analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

JungkookSploit.rar

Full analysis: https://app.any.run/tasks/235ccf4b-b046-459a-a67f-a4aa89f6b4f7
Verdict: Malicious activity
Analysis date: July 11, 2019, 19:27:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

0B7318106D3663809140E8139AC8A8C6

SHA1:

08A7518BC23BEAFBAD67B522D7EC6C566245EEFF

SHA256:

D4A7017B105791A9C0D52A684F9FCB0FD21C4750B689F9D6B072182DE1058EDB

SSDEEP:

49152:A50qg9p8lzK9Du2NplBaA2HBsw+e1FX9ZbX29JU+SDj756HNU5j9:AzgsFK9a2H3aA2HBsw+erXa9JU+SbCWZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • JungkookSploit.exe (PID: 1640)
    • Loads dropped or rewritten executable

      • JungkookSploit.exe (PID: 1640)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • JungkookSploit.exe (PID: 1640)
      • WinRAR.exe (PID: 3040)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3040)
    • Executed via COM

      • explorer.exe (PID: 3600)
      • explorer.exe (PID: 2660)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
8
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start winrar.exe jungkooksploit.exe cmd.exe no specs explorer.exe no specs explorer.exe no specs cmd.exe no specs explorer.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3040"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\JungkookSploit.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1640"C:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\JungkookSploit.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\JungkookSploit.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AxonSimpleUI
Version:
1.0.0.0
3088cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa3040.31693\open roblox folder - u dont need to add this.bat" "C:\Windows\system32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3880explorer C:\Users\admin\AppData\Local\Roblox\Versions\version-8ea9490e0ca04991C:\Windows\explorer.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2660C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3804cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa3040.33979\open roblox folder - u dont need to add this.bat" "C:\Windows\system32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2812explorer C:\Users\admin\AppData\Local\Roblox\Versions\version-8ea9490e0ca04991C:\Windows\explorer.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3600C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 738
Read events
1 591
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\Workspace\autoexe\init.luatext
MD5:B86B1B29646BD0A54D10C6D03027CF86
SHA256:16D738030422011E4C543109847CEDBB6264DEDE4978E9263BA69A5E88FF8277
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\JungkookSploit.dllexecutable
MD5:F61349E9F5B03F86AEED5D0FCC46C725
SHA256:9B111F05F83F16F726AF85B19C44DB13EBA2452C56866DE565AF6D34941667C0
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\PUT THESE IN ROBLOX FOLDER\open roblox folder - u dont need to add this.battext
MD5:3DB345F2BE33730515BBE28B997129C4
SHA256:38E48B87926DFAF78A5C27A45D795962A36048A7543A35DE6C9A2C4CDCDA0B91
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3040.33979\open roblox folder - u dont need to add this.battext
MD5:3DB345F2BE33730515BBE28B997129C4
SHA256:38E48B87926DFAF78A5C27A45D795962A36048A7543A35DE6C9A2C4CDCDA0B91
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\ScintillaNET.dllexecutable
MD5:9166536C31F4E725E6BEFE85E2889A4B
SHA256:AD0CC5A4D4A6AAE06EE360339C851892B74B8A275CE89C1B48185672179F3163
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\ScintillaNET.xmlxml
MD5:E200C312A4C43F78021A9CFD75B0B9D2
SHA256:D40A05B1D45B13C7AD7395024743E68667A340D488CD9ACD71BC4824D6944538
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\JungkookSploit.exeexecutable
MD5:E6DF29D0F003599E63D42D9D136C878B
SHA256:D0F3F23C21883A0CA1ED78C981FB355CFA7650591BE5802121449D2ED9BD70BD
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3040.30471\JungkookSploit\PUT THESE IN ROBLOX FOLDER\VMProtectSDK32.dllexecutable
MD5:1E6FDCD6D847BBF9CD3A37BA72CDA3F7
SHA256:06754CB39C2E814577AC287B7DD0083F59933C867038407CDDFB22EBC6C0F193
3040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3040.31693\open roblox folder - u dont need to add this.battext
MD5:3DB345F2BE33730515BBE28B997129C4
SHA256:38E48B87926DFAF78A5C27A45D795962A36048A7543A35DE6C9A2C4CDCDA0B91
1640JungkookSploit.exeC:\Users\admin\AppData\Local\Temp\ScintillaNET\3.6.3\x86\SciLexer.dllexecutable
MD5:2FF7ACFA80647EE46CC3C0E446327108
SHA256:08F0CBBC5162F236C37166772BE2C9B8FFD465D32DF17EA9D45626C4ED2C911D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info