File name: | RoAHConC4 2017 v1.1a_dl.rar |
Full analysis: | https://app.any.run/tasks/d80091ae-ab32-472f-b49d-b4a33649b351 |
Verdict: | Malicious activity |
Analysis date: | May 20, 2022, 19:39:27 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 19A16D888B606025B01E842B88EB09A0 |
SHA1: | 6F91675A53F6546E0E7E3B7FDEBCC96F257B1EDE |
SHA256: | C6B9E40558B0BBE5CC1CCDD605760FE3E86D0D0D3E8927ADD6A506E6CDA3160B |
SSDEEP: | 6144:I8ENEH4emRLLW9FF2EmdQGBbm4gQ7/64NRwhi8ENn5TUTGLmC4duKhjNdvjtdAAR:cN5qF2aWxC4NRT8ENAGLmL/5ZaAqU |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2832 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RoAHConC4 2017 v1.1a_dl.rar" | C:\Program Files\WinRAR\WinRAR.exe | Explorer.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
2244 | "C:\Users\admin\Desktop\RoAHConC4 2017 v1.1a.exe" | C:\Users\admin\Desktop\RoAHConC4 2017 v1.1a.exe | — | Explorer.EXE | |||||||||||
User: admin Integrity Level: MEDIUM Description: WLANRoAHConC4 Exit code: 3221226540 Version: 2017.7.23.58 Modules
| |||||||||||||||
2440 | "C:\Users\admin\Desktop\RoAHConC4 2017 v1.1a.exe" | C:\Users\admin\Desktop\RoAHConC4 2017 v1.1a.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: HIGH Description: WLANRoAHConC4 Exit code: 0 Version: 2017.7.23.58 Modules
| |||||||||||||||
1400 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\\start.bat"" | C:\Windows\system32\cmd.exe | — | RoAHConC4 2017 v1.1a.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
4048 | reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA | C:\Windows\system32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2604 | find /i "0x1" | C:\Windows\system32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (grep) Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2988 | C:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings" /v UseWINSAFER 2>nul | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3080 | reg query "HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings" /v UseWINSAFER | C:\Windows\system32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2820 | C:\Windows\system32\cmd.exe /c cscript //NoLogo ".\detadmin.vbs" | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3932 | cscript //NoLogo ".\detadmin.vbs" | C:\Windows\system32\cscript.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Console Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
|
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\RoAHConC4 2017 v1.1a_dl.rar | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2832) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6287EE94-FB4.pma | — | |
MD5:— | SHA256:— | |||
1400 | cmd.exe | C:\Users\admin\Desktop\detadmin.vbs | text | |
MD5:A3F9D8F2367B6F8F6EF64B08DA9ADD59 | SHA256:1FDE1306D4D327E2CCC860D91DE979DA9B7C67A0E3E4D8A1CBC20A4EC2F462E8 | |||
2832 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2832.23021\RoAHConC4 2017 v1.1a.exe | executable | |
MD5:7F0862E441DC4A4F1C2CEDFE54B503D0 | SHA256:288D33C2FF957795D34CA65FB9C74CDFB938AAAF7FE5FDB97DC39CB3A78A5659 | |||
3136 | cmd.exe | C:\Users\admin\Desktop\detadmin.vbs | text | |
MD5:A3F9D8F2367B6F8F6EF64B08DA9ADD59 | SHA256:1FDE1306D4D327E2CCC860D91DE979DA9B7C67A0E3E4D8A1CBC20A4EC2F462E8 | |||
1556 | cmd.exe | C:\Users\admin\Desktop\detadmin.vbs | text | |
MD5:A3F9D8F2367B6F8F6EF64B08DA9ADD59 | SHA256:1FDE1306D4D327E2CCC860D91DE979DA9B7C67A0E3E4D8A1CBC20A4EC2F462E8 | |||
2440 | RoAHConC4 2017 v1.1a.exe | C:\Users\admin\AppData\Local\Temp\end.bat | text | |
MD5:45203D4BF875053C29F77C5BB4DA5622 | SHA256:D19475AB8A3CCABDB1F4B075792732D98DE20DA3D83C917FB11DEA72A1FE3209 | |||
2440 | RoAHConC4 2017 v1.1a.exe | C:\Users\admin\AppData\Local\Temp\start.bat | text | |
MD5:74F60F0CD41421785759AE78B3E53244 | SHA256:0BC43BD178EB394B2974C32ACA08297ED7FB5A44FA8F3830E652810E7A8B7597 | |||
4020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF10c824.TMP | text | |
MD5:64AD8ED3E666540337BA541C549F72F7 | SHA256:BECBDB08B5B37D203A85F2E974407334053BB1D2270F0B3C9A4DB963896F2206 | |||
4020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old | text | |
MD5:7721CDA9F5B73CE8A135471EB53B4E0E | SHA256:DD730C576766A46FFC84E682123248ECE1FF1887EC0ACAB22A5CE93A450F4500 | |||
4020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old~RF10c92e.TMP | text | |
MD5:B628564B8042F6E2CC2F53710AAECDC0 | SHA256:1D3B022BDEE9F48D79E3EC1E93F519036003642D3D72D10B05CFD47F43EFBF13 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3440 | chrome.exe | GET | 200 | 188.114.97.10:80 | http://ifconfig.co/ | US | html | 5.52 Kb | shared |
3440 | chrome.exe | GET | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx | US | crx | 242 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3440 | chrome.exe | 142.250.185.174:443 | clients2.google.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 142.250.185.65:443 | clients2.googleusercontent.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 142.250.184.195:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 188.114.97.10:80 | ifconfig.co | Cloudflare Inc | US | malicious |
3440 | chrome.exe | 142.250.185.228:443 | www.google.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 142.250.184.237:443 | accounts.google.com | Google Inc. | US | suspicious |
3440 | chrome.exe | 142.250.185.238:443 | encrypted-tbn0.gstatic.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 142.250.74.195:443 | update.googleapis.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 142.250.185.106:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3440 | chrome.exe | 216.58.212.131:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
accounts.google.com |
| shared |
www.google.com |
| whitelisted |
clients2.google.com |
| whitelisted |
clients2.googleusercontent.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
encrypted-tbn0.gstatic.com |
| whitelisted |
update.googleapis.com |
| whitelisted |
ssl.gstatic.com |
| whitelisted |
ifconfig.co |
| shared |
fonts.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
3440 | chrome.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ifconfig. co) |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .cloud TLD |