File name:

Extender.rar

Full analysis: https://app.any.run/tasks/d9bc2812-8928-4e1f-93e3-4f711970d9a7
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 21:49:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
imminent
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

03913093707A2CACAECBE61702CC2875

SHA1:

782282E0C998BEFB09A1A3B1A553D6C48C1F0C99

SHA256:

E1A1127CD0E7C5EBC256947F5E9134E8B2CF8E9C3408ADA5082361A02C5B4FBD

SSDEEP:

196608:9T0YKwVhUCjW5JnD8H0VwvmQI5b4iXCs4W02p0x/cllQRhsKqc:t0yhUEW5JnDskwvzI58iXCspd0xEQfz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • WinRAR.exe (PID: 3572)
      • Loader.exe (PID: 3544)
      • winrar.exe (PID: 3260)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2144)
    • Detected Imminent RAT

      • winrar.exe (PID: 3260)
    • Changes the autorun value in the registry

      • winrar.exe (PID: 3260)
  • SUSPICIOUS

    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 2692)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3564)
      • cmd.exe (PID: 3216)
      • cmd.exe (PID: 3408)
      • cmd.exe (PID: 2692)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 3872)
      • WinRAR.exe (PID: 3572)
      • winrar.exe (PID: 3260)
      • WinRAR.exe (PID: 3716)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3216)
      • cmd.exe (PID: 3564)
    • Starts itself from another location

      • WinRAR.exe (PID: 3572)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3572)
      • javaw.exe (PID: 3872)
    • Creates files in the user directory

      • javaw.exe (PID: 3872)
      • winrar.exe (PID: 3260)
    • Connects to unusual port

      • winrar.exe (PID: 3260)
    • Executes JAVA applets

      • Loader.exe (PID: 3544)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 44664
UncompressedSize: 93184
OperatingSystem: Win32
ModifyDate: 2017:05:13 05:09:10
PackingMethod: Normal
ArchivedFileName: jrelibx32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
24
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe loader.exe no specs javaw.exe cmd.exe no specs chcp.com no specs wmic.exe no specs more.com no specs cmd.exe no specs chcp.com no specs reg.exe no specs cmd.exe no specs chcp.com no specs wmic.exe no specs more.com no specs cmd.exe no specs chcp.com no specs reg.exe no specs explorer.exe no specs explorer.exe no specs winrar.exe #IMMINENT winrar.exe cmd.exe no specs ping.exe no specs wmiapsrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
764C:\Windows\System32\chcp 866 C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1356C:\Windows\System32\chcp 65001 C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1520reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductName"C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2144"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\admin\AppData\Roaming\WinRAR\WinRAR.exe"C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2236C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2260C:\Windows\System32\wbem\wmic path win32_computersystemproduct get /Format:List C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2376C:\Windows\System32\moreC:\Windows\System32\more.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\more.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
2408reg query "HKU\S-1-5-19"C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2692C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp 866>nul & C:\Windows\System32\wbem\wmic Path Win32_VideoController Get VideoProcessor /Format:List | C:\Windows\System32\more"C:\Windows\System32\cmd.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3064explorer C:\Users\admin\AppData\Roaming\WinRAR\WinRAR.exeC:\Windows\explorer.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
1 127
Read events
1 063
Write events
64
Delete events
0

Modification events

(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3716) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Extender.rar
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3716) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
6
Suspicious files
4
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
3716WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3716.1642\jrelibx32.dllexecutable
MD5:
SHA256:
3716WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3716.1642\jrelibx64.dllexecutable
MD5:
SHA256:
3716WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3716.1642\settings.initext
MD5:
SHA256:
3260winrar.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\system.datbinary
MD5:
SHA256:
3260winrar.exeC:\Users\admin\AppData\Roaming\Imminent\Monitoring\network.datbinary
MD5:
SHA256:
3872javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:
SHA256:
3716WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3716.1642\Loader.exeexecutable
MD5:
SHA256:
3872javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\83aa4cc77f591dfc2374580bbd95f6ba_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
3872javaw.exeC:\Users\admin\D103199D-3C3F-AB45-A928-AB014D429B1F.txttext
MD5:
SHA256:
3572WinRAR.exeC:\Users\admin\AppData\Local\Temp\winrar\winrar.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
12
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3872
javaw.exe
GET
200
37.140.192.35:80
http://extenderhacks.ru/info.txt
RU
text
184 b
suspicious
3872
javaw.exe
GET
200
37.140.192.35:80
http://extenderhacks.ru/image.jpg
RU
image
785 Kb
suspicious
3872
javaw.exe
POST
200
37.140.192.35:80
http://extenderhacks.ru/Free/upload.php
RU
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3260
winrar.exe
176.109.255.1:1605
karn.ddns.net
Lugansky Merezhy Ltd
UA
unknown
3872
javaw.exe
37.140.192.35:80
extenderhacks.ru
Domain names registrar REG.RU, Ltd
RU
suspicious

DNS requests

Domain
IP
Reputation
extenderhacks.ru
  • 37.140.192.35
suspicious
karn.ddns.net
  • 176.109.255.1
malicious

Threats

No threats detected
No debug info