analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

_Cracked_Streambot_2.rar

Full analysis: https://app.any.run/tasks/547416d6-3361-4a73-818d-e3c339f8a221
Verdict: Malicious activity
Analysis date: December 18, 2018, 15:15:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
miner
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

C98AAE43EC84FADC9EAC5EBC0CD7A1B2

SHA1:

FCD63318B9146484A521D9AFC0AFC0AE17F13D18

SHA256:

141FB3AB10523E8624E5736218F9A6B7A8CD1FFB3862444F491D5792FA6D3142

SSDEEP:

196608:R9itwJNPwD7qM2KFJUycFd+o+zOwAd+jDoWRJO4Zvj57UIG+uMNZkyzf29F0Hl:uiJNYy4C/Fd+ond47nOc9UIG+DZ/29Fg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1040)
    • Known privilege escalation attack

      • Streambot 2.exe (PID: 3836)
    • Uses Task Scheduler to run other applications

      • Protectedwo.exe (PID: 2520)
      • 2222.exe (PID: 3724)
      • 22.exe (PID: 3644)
    • Application was dropped or rewritten from another process

      • streambot2.exe (PID: 2912)
      • Protectedcy.exe (PID: 3652)
      • Protectednj.exe (PID: 3436)
      • 22.exe (PID: 3644)
      • 2222.exe (PID: 3724)
      • Protectedin.exe (PID: 2192)
      • Protectedwo.exe (PID: 2520)
      • Protectedwo.exe (PID: 908)
      • 2222.sfx.exe (PID: 3052)
      • ZVKQHTPNL.exe (PID: 3008)
      • SDVGJHKHC.exe (PID: 2864)
    • Changes the autorun value in the registry

      • 22.exe (PID: 3644)
      • 2222.exe (PID: 3724)
      • cscript.exe (PID: 3396)
      • wscript.exe (PID: 2848)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2584)
      • schtasks.exe (PID: 3900)
      • schtasks.exe (PID: 3916)
      • schtasks.exe (PID: 3956)
      • schtasks.exe (PID: 3944)
    • Writes to a start menu file

      • cscript.exe (PID: 3396)
      • wscript.exe (PID: 2848)
    • Connects to CnC server

      • SDVGJHKHC.exe (PID: 2864)
      • ZVKQHTPNL.exe (PID: 3008)
    • MINER was detected

      • SDVGJHKHC.exe (PID: 2864)
      • ZVKQHTPNL.exe (PID: 3008)
  • SUSPICIOUS

    • Modifies the open verb of a shell class

      • Streambot 2.exe (PID: 3836)
    • Executable content was dropped or overwritten

      • Protectedwo.exe (PID: 2520)
      • Streambot 2.exe (PID: 3272)
      • WinRAR.exe (PID: 3308)
      • 2222.sfx.exe (PID: 3052)
      • 22.exe (PID: 3644)
      • 2222.exe (PID: 3724)
    • Executes scripts

      • Protectedwo.exe (PID: 908)
      • cscript.exe (PID: 3396)
    • Creates files in the user directory

      • cscript.exe (PID: 3396)
    • Connects to unusual port

      • SDVGJHKHC.exe (PID: 2864)
      • ZVKQHTPNL.exe (PID: 3008)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
25
Malicious processes
13
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe explorer.exe no specs searchprotocolhost.exe no specs streambot 2.exe no specs eventvwr.exe no specs eventvwr.exe streambot 2.exe streambot2.exe no specs protectedcy.exe no specs protectedin.exe no specs protectednj.exe no specs protectedwo.exe 22.exe 2222.sfx.exe protectedwo.exe no specs schtasks.exe no specs cscript.exe 2222.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs wscript.exe #MINER sdvgjhkhc.exe #MINER zvkqhtpnl.exe

