| File name: | US[Metamask 100k+] (2).rar |
| Full analysis: | https://app.any.run/tasks/0f4eba6a-ff3a-4164-b497-3d7480422439 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 20, 2022, 19:49:08 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | CD11F3AEE257E857B279C0D5EF62C7A0 |
| SHA1: | ED3F79A82B7D44FD56DA1C009680979D97B76AD0 |
| SHA256: | E49046EF332A05317E6EC96E66E285E0DF84BBA6C1D7BAF12532D719A19EABF3 |
| SSDEEP: | 98304:ISwf/Uvk/t2A85t9aQQjG1Si1QHZ1hZLWvlV7xRRnRIZFk/gEkPvuuWr1lKD0uK:ISw3UvbA8n/hQHZ9mlV7zRRIE/geMAV |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 1108 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\US[Metamask 100k+] (2).rar" | C:\Program Files\WinRAR\WinRAR.exe | Explorer.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 1584 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\US[Metamask 100k+]\FileGrabber\Users\jelin\Documents\MoMo.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 2096 | C:\Users\admin\AppData\Local\Temp\sse.exe | C:\Users\admin\AppData\Local\Temp\sse.exe | EXCEL.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2228 | taskkill /im RegAsm.exe /f | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2976 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | sse.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 1 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
| 2984 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3144 | "C:\Windows\System32\cmd.exe" /c taskkill /im RegAsm.exe /f & timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del C:\ProgramData\*.dll & exit | C:\Windows\System32\cmd.exe | — | RegAsm.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3488 | timeout /t 6 | C:\Windows\system32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\US[Metamask 100k+] (2).rar | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1108) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\Autofills\BraveSoftware_[Brave-Browser]_Default.txt | text | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\Cookies\Firefox_sh8tgr27.default.txt | text | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\Cookies\Google_[Chrome]_Default Network.txt | text | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\DomainDetects.txt | text | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\FileGrabber\Users\jelin\Desktop\home insurance.docx | document | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\FileGrabber\Users\jelin\Desktop\rent confirmation.docx | document | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\FileGrabber\Users\jelin\Documents\MoMo.docx | document | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\FileGrabber\Users\jelin\Desktop\Salary Reduction (1).doc | document | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\Wallets\BraveSoftware_[Brave-Browser]_Default_Metamask\000772.log | — | |
MD5:— | SHA256:— | |||
| 1108 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1108.31764\US[Metamask 100k+]\FileGrabber\Users\jelin\Documents\Inquiry letters.docx | document | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2976 | RegAsm.exe | GET | 200 | 2.16.186.40:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgMm8dGhwtTOqiSAJU%2BhWupPJg%3D%3D | unknown | der | 503 b | shared |
2976 | RegAsm.exe | GET | 200 | 23.37.41.57:80 | http://x1.c.lencr.org/ | NL | der | 717 b | whitelisted |
284 | EXCEL.EXE | GET | 200 | 41.63.96.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7833688e13852710 | ZA | compressed | 59.9 Kb | whitelisted |
2976 | RegAsm.exe | POST | 200 | 162.55.213.180:80 | http://162.55.213.180/1134 | US | text | 153 b | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/freebl3.dll | US | executable | 326 Kb | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/mozglue.dll | US | executable | 133 Kb | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/msvcp140.dll | US | executable | 429 Kb | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/nss3.dll | US | executable | 1.19 Mb | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/softokn3.dll | US | executable | 141 Kb | malicious |
2976 | RegAsm.exe | GET | 200 | 162.55.213.180:80 | http://162.55.213.180/vcruntime140.dll | US | executable | 81.8 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
284 | EXCEL.EXE | 41.63.96.0:80 | ctldl.windowsupdate.com | Limelight Networks, Inc. | ZA | suspicious |
2976 | RegAsm.exe | 95.216.4.252:443 | mastodon.online | Hetzner Online GmbH | DE | suspicious |
2976 | RegAsm.exe | 23.37.41.57:80 | x1.c.lencr.org | Akamai Technologies, Inc. | NL | suspicious |
2976 | RegAsm.exe | 41.63.96.128:80 | ctldl.windowsupdate.com | Limelight Networks, Inc. | ZA | suspicious |
2976 | RegAsm.exe | 2.16.186.40:80 | r3.o.lencr.org | Akamai International B.V. | — | whitelisted |
2976 | RegAsm.exe | 162.55.213.180:80 | — | — | US | malicious |
2096 | sse.exe | 144.76.136.153:443 | transfer.sh | Hetzner Online GmbH | DE | malicious |
284 | EXCEL.EXE | 144.76.136.153:443 | transfer.sh | Hetzner Online GmbH | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
transfer.sh |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
mastodon.online |
| suspicious |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET POLICY Observed DNS Query to File Transfer Service Domain (transfer .sh) |
284 | EXCEL.EXE | Potential Corporate Privacy Violation | ET POLICY Observed File Transfer Service SSL/TLS Certificate (transfer .sh) |
2096 | sse.exe | Potential Corporate Privacy Violation | ET POLICY Observed File Transfer Service SSL/TLS Certificate (transfer .sh) |
2976 | RegAsm.exe | A Network Trojan was detected | ET TROJAN Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern |
2976 | RegAsm.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
2976 | RegAsm.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
2976 | RegAsm.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2976 | RegAsm.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
2976 | RegAsm.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
2976 | RegAsm.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |