analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

raid_tool - alphascript.zip

Full analysis: https://app.any.run/tasks/7db8e89a-4574-4026-b597-e6ba04c0b866
Verdict: Malicious activity
Analysis date: October 19, 2020, 23:40:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

3E061CDB0DEA5EE253DBBDBAB76F4423

SHA1:

3871E331356B869F1F1ADD16F02B977EA97D9CB1

SHA256:

BA4563BF28A50601E88C1F412D359B94F407E8A49E23CEB651D81445E9C56320

SSDEEP:

196608:egzE5VUziCh92ESzIYsbO1m8v26jrkNDRHcthJZ409aXKNdSF88C0YwAfcjrZIVS:dz/0nzIfi1m8u6QHcthbtE2V0Y9kxjGY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • raid_tool.exe (PID: 3828)
    • Application was dropped or rewritten from another process

      • raid_tool.exe (PID: 3828)
      • raid_tool.exe (PID: 2896)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2684)
      • raid_tool.exe (PID: 2896)
    • Application launched itself

      • raid_tool.exe (PID: 2896)
    • Loads Python modules

      • raid_tool.exe (PID: 3828)
  • INFO

    • Reads settings of System Certificates

      • raid_tool.exe (PID: 3828)
    • Manual execution by user

      • NOTEPAD.EXE (PID: 2520)
      • NOTEPAD.EXE (PID: 1296)
      • raid_tool.exe (PID: 2896)
    • Dropped object may contain Bitcoin addresses

      • raid_tool.exe (PID: 2896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: raid_tool.exe
ZipUncompressedSize: 12028416
ZipCompressedSize: 11572330
ZipCRC: 0x3365e02f
ZipModifyDate: 2020:07:22 17:41:08
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe notepad.exe no specs notepad.exe no specs raid_tool.exe raid_tool.exe

Process information

PID
CMD
Path
Indicators
Parent process
2684"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\raid_tool - alphascript.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1296"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\ok.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2520"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\tokens.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2896"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
3828"C:\Users\admin\Desktop\raid_tool.exe" C:\Users\admin\Desktop\raid_tool.exe
raid_tool.exe
User:
admin
Integrity Level:
MEDIUM
Total events
957
Read events
937
Write events
20
Delete events
0

Modification events

(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2684) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\raid_tool - alphascript.zip
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(2684) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
35
Suspicious files
3
Text files
931
Unknown types
2

Dropped files

PID
Process
Filename
Type
2684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2684.20869\README.txttext
MD5:1CE1B56C1F38CB4E71EED72F09B465A8
SHA256:CD6270483EC551E7F55D0E7C792EF5AF2C525658304C738FA80732453B0104AE
2684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2684.20869\ok.txttext
MD5:770672EE46BD0459097F43A36085B1CB
SHA256:DAF4A07360A51955AEE214F253B7845E57266C389F5E312B5B7A4C3C47B50334
2520NOTEPAD.EXEC:\Users\admin\Desktop\tokens.txttext
MD5:770672EE46BD0459097F43A36085B1CB
SHA256:DAF4A07360A51955AEE214F253B7845E57266C389F5E312B5B7A4C3C47B50334
2684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2684.20869\tokens.txttext
MD5:A5B793873B82DAA8ACD4C82C4B6D77C1
SHA256:AC8BFA8ACA2F86CD0834B678E3FA8764C576ACF71B9994F6CEE03C60F86D369D
2684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2684.20869\raid_tool.exeexecutable
MD5:BA865853F148629A9EC58B48E916C4D9
SHA256:571DF63F5400C8B8E50D47590FD4BE31A296A7B990DC670CB9723DCD9103D9C2
2896raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI28962\_queue.pydexecutable
MD5:BC5FCE7B8DE6CA765CBF79F9D0587164
SHA256:A5DB4D041F40FB01761B5BAA907099DB89CF891B0DF0251D92DA2FBF9DC3897B
2896raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI28962\_decimal.pydexecutable
MD5:8601C853146A4BE85238A57C9FD56865
SHA256:2A57023D4F355E3857187C02577FA4641A4D1DFF195196B3C33B90322EDF9FD4
2896raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI28962\_multiprocessing.pydexecutable
MD5:8901E96BB7A8EEAD994AF2BDF54A2447
SHA256:823A96F080A3424F4C5327CF61FF517723E19A69679EBE93EA97061063D8D593
2896raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI28962\_asyncio.pydexecutable
MD5:5435CE08F40FBE43230CAE8D3DFF232C
SHA256:79FDA30CBFC95DB2BA60646FF53DFF45B5ADD57C12241C4A82FA798CB3B543DF
2896raid_tool.exeC:\Users\admin\AppData\Local\Temp\_MEI28962\_overlapped.pydexecutable
MD5:AA428E44A78A280EC8152C43D8284F6F
SHA256:F8FDA2A6E3FF0069E634FEEC4854EE7A8C24134C747DE3211AC2BA26E0188C79
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
34
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3828
raid_tool.exe
162.159.134.233:443
discordapp.com
Cloudflare Inc
shared
3828
raid_tool.exe
162.159.134.234:443
gateway.discord.gg
Cloudflare Inc
shared

DNS requests

Domain
IP
Reputation
discordapp.com
  • 162.159.134.233
  • 162.159.129.233
  • 162.159.133.233
  • 162.159.130.233
  • 162.159.135.233
whitelisted
gateway.discord.gg
  • 162.159.134.234
  • 162.159.133.234
  • 162.159.136.234
  • 162.159.130.234
  • 162.159.135.234
whitelisted

Threats

No threats detected
No debug info