| URL: | https://crackheaps.com/a/h/Paypal+Money+Adder+2021+desk+software+key+not+used/ |
| Full analysis: | https://app.any.run/tasks/3d43bf0e-6412-4123-b3a8-4c3c13e724a5 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | March 22, 2021, 18:48:56 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | F6A5BCFF7FA56E9B7D5B6BF869C991F0 |
| SHA1: | 79C7242BFDA1B17B06C06B63310E530C70D875DF |
| SHA256: | 035C131F9EBC5300814E0B91AC733D470C70845CC0A6B9DAAFD5E57353BB39C8 |
| SSDEEP: | 3:N8Kg8yTffLoKL5DEOBAWYNHBKn:2KD2fPaOBzYSn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 312 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,1567391435185486560,5881708818487281267,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5719684224327961637 --mojo-platform-channel-handle=1024 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 332 | keygen-step-4.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 348 | "C:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe" ll | C:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe | Setup.exe | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: HJKH Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 372 | "C:\Users\admin\AppData\Local\Temp\is-J50AG.tmp\setups.tmp" /SL5="$701C0,290870,64000,C:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe" ll | C:\Users\admin\AppData\Local\Temp\is-J50AG.tmp\setups.tmp | setups.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.52.0.0 Modules
| |||||||||||||||
| 772 | keygen-pr.exe -p83fsase3Ge | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 916 | cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen.bat" " | C:\Windows\system32\cmd.exe | — | Reimage.Pc.Repair.Online.serial.number.keygen.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 968 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3336 CREDAT:275457 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 1060 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,1567391435185486560,5881708818487281267,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2713098010609371027 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1264 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa3128.31177\Reimage.Pc.Repair.Online.serial.number.keygen.zip | C:\Program Files\WinRAR\WinRAR.exe | WinRAR.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 1508 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6c1ea9d0,0x6c1ea9e0,0x6c1ea9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2532) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2136-13260912553834250 |
Value: 259 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 3252-13245750958665039 |
Value: 0 | |||
| (PID) Process: | (2136) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6058E6AA-858.pma | — | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1276e332-5b9e-4fa6-97da-8e8a532a40c8.tmp | — | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFe6db9.TMP | text | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFe6db9.TMP | text | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2136 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFe6fec.TMP | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3072 | Install.exe | GET | — | 103.124.106.203:80 | http://103.124.106.203/cof4/inst.exe | unknown | — | — | malicious |
3072 | Install.exe | GET | — | 45.144.30.78:80 | http://aretywer.xyz/Corepad092.exe | unknown | — | — | suspicious |
— | — | GET | — | 91.200.41.57:80 | http://gclean.in/stats/remember.php?pub=mixinte&user=admin | UA | — | — | malicious |
— | — | GET | — | 91.200.41.57:80 | http://gclean.in/decision.php?pub=mixinte | UA | — | — | malicious |
— | — | GET | — | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | — | — | whitelisted |
3072 | Install.exe | GET | 200 | 45.133.1.139:80 | http://45.133.1.139/Manager/Temp/EFgzd7IrnKmvSY7NoweEU7Pm/KG5pc5F7jZu3r0hr7kiig97u.exe | unknown | executable | 9.00 Kb | suspicious |
3140 | keygen-step-3.exe | POST | 200 | 45.76.53.14:80 | http://www.wws23dfwe.com/index.php/api/a | JP | text | 24 b | malicious |
3072 | Install.exe | GET | 200 | 104.21.66.169:80 | http://file.ekkggr3.com/iuww/jvppp.exe | US | html | 4.21 Kb | malicious |
968 | iexplore.exe | GET | 200 | 2.16.186.27:80 | http://crl.identrust.com/DSTROOTCAX3CRL.crl | unknown | der | 1.16 Kb | whitelisted |
968 | iexplore.exe | GET | 200 | 2.16.186.27:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgR2zp%2FaTG3OICcvKJ0qsA9fIQ%3D%3D | unknown | der | 503 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2152 | chrome.exe | 104.21.16.246:443 | crackheaps.com | Cloudflare Inc | US | unknown |
2152 | chrome.exe | 142.250.185.237:443 | accounts.google.com | Google Inc. | US | suspicious |
2152 | chrome.exe | 104.16.19.94:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | suspicious |
2152 | chrome.exe | 142.250.186.168:443 | www.googletagmanager.com | Google Inc. | US | suspicious |
2152 | chrome.exe | 142.250.186.142:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
2152 | chrome.exe | 142.250.185.131:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
2152 | chrome.exe | 37.1.219.39:443 | crackheap.net | Leaseweb Deutschland GmbH | DE | suspicious |
2152 | chrome.exe | 185.177.93.51:443 | get.ziplink.xyz | — | MD | suspicious |
3140 | keygen-step-3.exe | 45.76.53.14:80 | www.wws23dfwe.com | Choopa, LLC | JP | malicious |
2152 | chrome.exe | 142.250.186.78:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crackheaps.com |
| malicious |
accounts.google.com |
| shared |
cdnjs.cloudflare.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
www.google-analytics.com |
| whitelisted |
ssl.gstatic.com |
| whitelisted |
crackheap.net |
| malicious |
get.ziplink.xyz |
| suspicious |
sb-ssl.google.com |
| whitelisted |
www.wws23dfwe.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2152 | chrome.exe | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |
2648 | keygen-step-1.exe | A Network Trojan was detected | ET TROJAN Win32/AZORult V3.3 Client Checkin M2 |
2648 | keygen-step-1.exe | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
2648 | keygen-step-1.exe | A Network Trojan was detected | STEALER [PTsecurity] AZORult v.3 |
2648 | keygen-step-1.exe | A Network Trojan was detected | STEALER [PTsecurity] AZORult |
3140 | keygen-step-3.exe | A Network Trojan was detected | STEALER [PTsecurity] Powerkatz32_2 |
3140 | keygen-step-3.exe | A Network Trojan was detected | STEALER [PTsecurity] Powerkatz32_2 |
3140 | keygen-step-3.exe | A Network Trojan was detected | STEALER [PTsecurity] Powerkatz32_2 |
3072 | Install.exe | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
3072 | Install.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |