analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

NitroChecker.rar

Full analysis: https://app.any.run/tasks/9a0f7196-12a0-4482-b8a0-f037c93e68ea
Verdict: Malicious activity
Analysis date: August 08, 2020, 15:32:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

923258D156C73408096E4460495A5F51

SHA1:

FB2B59ABB19FA5436ABCD5E86A4736032AD309AD

SHA256:

FA6120A66024635548A04C7DD26E8A5429B6790D28B732A441A1BF0A3CD41B03

SSDEEP:

6144:2GagEoL3CyjsZR24Rfo70YXyfQgN+Nq1eJirDjL4TNg0LoWpW5gS:2ebsbfo7ZXyfJVoJtO4WmS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • NitroChecker.exe (PID: 1164)
      • NitroChecker.exe (PID: 1816)
      • NitroChecker.exe (PID: 2724)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3460)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2496)
  • INFO

    • Manual execution by user

      • NitroChecker.exe (PID: 1816)
      • NitroChecker.exe (PID: 1164)
      • NitroChecker.exe (PID: 2724)
      • chrome.exe (PID: 1008)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3652)
    • Reads the hosts file

      • chrome.exe (PID: 3652)
      • chrome.exe (PID: 1008)
    • Application launched itself

      • chrome.exe (PID: 1008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
19
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs nitrochecker.exe no specs nitrochecker.exe no specs nitrochecker.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2496"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\NitroChecker.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3460"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
1816"C:\Users\admin\Desktop\NitroChecker.exe" C:\Users\admin\Desktop\NitroChecker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
NitroChecker
Exit code:
0
Version:
1.0.0.0
2724"C:\Users\admin\Desktop\NitroChecker.exe" C:\Users\admin\Desktop\NitroChecker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
NitroChecker
Exit code:
0
Version:
1.0.0.0
1164"C:\Users\admin\Desktop\NitroChecker.exe" C:\Users\admin\Desktop\NitroChecker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
NitroChecker
Version:
1.0.0.0
1008"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
3221225547
Version:
75.0.3770.100
3400"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e84a9d0,0x6e84a9e0,0x6e84a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2648"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2608 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
956"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,16611159132903271309,6160504393698400242,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6133851492125886814 --mojo-platform-channel-handle=1048 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3652"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,16611159132903271309,6160504393698400242,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=10507707637726895250 --mojo-platform-channel-handle=1616 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
818
Read events
724
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
34
Text files
83
Unknown types
9

Dropped files

PID
Process
Filename
Type
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFed954.TMP
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2b13e2d1-89a8-4030-9094-337f5c7d799e.tmp
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:D11C35B3D5258F594933332C11C6F0F2
SHA256:DC2EB16E16FA3FB258AC31A481F817208CF0C917AF4224F2832588D3A64ADD05
2496WinRAR.exeC:\Users\admin\Desktop\NitroChecker.exeexecutable
MD5:040536308A4C4C4D6AA3CCB33B812BFD
SHA256:81677B68BDA1A004A55664B4A27055E892D0DD05BEB79C4193E951F87818EB6A
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFed964.TMPtext
MD5:988975E56D776333B46F1BCAE6967C0E
SHA256:22186F0422A02BE70860975EF688A895EEA653C3A7259FFBA9114138A544E05A
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp
MD5:
SHA256:
1008chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:142AFC7F980CB38310D0680F2E8907CF
SHA256:3D5E5DF95E28CF65C77882748077EC52706AF02F8D869E188B6D16F782F82F44
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
20
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/naggars.gif
US
image
468 Kb
malicious
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/swasticock2.png
US
image
28.7 Kb
malicious
3652
chrome.exe
GET
104.31.73.96:80
http://kekma.net/scream.mp3
US
malicious
3652
chrome.exe
GET
104.31.73.96:80
http://kekma.net/zzart.mp4
US
malicious
3652
chrome.exe
GET
104.31.73.96:80
http://kekma.net/zzart.mp4
US
malicious
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/button.jpg
US
image
31.4 Kb
malicious
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/
US
html
1.24 Kb
malicious
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
US
html
655 b
malicious
3652
chrome.exe
GET
200
104.31.73.96:80
http://kekma.net/styles.css
US
text
435 b
malicious
3652
chrome.exe
GET
404
104.31.73.96:80
http://kekma.net/favicon.ico
US
html
193 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3652
chrome.exe
172.217.18.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.18.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3652
chrome.exe
216.58.207.74:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.23.132:443
www.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
216.58.210.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.18.13:443
accounts.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
216.58.208.46:443
apis.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.22.78:443
ogs.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.23.142:443
clients2.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.18.104:443
www.googletagmanager.com
Google Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.18.99
whitelisted
accounts.google.com
  • 172.217.18.13
shared
www.google.com
  • 172.217.23.132
whitelisted
fonts.googleapis.com
  • 216.58.207.74
whitelisted
www.gstatic.com
  • 172.217.18.163
whitelisted
fonts.gstatic.com
  • 216.58.210.3
whitelisted
apis.google.com
  • 216.58.208.46
whitelisted
ogs.google.com
  • 172.217.22.78
whitelisted
ssl.gstatic.com
  • 172.217.22.67
whitelisted
clients2.google.com
  • 172.217.23.142
whitelisted

Threats

No threats detected
No debug info