analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Setup inc CRACK.zip

Full analysis: https://app.any.run/tasks/8bf4e374-d7ce-42a4-917a-7d6e73859065
Verdict: Malicious activity
Analysis date: July 11, 2019, 20:08:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
prepscram
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

FBD640532CAE1E6CFDDF1980C7342C1C

SHA1:

CC3C37C7EB1B89DB9D39B03FD5064F75995976BA

SHA256:

0AACF8650F7AE9801C1DF492A39C2D5EF8C99CD00D20CB80468C1693F78227A4

SSDEEP:

196608:EuwxCHz/Z9PP3/jjS9G4JqWr87phLuGLEvRECK:VwIBhPbI3o7phLupvRhK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • setup.exe (PID: 3720)
      • setup.exe (PID: 3044)
    • Connects to CnC server

      • setup.exe (PID: 3720)
    • PREPSCRAM was detected

      • setup.exe (PID: 3720)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3272)
    • Application launched itself

      • setup.exe (PID: 3044)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:01:07 17:01:19
ZipCRC: 0xa67c96fb
ZipCompressedSize: 3531
ZipUncompressedSize: 14534
ZipFileName: CTAC.json
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe notepad.exe no specs setup.exe no specs #PREPSCRAM setup.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3272"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Setup inc CRACK.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3224"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa3272.24569\SERIAL.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3044"C:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3720"C:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exe" "C:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exe
setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3956"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa3272.28191\SERIAL.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
825
Read events
804
Write events
21
Delete events
0

Modification events

(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3272) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Setup inc CRACK.zip
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3272) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
44
(PID) Process:Key:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
44
Executable files
4
Suspicious files
1
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\SERIAL.txttext
MD5:3665F9ED60A7E3B77F2066F6E0136ED5
SHA256:25512BB2E859AF74F07AFF5CD936D9656B11897B4FE5ADD98AD2D6F02175D7D3
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3272.24569\SERIAL.txttext
MD5:3665F9ED60A7E3B77F2066F6E0136ED5
SHA256:25512BB2E859AF74F07AFF5CD936D9656B11897B4FE5ADD98AD2D6F02175D7D3
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\lang\libGLESv2.dllexecutable
MD5:3128349639AEC9A4A5C51B837DF8BA3C
SHA256:74A66FF1A1CADB2965C4167B214DFA1DAFA9A03BF01ABE64E1B49F633CFF8603
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\CTAC.jsontext
MD5:E022D8156E57EBA1D416660669E67987
SHA256:1F48FEFA9D0D8B3BB2DCCC043100877102CD4959C5A4749216DE7876C9E011DA
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\WdfCoInstaller01011.dllexecutable
MD5:439454174020B9D32E25EE77346EAC23
SHA256:53342733F44FA51630B6F1930AF8D035EFB14F9917C3D95EE622D3379337AB16
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\setup.exeexecutable
MD5:AB79B4434104259AF3D171B09321441E
SHA256:D27CBC63FA9C37103F01ADC8368E6724237803B129BE1F12A1EC2A96EC97C757
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\sedplugins.dllexecutable
MD5:FEA8E4AC671A2E72EE8779787B938A32
SHA256:B83AC34C45B5BFE42770D49631F23822A6C07236C48D84DADDC8B03C9127C8E6
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\lang\cef_extensions.pakbinary
MD5:B7D530A9208AFA7D1C8B573BDD1C4D3A
SHA256:9C09BEB2C5EDC0B7A5E8B56C5F7D83A52DCCA5B6D005B08DAB2C460E7073EBFB
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3272.25832\dnssd.expexp
MD5:14A249E61FA87D4BE4A707AB51B08384
SHA256:79DD05D0D893FA7B47C7285D7A9E46A985104A2547F07A5850D4AD88ED5A7F17
3272WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa3272.28191\SERIAL.txttext
MD5:3665F9ED60A7E3B77F2066F6E0136ED5
SHA256:25512BB2E859AF74F07AFF5CD936D9656B11897B4FE5ADD98AD2D6F02175D7D3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3720
setup.exe
GET
200
143.204.208.2:80
http://d1hq9wbcfo7dcl.cloudfront.net/offer.php?affId=7332&trackingId=418997745&instId=7500&ho_trackingid=HO418997745&cc=US&sb=x86&wv=7sp1&db=InternetExplorer&uac=1&cid=5d979308c3b6ea5ad7e984e628c8cac1&v=3&net=4.7.03062&ie=8%2e0%2e7601%2e17514&res=1280x720&osd=644&kid=hqmrb21bc2p5l1o1iad
US
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3720
setup.exe
143.204.208.2:80
d1hq9wbcfo7dcl.cloudfront.net
US
malicious

DNS requests

Domain
IP
Reputation
d1hq9wbcfo7dcl.cloudfront.net
  • 143.204.208.2
  • 143.204.208.37
  • 143.204.208.50
  • 143.204.208.78
shared

Threats

PID
Process
Class
Message
3720
setup.exe
Unknown Traffic
ET INFO Suspicious User-Agent (1 space)
3720
setup.exe
Misc activity
ADWARE [PTsecurity] SoftwareBundler:Win32/Prepscram
1 ETPRO signatures available at the full report
No debug info