download:

file

Full analysis: https://app.any.run/tasks/d2cea84b-3485-4e99-809b-f921e14ecc49
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: March 31, 2020, 07:45:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
netwire
rat
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

11C0EC111D62251F75CF48D6974742FC

SHA1:

23E170B80C97A448BCA684E5C1E1A1AF77C6D5E6

SHA256:

F5097BCCACFA8518BF8CFE9B121A42B7308144B1915AE49F6400708DBE2255CB

SSDEEP:

384:dffI5j2k6E2kGNlbP8URJFtdP6z5YMhWVlausXrWhhpUvSmjEwqI2CBFxDeqn4QO:a/61kcXR+zZEVl+rE2SmorI2dr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • justi_374748490.exe (PID: 968)
      • justi_374748490.exe (PID: 3524)
      • Host.exe (PID: 1500)
      • Host.exe (PID: 3620)
    • Changes the autorun value in the registry

      • Host.exe (PID: 3620)
    • NETWIRE was detected

      • Host.exe (PID: 3620)
    • Connects to CnC server

      • Host.exe (PID: 3620)
    • Changes settings of System certificates

      • Host.exe (PID: 3620)
      • justi_374748490.exe (PID: 3524)
  • SUSPICIOUS

    • Application launched itself

      • justi_374748490.exe (PID: 968)
      • Host.exe (PID: 1500)
    • Executable content was dropped or overwritten

      • justi_374748490.exe (PID: 3524)
      • WinRAR.exe (PID: 3052)
    • Reads Internet Cache Settings

      • justi_374748490.exe (PID: 3524)
      • Host.exe (PID: 3620)
    • Starts itself from another location

      • justi_374748490.exe (PID: 3524)
    • Creates files in the user directory

      • justi_374748490.exe (PID: 3524)
    • Connects to unusual port

      • Host.exe (PID: 3620)
    • Adds / modifies Windows certificates

      • justi_374748490.exe (PID: 3524)
      • Host.exe (PID: 3620)
  • INFO

    • Reads settings of System Certificates

      • justi_374748490.exe (PID: 3524)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe justi_374748490.exe no specs justi_374748490.exe host.exe no specs #NETWIRE host.exe

Process information

PID
CMD
Path
Indicators
Parent process
968"C:\Users\admin\AppData\Local\Temp\Rar$EXa3052.11859\justi_374748490.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3052.11859\justi_374748490.exeWinRAR.exe
User:
admin
Company:
WONDerware
Integrity Level:
MEDIUM
Description:
helmuthsre
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3052.11859\justi_374748490.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1500"C:\Users\admin\AppData\Roaming\Install\Host.exe" C:\Users\admin\AppData\Roaming\Install\Host.exejusti_374748490.exe
User:
admin
Company:
WONDerware
Integrity Level:
MEDIUM
Description:
helmuthsre
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\install\host.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3052"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\file.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3524"C:\Users\admin\AppData\Local\Temp\Rar$EXa3052.11859\justi_374748490.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3052.11859\justi_374748490.exe
justi_374748490.exe
User:
admin
Company:
WONDerware
Integrity Level:
MEDIUM
Description:
helmuthsre
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\system32\mfc40.dll
c:\users\admin\appdata\local\temp\rar$exa3052.11859\justi_374748490.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt40.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3620"C:\Users\admin\AppData\Roaming\Install\Host.exe" C:\Users\admin\AppData\Roaming\Install\Host.exe
Host.exe
User:
admin
Company:
WONDerware
Integrity Level:
MEDIUM
Description:
helmuthsre
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\system32\mfc40.dll
c:\users\admin\appdata\roaming\install\host.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt40.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
7 985
Read events
849
Write events
4 760
Delete events
2 376

Modification events

(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3052) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\file.7z
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\file
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
3
Suspicious files
10
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
3524justi_374748490.exeC:\Users\admin\AppData\Local\Temp\CabEB72.tmp
MD5:
SHA256:
3524justi_374748490.exeC:\Users\admin\AppData\Local\Temp\TarEB73.tmp
MD5:
SHA256:
3524justi_374748490.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\TXVRE35Z.txt
MD5:
SHA256:
3620Host.exeC:\Users\admin\AppData\Local\Temp\Cab36E2.tmp
MD5:
SHA256:
3620Host.exeC:\Users\admin\AppData\Local\Temp\Tar36E3.tmp
MD5:
SHA256:
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\file\justi_374748490.exeexecutable
MD5:
SHA256:
3524justi_374748490.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9Bder
MD5:
SHA256:
3524justi_374748490.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CBB16B7A61CE4E298043181730D3CE9Bbinary
MD5:
SHA256:
3524justi_374748490.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3538626A1FCCCA43C7E18F220BDD9B02der
MD5:
SHA256:
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3052.11859\justi_374748490.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
8
DNS requests
6
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3524
justi_374748490.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECECUTgfQsc%2BcBwNBMQNWQl0M%3D
US
der
471 b
whitelisted
3524
justi_374748490.exe
GET
200
151.139.128.14:80
http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl
US
der
922 b
whitelisted
3524
justi_374748490.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY%3D
US
der
471 b
whitelisted
3524
justi_374748490.exe
POST
200
151.139.128.14:80
http://ocsp.usertrust.com/
US
binary
5 b
whitelisted
3524
justi_374748490.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
binary
5 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3524
justi_374748490.exe
151.139.128.14:80
ocsp.usertrust.com
Highwinds Network Group, Inc.
US
suspicious
3524
justi_374748490.exe
199.91.152.142:443
download1642.mediafire.com
MediaFire, LLC
US
unknown
3524
justi_374748490.exe
104.16.203.237:443
www.mediafire.com
Cloudflare Inc
US
unknown
3620
Host.exe
199.91.152.142:443
download1642.mediafire.com
MediaFire, LLC
US
unknown
3620
Host.exe
185.244.30.160:33094
malu1234.duckdns.org
malicious
3620
Host.exe
104.16.203.237:443
www.mediafire.com
Cloudflare Inc
US
unknown

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 104.16.203.237
  • 104.16.202.237
shared
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
crl.usertrust.com
  • 151.139.128.14
whitelisted
download1642.mediafire.com
  • 199.91.152.142
unknown
ocsp.sectigo.com
  • 151.139.128.14
whitelisted
malu1234.duckdns.org
  • 185.244.30.160
unknown

Threats

PID
Process
Class
Message
1052
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3620
Host.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
1 ETPRO signatures available at the full report
No debug info