index.php
unknown
malicious
988
CTEAGLES_MBY.EXE
GET
200
162.88.193.70:80
http://checkip.dyndns.org/
US
html
105 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
924
WVDEVIWW.EXE
170.39.77.7:443
tenntechs.com
malicious
988
CTEAGLES_MBY.EXE
172.67.180.162:80
crackerteam.com
US
unknown
988
CTEAGLES_MBY.EXE
172.67.180.162:443
crackerteam.com
US
unknown
988
CTEAGLES_MBY.EXE
104.21.43.149:443
crackerteam.com
Cloudflare Inc
US
unknown
988
CTEAGLES_MBY.EXE
162.88.193.70:80
checkip.dyndns.org
US
malicious

DNS requests

Domain
IP
Reputation
tenntechs.com
  • 170.39.77.7
malicious
crackerteam.com
  • 172.67.180.162
  • 104.21.43.149
suspicious
www.crackerteam.com
  • 104.21.43.149
  • 172.67.180.162
suspicious
checkip.dyndns.org
  • 162.88.193.70
  • 131.186.113.70
  • 216.146.43.71
  • 216.146.43.70
  • 131.186.161.70
shared

Threats

PID
Process
Class
Message
924
WVDEVIWW.EXE
Potentially Bad Traffic
ET INFO TLS Handshake Failure
924
WVDEVIWW.EXE
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.3 Client Checkin M2
924
WVDEVIWW.EXE
A Network Trojan was detected
STEALER [PTsecurity] AZORult
924
WVDEVIWW.EXE
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
1052
svchost.exe
Misc activity
AV INFO Query to checkip.dyndns. Domain
988
CTEAGLES_MBY.EXE
Potential Corporate Privacy Violation
ET POLICY External IP Lookup - checkip.dyndns.org
988
CTEAGLES_MBY.EXE
Potential Corporate Privacy Violation
POLICY [PTsecurity] External IP Check checkip.dyndns.org
988
CTEAGLES_MBY.EXE
Potentially Bad Traffic
ET POLICY DynDNS CheckIp External IP Address Server Response
1 ETPRO signatures available at the full report
Process
Message
CTEagles_MBY.exe
C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE
CTEagles_MBY.exe
C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE