analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

raid_tool - alphascript.zip

Full analysis: https://app.any.run/tasks/72d61d65-95ea-4b32-9f70-2fc92928b4de
Verdict: Malicious activity
Analysis date: October 20, 2020, 00:13:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

3E061CDB0DEA5EE253DBBDBAB76F4423

SHA1:

3871E331356B869F1F1ADD16F02B977EA97D9CB1

SHA256:

BA4563BF28A50601E88C1F412D359B94F407E8A49E23CEB651D81445E9C56320

SSDEEP:

196608:egzE5VUziCh92ESzIYsbO1m8v26jrkNDRHcthJZ409aXKNdSF88C0YwAfcjrZIVS:dz/0nzIfi1m8u6QHcthbtE2V0Y9kxjGY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • raid_tool.exe (PID: 3000)
      • raid_tool.exe (PID: 2824)
      • raid_tool.exe (PID: 3544)
      • raid_tool.exe (PID: 3256)
      • raid_tool.exe (PID: 1272)
      • raid_tool.exe (PID: 2580)
      • raid_tool.exe (PID: 2240)
      • raid_tool.exe (PID: 2388)
      • raid_tool.exe (PID: 3768)
      • raid_tool.exe (PID: 952)
      • raid_tool.exe (PID: 1820)
      • raid_tool.exe (PID: 2524)
      • raid_tool.exe (PID: 3208)
      • raid_tool.exe (PID: 3212)
      • raid_tool.exe (PID: 2844)
      • raid_tool.exe (PID: 1928)
      • raid_tool.exe (PID: 3100)
      • raid_tool.exe (PID: 1704)
      • raid_tool.exe (PID: 2352)
      • raid_tool.exe (PID: 2760)
      • raid_tool.exe (PID: 4064)
      • raid_tool.exe (PID: 2180)
    • Loads dropped or rewritten executable

      • raid_tool.exe (PID: 2824)
      • raid_tool.exe (PID: 3208)
      • raid_tool.exe (PID: 3212)
      • raid_tool.exe (PID: 3100)
      • raid_tool.exe (PID: 2844)
      • raid_tool.exe (PID: 1928)
      • raid_tool.exe (PID: 1704)
      • raid_tool.exe (PID: 2352)
      • raid_tool.exe (PID: 2180)
      • raid_tool.exe (PID: 2760)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • raid_tool.exe (PID: 3000)
      • raid_tool.exe (PID: 3544)
      • raid_tool.exe (PID: 3256)
      • raid_tool.exe (PID: 1272)
      • raid_tool.exe (PID: 3768)
      • raid_tool.exe (PID: 2240)
      • raid_tool.exe (PID: 2580)
      • raid_tool.exe (PID: 2388)
      • raid_tool.exe (PID: 1820)
      • raid_tool.exe (PID: 952)
      • raid_tool.exe (PID: 2524)
      • raid_tool.exe (PID: 4064)
    • Application launched itself

      • raid_tool.exe (PID: 3000)
      • raid_tool.exe (PID: 3544)
      • raid_tool.exe (PID: 3256)
      • raid_tool.exe (PID: 1272)
      • raid_tool.exe (PID: 2580)
      • raid_tool.exe (PID: 2240)
      • raid_tool.exe (PID: 952)
      • raid_tool.exe (PID: 3768)
      • raid_tool.exe (PID: 2524)
      • raid_tool.exe (PID: 4064)
    • Loads Python modules

      • raid_tool.exe (PID: 2824)
      • raid_tool.exe (PID: 3208)
      • raid_tool.exe (PID: 3212)
      • raid_tool.exe (PID: 3100)
      • raid_tool.exe (PID: 2760)
      • raid_tool.exe (PID: 1928)
      • raid_tool.exe (PID: 2352)
      • raid_tool.exe (PID: 2844)
      • raid_tool.exe (PID: 1704)
      • raid_tool.exe (PID: 2180)
  • INFO

    • Manual execution by user

      • NOTEPAD.EXE (PID: 3672)
      • raid_tool.exe (PID: 3000)
      • NOTEPAD.EXE (PID: 3736)
      • raid_tool.exe (PID: 3544)
      • raid_tool.exe (PID: 3256)
      • raid_tool.exe (PID: 1272)
      • raid_tool.exe (PID: 2240)
      • raid_tool.exe (PID: 2580)
      • raid_tool.exe (PID: 3768)
      • raid_tool.exe (PID: 2388)
      • raid_tool.exe (PID: 1820)
      • raid_tool.exe (PID: 2524)
      • raid_tool.exe (PID: 952)
      • raid_tool.exe (PID: 4064)
    • Reads settings of System Certificates

      • raid_tool.exe (PID: 2824)
    • Dropped object may contain Bitcoin addresses

      • raid_tool.exe (PID: 3000)
      • raid_tool.exe (PID: 3544)
      • raid_tool.exe (PID: 3256)
      • raid_tool.exe (PID: 2240)
      • raid_tool.exe (PID: 2388)
      • raid_tool.exe (PID: 1820)
      • raid_tool.exe (PID: 952)
      • raid_tool.exe (PID: 1272)
      • raid_tool.exe (PID: 3768)
      • raid_tool.exe (PID: 2524)
      • raid_tool.exe (PID: 2580)
      • raid_tool.exe (PID: 4064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: raid_tool.exe
ZipUncompressedSize: 12028416
ZipCompressedSize: 11572330
ZipCRC: 0x3365e02f
ZipModifyDate: 2020:07:22 17:41:08
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
25
Malicious processes
19
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs notepad.exe no specs notepad.exe no specs raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe no specs raid_tool.exe raid_tool.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3316"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\raid_tool - alphascript.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3672"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\ok.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3736"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\tokens.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3000"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
2824"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
raid_tool.exe
User:
admin
Integrity Level:
MEDIUM
3544"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
3256"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
1272"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
2580"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
2240"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Total events
3 055
Read events
3 030
Write events
25
Delete events
0

Modification events

(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3316) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\raid_tool - alphascript.zip
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3316) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(3316) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
408
Suspicious files
36
Text files
9 655
Unknown types
20

Dropped files

PID
Process
Filename
Type
3316WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3316.18774\raid_tool.exe
MD5:
SHA256:
3316WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3316.18774\README.txt
MD5:
SHA256:
3316WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3316.18774\tokens.txt
MD5:
SHA256:
3316WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3316.18774\ok.txt
MD5:
SHA256:
3736NOTEPAD.EXEC:\Users\admin\Desktop\tokens.txttext
MD5:770672EE46BD0459097F43A36085B1CB
SHA256:DAF4A07360A51955AEE214F253B7845E57266C389F5E312B5B7A4C3C47B50334
3000raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI30002\_ssl.pydexecutable
MD5:B9ECF769FC63A542A113CA1552DC7A7B
SHA256:E0BDB16CFFC7B5A19C5AF22D8A33D3C999D55A3117F2DA07ED3171CA9487927E
3000raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI30002\_hashlib.pydexecutable
MD5:05362ADD80824B06014645A7951337D8
SHA256:20B3A3D3350B3D4D57911ECFDB15F77512A6E73C3BF72B410724F81C79A5B1AF
3000raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI30002\_lzma.pydexecutable
MD5:54F12E2385A77D825AE4D41A4AC515FE
SHA256:08DE18FBA635822F3BB89C9429F175E3680B7261546430BA9E2ED09BB31F5218
3000raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI30002\_ctypes.pydexecutable
MD5:3A2E78784B929003A6BACEEBDB0EFA4D
SHA256:F205948B01B29CB244AE09C5B57FD4B6C8F356DFCD2F8CB49E7CFD177A748CF9
3000raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI30002\cryptography\hazmat\bindings\_constant_time.cp38-win32.pydexecutable
MD5:F1D46516EB5AAFF20393839CBD446009
SHA256:CAA9A51FECD9E2FDA8AFC55E6779BED7280E20CDEFE73AAF1DF860691689CA61
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
34
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2824
raid_tool.exe
162.159.134.234:443
gateway.discord.gg
Cloudflare Inc
shared
2824
raid_tool.exe
162.159.133.233:443
discordapp.com
Cloudflare Inc
shared

DNS requests

Domain
IP
Reputation
discordapp.com
  • 162.159.133.233
  • 162.159.134.233
  • 162.159.129.233
  • 162.159.130.233
  • 162.159.135.233
whitelisted
gateway.discord.gg
  • 162.159.134.234
  • 162.159.135.234
  • 162.159.136.234
  • 162.159.130.234
  • 162.159.133.234
whitelisted

Threats

No threats detected
No debug info