download:

StellarTerm-win32-x64.rar

Full analysis: https://app.any.run/tasks/06d8e351-a0f9-48c6-a208-329c24ae1972
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 03, 2019, 00:55:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7CE761865DCC151AFD5DBC11D4617551

SHA1:

8B85991A097909C7284CDA445C50C3318C469EC8

SHA256:

F195CDBB264633853E6BDDEA928043AF514EBEB9354C610070CDF2EF46F3CD8A

SSDEEP:

393216:aM4UsObzrWi4Afh3xjRGpWROQa9A/cmSvT:rvsOa3AfhBjspyOBA/c5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Installer_StellarTerm.exe (PID: 3988)
      • NET_FrameWork_V.4.8.exe (PID: 2676)
    • Writes to a start menu file

      • NET_FrameWork_V.4.8.exe (PID: 2676)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 2500)
      • WinRAR.exe (PID: 2748)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2748)
      • Installer_StellarTerm.exe (PID: 3988)
    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 3856)
    • Creates files in the user directory

      • NET_FrameWork_V.4.8.exe (PID: 2676)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
7
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winrar.exe installer_stellarterm.exe net_framework_v.4.8.exe winrar.exe no specs rundll32.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
252"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Rar$DIa3856.21123\chrome_200_percentC:\Windows\system32\rundll32.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1916"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa3856.21123\chrome_200_percentC:\Windows\system32\NOTEPAD.EXErundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2500"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\StellarTerm-win32-x64.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2676"C:\Users\admin\AppData\Local\Temp\NET_FrameWork_V.4.8.exe" C:\Users\admin\AppData\Local\Temp\NET_FrameWork_V.4.8.exe
Installer_StellarTerm.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
15.9.3043.37206
Modules
Images
c:\users\admin\appdata\local\temp\net_framework_v.4.8.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2748"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa2500.5957\chrome_200_percent.pakC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3856"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa2748.20574\chrome_200_percent.pakC:\Program Files\WinRAR\WinRAR.exeWinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3988"C:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\Installer_StellarTerm.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\Installer_StellarTerm.exe
WinRAR.exe
User:
admin
Company:
StellarTerm
Integrity Level:
MEDIUM
Description:
StellarTerm
Exit code:
0
Version:
0.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2748.8238\installer_stellarterm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
2 316
Read events
2 152
Write events
164
Delete events
0

Modification events

(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2500) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\StellarTerm-win32-x64.rar
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2500) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@C:\Windows\System32\ieframe.dll,-912
Value:
HTML Document
(PID) Process:(2500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
8
Suspicious files
2
Text files
190
Unknown types
60

Dropped files

PID
Process
Filename
Type
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\app.asarasar
MD5:
SHA256:
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\accessibility\ARIAProperties.jstext
MD5:73F3825FDD55A69ACE4663EBB36B38B5
SHA256:3DF6C5C6EC6C06E5EC148F62596C64D91CD79EC19662F50BC2D996EABE6EF4F4
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\changes\changes_module.jstext
MD5:457D7F6AA8987CFCB54BBAD8436D6426
SHA256:E22CC6910D36821B0B28B58B0D9164FC2ACEA2022851925034D8ED28A5C1AD75
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\audits2_test_runner\audits2_test_runner_module.jstext
MD5:58656CB4FF03E0A770347AFFC6F3185F
SHA256:019CFF92F5076B4292C97046E5830E6864CA17580FFB9F8304378723D031A7AD
2500WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2500.5957\chrome_200_percent.pakpgc
MD5:1CC200BC1A1C416A0F5B34D138C49D85
SHA256:7AFE6E166DC44329E99C218B3F783C14FF0C67B036806D6A5247DBAE694A649A
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\audits2_worker.jstext
MD5:A79D8D77F26CE05EB65140BD322FB4EB
SHA256:5D9BE90101382403F0CD7267DB4E36AD15DC153D6C1D989AD3E275546081BC8F
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\application_test_runner\application_test_runner_module.jstext
MD5:D3FE53B949645CCE5BAAD0AEDD9ED71A
SHA256:30C0AD64E0E51DDA22DBF632BC098CC5743D704B4D7A34105C62317A0BF21935
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\browser_debugger\browser_debugger_module.jstext
MD5:6CFF6B67BCBB0954667484EAD973C399
SHA256:DB4C6B7112F763877300940DCE61C160ED96D00E4225BF035F412C9A13CE5E66
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\cm\cm_module.jstext
MD5:8F8C70D11E6A7DD83D3FEC81265D67AC
SHA256:151CD86646C4C722C312D7A249CCADDC71210A4E0761AF282B9BC1B49677875E
2748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2748.8238\resources\inspector\color_picker\color_picker_module.jstext
MD5:6E443D5353387F7607ED894A536BA7F1
SHA256:79DA8CCFD78F1D150DBBF907E00C6084EC3E279EA58AE3391CC9A9AAAA453ED2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
3
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3988
Installer_StellarTerm.exe
88.99.66.31:443
ezstat.ru
Hetzner Online GmbH
DE
malicious
3988
Installer_StellarTerm.exe
199.79.62.153:443
brave-official.info
PDR
US
unknown
2676
NET_FrameWork_V.4.8.exe
193.111.153.85:6363
skyniLox.myddns.rocks
malicious

DNS requests

Domain
IP
Reputation
ezstat.ru
  • 88.99.66.31
shared
brave-official.info
  • 199.79.62.153
unknown
skyniLox.myddns.rocks
  • 193.111.153.85
malicious

Threats

Found threats are available for the paid subscriptions
3 ETPRO signatures available at the full report
No debug info