analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

Cracked_by_xany_1.zip

Full analysis: https://app.any.run/tasks/f3ddaa75-9c16-43f4-8f5e-f6b0aa70fc16
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: June 11, 2019, 23:58:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
rat
quasar
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

1D172FF502F0801053A05BD5AC134963

SHA1:

0595C3662A2F4566647DC6C3782195037C5A9E04

SHA256:

D2F90B648F96F5D993CA89DFE81E92DEB650A8A7FFB435A75B8E179A36880A0D

SSDEEP:

98304:CG8wRhKKugYD/fKKu8ADUS+fFyinaUDUPQlLNSqgyJJ:1/vuFfvuD4S+psgYHaJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Coca Crypter cracked by xany.exe (PID: 2416)
      • icsys.icn.exe (PID: 2140)
      • coca crypter cracked by xany.exe  (PID: 2512)
      • Coca Crypter cracked by xany.exe (PID: 2672)
      • icsys.icn.exe (PID: 3280)
      • coca crypter cracked by xany.exe  (PID: 2380)
    • Changes the autorun value in the registry

      • coca crypter cracked by xany.exe  (PID: 2512)
    • QUASAR was detected

      • RegAsm.exe (PID: 3584)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Coca Crypter cracked by xany.exe (PID: 2416)
      • WinRAR.exe (PID: 3296)
      • coca crypter cracked by xany.exe  (PID: 2512)
      • Coca Crypter cracked by xany.exe (PID: 2672)
    • Starts itself from another location

      • Coca Crypter cracked by xany.exe (PID: 2416)
      • Coca Crypter cracked by xany.exe (PID: 2672)
    • Starts application with an unusual extension

      • Coca Crypter cracked by xany.exe (PID: 2416)
      • Coca Crypter cracked by xany.exe (PID: 2672)
    • Creates files in the user directory

      • coca crypter cracked by xany.exe  (PID: 2512)
    • Checks for external IP

      • RegAsm.exe (PID: 3584)
    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 3296)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Coca Crypt/Coca Crypter cracked by xany.exe
ZipUncompressedSize: 1430488
ZipCompressedSize: 814387
ZipCRC: 0x0af619ed
ZipModifyDate: 2019:06:10 13:58:25
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
14
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start winrar.exe coca crypter cracked by xany.exe coca crypter cracked by xany.exe  icsys.icn.exe no specs regasm.exe no specs #QUASAR regasm.exe coca crypter cracked by xany.exe coca crypter cracked by xany.exe  no specs icsys.icn.exe no specs regasm.exe no specs rundll32.exe no specs regasm.exe no specs notepad.exe no specs regasm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3296"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2416"C:\Users\admin\AppData\Local\Temp\Rar$EXa3296.6696\Coca Crypt\Coca Crypter cracked by xany.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3296.6696\Coca Crypt\Coca Crypter cracked by xany.exe
WinRAR.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2512"c:\users\admin\appdata\local\temp\rar$exa3296.6696\coca crypt\coca crypter cracked by xany.exe " c:\users\admin\appdata\local\temp\rar$exa3296.6696\coca crypt\coca crypter cracked by xany.exe 
Coca Crypter cracked by xany.exe
User:
admin
Integrity Level:
MEDIUM
2140C:\Users\admin\AppData\Local\icsys.icn.exeC:\Users\admin\AppData\Local\icsys.icn.exeCoca Crypter cracked by xany.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2652"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.execoca crypter cracked by xany.exe 
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
3584"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
coca crypter cracked by xany.exe 
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.6.1055.0 built by: NETFXREL2
2672"C:\Users\admin\AppData\Local\Temp\Rar$EXa3296.8585\Coca Crypt\Coca Crypter cracked by xany.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3296.8585\Coca Crypt\Coca Crypter cracked by xany.exe
WinRAR.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
2380"c:\users\admin\appdata\local\temp\rar$exa3296.8585\coca crypt\coca crypter cracked by xany.exe " c:\users\admin\appdata\local\temp\rar$exa3296.8585\coca crypt\coca crypter cracked by xany.exe Coca Crypter cracked by xany.exe
User:
admin
Integrity Level:
MEDIUM
3280C:\Users\admin\AppData\Local\icsys.icn.exeC:\Users\admin\AppData\Local\icsys.icn.exeCoca Crypter cracked by xany.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
764"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.execoca crypter cracked by xany.exe 
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Total events
821
Read events
771
Write events
50
Delete events
0

Modification events

(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3296) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1.zip
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3296) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(3296) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1
Executable files
16
Suspicious files
2
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2416Coca Crypter cracked by xany.exeC:\Users\admin\AppData\Local\Temp\~DF7AE0C9B00C4D4D7A.TMP
MD5:
SHA256:
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\__rzi_3296.7419
MD5:
SHA256:
2140icsys.icn.exeC:\Users\admin\AppData\Local\Temp\~DF37B205F8B025EA94.TMP
MD5:
SHA256:
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1\XenosCurrentProfile.xprtext
MD5:2D8D5ADFCCCA966AE064650B4D38348B
SHA256:1FF1C0710F87B2F19A981B9BD65A9A695AD16B3AC9C03D6E76B5EF6362E5909A
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1\rundll.dllexecutable
MD5:DC230A66F89B4E42E2330BE22201CA1F
SHA256:895AEB8EEDF46402211B8378C755CB4A15CC4E4F5064F1B9C665036F4ACDA29B
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Cracked_by_xany_1\Protectednow.exe,executable
MD5:DF5A4B14AF0F968E83E2870A5E6E97E5
SHA256:FBBE6C205ADD543F314F19F4888DDE5760D2585FE1E000110DD16F5A9CAAD7C3
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3296.6696\Coca Crypt\Protectednow.exe,executable
MD5:DF5A4B14AF0F968E83E2870A5E6E97E5
SHA256:FBBE6C205ADD543F314F19F4888DDE5760D2585FE1E000110DD16F5A9CAAD7C3
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3296.6696\Coca Crypt\rundll.dllexecutable
MD5:DC230A66F89B4E42E2330BE22201CA1F
SHA256:895AEB8EEDF46402211B8378C755CB4A15CC4E4F5064F1B9C665036F4ACDA29B
2416Coca Crypter cracked by xany.exeC:\users\admin\appdata\local\temp\rar$exa3296.6696\coca crypt\coca crypter cracked by xany.exe executable
MD5:883F9AEB777D701E39D592E0C3097419
SHA256:4094C31D0FC028801C9B41199B0FD42D230656CE0CF0F708BE4FB32069CB921F
3296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3296.6696\Coca Crypt\Coca Crypter cracked by xany.exeexecutable
MD5:4BB0A3628410F22F8F09FD0D122023C0
SHA256:E50C8234D3978E2EBA1142F9B828596A2EA966ABC5B327B3570BF16DD9999064
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3584
RegAsm.exe
GET
200
185.194.141.58:80
http://ip-api.com/json/
DE
text
321 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3584
RegAsm.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
3584
RegAsm.exe
104.248.42.215:4782
US
malicious

DNS requests

Domain
IP
Reputation
ip-api.com
  • 185.194.141.58
shared

Threats

PID
Process
Class
Message
3584
RegAsm.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3584
RegAsm.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
3584
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar 1.3 RAT IP Lookup ip-api.com (HTTP headeer)
3584
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar RAT
1 ETPRO signatures available at the full report
No debug info