| File name: | TempoRX.rar |
| Full analysis: | https://app.any.run/tasks/7420aaf9-f49a-465d-bc7d-2ba444738d68 |
| Verdict: | Malicious activity |
| Threats: | Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions. |
| Analysis date: | January 08, 2024, 19:41:07 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | A200F355DD33ED2F4F0C0234F8BF4E4C |
| SHA1: | BA85EA9D9A198ECD3F8376DA7D9F9E441F311711 |
| SHA256: | DC28A4E388FAECBB1C748182646ACDE53383B82A3D7E8E7CC5E82634E9503AE0 |
| SSDEEP: | 98304:Gzy5IPMBLTwCKiF8dVLVMPqRIl9uSm1Cjq1I7iMGjTu7jM1VCV1fXurAqQIXUFdq:/m/7/ |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 300 | taskeng.exe {CE1452CD-5E82-4DCD-B0CC-498574D17563} | C:\Windows\System32\taskeng.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Engine Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 612 | "C:\Windows\system32\Dwm.exe" | C:\Windows\System32\dwm.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Desktop Window Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 984 | "C:\Users\admin\AppData\Local\Temp\3582-490\uihost32.exe" | C:\Users\admin\AppData\Local\Temp\3582-490\uihost32.exe | — | uihost32.exe | |||||||||||
User: admin Company: McAfee, Inc. Integrity Level: MEDIUM Description: McAfee WebAdvisor Exit code: 2 Version: 3.2.0 Modules
| |||||||||||||||
| 1056 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\TempoRX.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 1164 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1564 | C:\Windows\System32\ctfmon.exe | C:\Windows\System32\ctfmon.exe | taskeng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: CTF Loader Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1652 | "C:\Users\admin\Desktop\TempoRX\VID001.exe" | C:\Users\admin\Desktop\TempoRX\VID001.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 2 Modules
| |||||||||||||||
| 1860 | "C:\Windows\system32\cmd.exe" /c taskkill /f /im uihost* & taskkill /f /im DOC0* | C:\Windows\System32\cmd.exe | — | VID001.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1928 | "C:\Users\admin\AppData\Roaming\TempoRX\VID001.exe" | C:\Users\admin\AppData\Roaming\TempoRX\VID001.exe | VID001.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2052 | "C:\Users\admin\Desktop\TempoRX\uihost32.exe" | C:\Users\admin\Desktop\TempoRX\uihost32.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1164) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1056) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1652 | VID001.exe | C:\Users\admin\AppData\Local\Temp\000E2CF7_rar\VID001.exe | executable | |
MD5:E23E3052FEEF30F1C52F7901017AC9A2 | SHA256:80285E4017C567156DAF88CA558214B06F09CCBF5A487B2BA99F96C384035802 | |||
| 1928 | VID001.exe | C:\Users\admin\AppData\Roaming\TempoRX\uihost32.exe | executable | |
MD5:4FCA837855B3BCED7559889ADB41C4B7 | SHA256:8A366B1D30DD4D03AD8C5C18D0FB978D00D16F5F465BD59DB6E09B034775C3EC | |||
| 1928 | VID001.exe | C:\Users\admin\AppData\Local\Temp\000E363E_rar\VID001.exe | executable | |
MD5:E23E3052FEEF30F1C52F7901017AC9A2 | SHA256:80285E4017C567156DAF88CA558214B06F09CCBF5A487B2BA99F96C384035802 | |||
| 1056 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1056.36840\TempoRX\VID001.exe | executable | |
MD5:E23E3052FEEF30F1C52F7901017AC9A2 | SHA256:80285E4017C567156DAF88CA558214B06F09CCBF5A487B2BA99F96C384035802 | |||
| 1928 | VID001.exe | C:\Users\admin\AppData\Roaming\TempoRX\uihost64.exe | executable | |
MD5:0211073FEB4BA88254F40A2E6611FCEF | SHA256:62DFE27768E6293EB9218BA22A3ACB528DF71E4CC4625B95726CD421B716F983 | |||
| 2052 | uihost32.exe | C:\MSOCache\All Users\{90140000-006E-0407-0000-0000000FF1CE}-C\dwtrig20.exe | executable | |
MD5:CF6C595D3E5E9667667AF096762FD9C4 | SHA256:593E60CC30AE0789448547195AF77F550387F6648D45847EA244DD0DD7ABF03D | |||
| 2052 | uihost32.exe | C:\MSOCache\All Users\{90140000-006E-0410-0000-0000000FF1CE}-C\dwtrig20.exe | executable | |
MD5:CF6C595D3E5E9667667AF096762FD9C4 | SHA256:593E60CC30AE0789448547195AF77F550387F6648D45847EA244DD0DD7ABF03D | |||
| 2052 | uihost32.exe | C:\MSOCache\All Users\{90140000-006E-040C-0000-0000000FF1CE}-C\DW20.EXE | executable | |
MD5:02EE6A3424782531461FB2F10713D3C1 | SHA256:EAD58C483CB20BCD57464F8A4929079539D634F469B213054BF737D227C026DC | |||
| 2052 | uihost32.exe | C:\MSOCache\All Users\{90140000-006E-0407-0000-0000000FF1CE}-C\DW20.EXE | executable | |
MD5:02EE6A3424782531461FB2F10713D3C1 | SHA256:EAD58C483CB20BCD57464F8A4929079539D634F469B213054BF737D227C026DC | |||
| 2052 | uihost32.exe | C:\MSOCache\All Users\{90140000-006E-0411-0000-0000000FF1CE}-C\DW20.EXE | executable | |
MD5:02EE6A3424782531461FB2F10713D3C1 | SHA256:EAD58C483CB20BCD57464F8A4929079539D634F469B213054BF737D227C026DC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1928 | VID001.exe | GET | 404 | 185.26.112.217:80 | http://kr1s.ru/javarx.dat | unknown | html | 1.18 Kb | unknown |
1928 | VID001.exe | GET | 200 | 217.160.0.172:80 | http://clinicaeugenia.com/wp-content/sobakavolos.gif?fdfe7=8322872 | unknown | binary | 13.1 Kb | unknown |
1928 | VID001.exe | GET | 404 | 185.26.112.217:80 | http://kr1s.ru/tessrx.html | unknown | html | 1.18 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1928 | VID001.exe | 185.26.112.217:80 | kr1s.ru | Jsc ru-center | RU | unknown |
1928 | VID001.exe | 217.160.0.172:80 | clinicaeugenia.com | IONOS SE | DE | unknown |
1928 | VID001.exe | 85.85.85.85:5517 | — | — | — | unknown |
1928 | VID001.exe | 105.62.38.78:5517 | — | — | — | unknown |
1928 | VID001.exe | 37.68.182.68:5517 | — | — | — | unknown |
1928 | VID001.exe | 48.0.73.23:5517 | — | — | — | unknown |
1928 | VID001.exe | 200.60.57.62:5517 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
kr1s.ru |
| malicious |
zcop.ru |
| unknown |
clinicaeugenia.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1928 | VID001.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
1928 | VID001.exe | Potentially Bad Traffic | ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla)) |
1928 | VID001.exe | Malware Command and Control Activity Detected | ET MALWARE Win32.Sality-GR Checkin |
1928 | VID001.exe | A Network Trojan was detected | ET MALWARE W32/Sality Executable Pack Digital Signature ASCII Marker |