Process information

PID
CMD
Path
Indicators
Parent process
3308"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\_Cracked_Streambot_2.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1328"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1040"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
3836"C:\Users\admin\Desktop\[Cracked]Streambot 2\V\Streambot 2.exe" C:\Users\admin\Desktop\[Cracked]Streambot 2\V\Streambot 2.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3328"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exeStreambot 2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Event Viewer Snapin Launcher
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3976"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exe
Streambot 2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Event Viewer Snapin Launcher
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3272"C:\Users\admin\Desktop\[Cracked]Streambot 2\V\Streambot 2.exe" C:\Users\admin\Desktop\[Cracked]Streambot 2\V\Streambot 2.exe
eventvwr.exe
User:
admin
Integrity Level:
HIGH
2912"C:\Users\admin\AppData\Local\Temp\streambot2.exe" C:\Users\admin\AppData\Local\Temp\streambot2.exeStreambot 2.exe
User:
admin
Company:
Shadiku Izayoi, Emma Skye <neosyndicate.net>
Integrity Level:
HIGH
Description:
streambot²
Exit code:
3221225781
Version:
2.5.0.0
3652"C:\Users\admin\AppData\Local\Temp\Protectedcy.exe" C:\Users\admin\AppData\Local\Temp\Protectedcy.exeStreambot 2.exe
User:
admin
Integrity Level:
HIGH
2192"C:\Users\admin\AppData\Local\Temp\Protectedin.exe" C:\Users\admin\AppData\Local\Temp\Protectedin.exeStreambot 2.exe
User:
admin
Integrity Level:
HIGH
Total events
1 960
Read events
1 916
Write events
0
Delete events
0

Modification events

No data
Executable files
30
Suspicious files
8
Text files
45
Unknown types
0

Dropped files

PID
Process
Filename
Type
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap24.datimage
MD5:28389196BE905D4D4660C46FB663A3CC
SHA256:95365C85C587D51BE1B69AC572FE6E87C1A093DA0E7B98E67BD309AB09483B54
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap22.datcompressed
MD5:45DDEF3B2DFA5D79DDE211620FCF538C
SHA256:1159A44808FAA6C897BDA6D66AE0620B898593A13EAF56318CDDBE66A8298583
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\curl.exeexecutable
MD5:B22281F1DD04E1D09643E437AAEEE065
SHA256:83D1FDB808BD681100DD946A7CFB2D7AB39ED1553D71261DFEA30B727D786F00
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap16.datcompressed
MD5:05285A412184D9B14B68514E5BC7178C
SHA256:6F3863BFAA7A17CC371579D02DD5C2CE3000C940DFC2C67B8205AA02B231BBA5
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap20.datimage
MD5:694B28725867A2C893A2535CA310ACB8
SHA256:475FE9452812C91BCD7208687DE014419FDC0C77FE29747FD18DDA3EADACAEA8
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap10.datimage
MD5:15FEC6C33A20A6ECB295FA55514781E7
SHA256:E238521A1915A0C488D87FA0068D03135BA2D806268F58E973B858195975B20D
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap18.datimage
MD5:9073D4D6CB37AB39CAA44CFF241182EE
SHA256:19105802E9202F5070919D1326732BE8E8B0D0EF0B9E7DD11AA6BF7DD43042D3
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap1.dattext
MD5:38DE427224A5082A04FE82E2BD4EA9EC
SHA256:12F99F53144294750FE8713D580EDA286F4BD95CD9C840DB8AB957DEF8040028
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap14.datimage
MD5:58724CE63DFB037C86EE19358FC20157
SHA256:D4D9BE6BFBAAF7B4215D149907182B8D92137628E0369986D07E8E27006817E8
3308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3308.16372\[Cracked]Streambot 2\V\includes\dat01\ap12.datimage
MD5:D8D7A1347773A2F1BF652174075C6BC3
SHA256:4D19EEFAA357F7EAC71FA28EB55AAD26627716B6ABE6F0361C4948E69E7ECB62
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2864
SDVGJHKHC.exe
192.154.110.50:2222
pooleu.xmrminingpool.net
GorillaServers, Inc.
US
suspicious
3008
ZVKQHTPNL.exe
192.154.110.50:2222
pooleu.xmrminingpool.net
GorillaServers, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
pooleu.xmrminingpool.net
  • 192.154.110.50
malicious

Threats

PID
Process
Class
Message
3008
ZVKQHTPNL.exe
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
3008
ZVKQHTPNL.exe
Misc activity
MINER [PTsecurity] CoinMiner CryptoNight XMRig JSON_RPC Client Login
2864
SDVGJHKHC.exe
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
2864
SDVGJHKHC.exe
Misc activity
MINER [PTsecurity] CoinMiner CryptoNight XMRig JSON_RPC Client Login
3008
ZVKQHTPNL.exe
Misc activity
MINER [PTsecurity] Riskware/CoinMiner JSON_RPC Response
3008
ZVKQHTPNL.exe
Misc activity
MINER [PTsecurity] Risktool.W32.coinminer!c
2864
SDVGJHKHC.exe
Misc activity
MINER [PTsecurity] Riskware/CoinMiner JSON_RPC Response
2864
SDVGJHKHC.exe
Misc activity
MINER [PTsecurity] Risktool.W32.coinminer!c
No debug info