URL:

http://www.mediafire.com/file/iaku38vq8vhavuk/AK47_From__Rust_CheatZ-.rar/file

Full analysis: https://app.any.run/tasks/5241044c-0b26-4da3-a257-7dfc5e8e51fc
Verdict: Malicious activity
Analysis date: January 23, 2020, 09:17:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

126FA3DA5151721725CC8605A00E71A1

SHA1:

DDD8C1B311BBEE2229D577858B523ADFA72FA15E

SHA256:

18CB8C6A3C8B145FB72C1A207636B3DB524192A2F5077AF5458C25558586E70D

SSDEEP:

3:N1KJS4w3eGUoF/aYdyeSxHhWN3sUXKcA:Cc4w3eGcYQeSVhE3rfA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • AK47_From__Rust_CheatZ-.exe (PID: 3160)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 1696)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1696)
      • iexplore.exe (PID: 4092)
      • iexplore.exe (PID: 2732)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1696)
    • Reads internet explorer settings

      • iexplore.exe (PID: 4092)
      • iexplore.exe (PID: 2732)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1696)
    • Manual execution by user

      • AK47_From__Rust_CheatZ-.exe (PID: 3160)
    • Application launched itself

      • iexplore.exe (PID: 1696)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1696)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 4092)
      • iexplore.exe (PID: 1696)
    • Creates files in the user directory

      • iexplore.exe (PID: 2732)
      • iexplore.exe (PID: 4092)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe winrar.exe no specs ak47_from__rust_cheatz-.exe

Process information

PID
CMD
Path
Indicators
Parent process
1696"C:\Program Files\Internet Explorer\iexplore.exe" http://www.mediafire.com/file/iaku38vq8vhavuk/AK47_From__Rust_CheatZ-.rar/fileC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2236"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B4FOPVAU\AK47_From__Rust_CheatZ-.rar"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2732"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1696 CREDAT:1185049 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3160"C:\Users\admin\Desktop\AK47_From__Rust_CheatZ-.exe" C:\Users\admin\Desktop\AK47_From__Rust_CheatZ-.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\ak47_from__rust_cheatz-.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
4092"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1696 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
1 573
Read events
1 441
Write events
130
Delete events
2

Modification events

(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
4202901472
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30790093
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
0
Suspicious files
122
Text files
81
Unknown types
55

Dropped files

PID
Process
Filename
Type
1696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\1161MORM.txt
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\f[1].txttext
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\O4RJPM80.txttext
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\file[1].htmhtml
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\apps_list_sprite-v4[1].pngimage
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\U28VXOT3.txttext
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabC1FA.tmp
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\icons_sprite[1].svgimage
MD5:
SHA256:
4092iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
82
TCP/UDP connections
154
DNS requests
60
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4092
iexplore.exe
GET
200
104.16.202.237:80
http://www.mediafire.com/images/icons/svg_light/icons_sprite.svg
US
image
8.12 Kb
shared
4092
iexplore.exe
GET
200
104.16.202.237:80
http://www.mediafire.com/file/iaku38vq8vhavuk/AK47_From__Rust_CheatZ-.rar/file
US
html
82.0 Kb
shared
4092
iexplore.exe
GET
200
104.16.202.237:80
http://www.mediafire.com/js/prebid2.44.1.js
US
text
52.9 Kb
shared
4092
iexplore.exe
GET
200
104.19.214.37:80
http://cdn.otnolatrnup.com/Scripts/infinity.js.aspx?guid=5ff0fb62-0643-4ff1-aaee-c737f9ffc0e0
US
text
73.0 Kb
whitelisted
4092
iexplore.exe
GET
200
172.217.18.174:80
http://translate.google.com/translate_a/element.js?cb=googFooterTranslate
US
text
795 b
whitelisted
4092
iexplore.exe
GET
200
23.66.27.225:80
http://c.aaxads.com/aax.js?pub=AAX3221EY&hst=www.mediafire.com&ver=1.2
NL
text
102 Kb
whitelisted
4092
iexplore.exe
GET
200
104.16.202.237:80
http://static.mediafire.com/images/backgrounds/download/apps_list_sprite-v4.png
US
image
6.78 Kb
shared
4092
iexplore.exe
GET
200
172.217.22.35:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
4092
iexplore.exe
GET
200
172.217.22.35:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
4092
iexplore.exe
GET
200
172.217.22.35:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4092
iexplore.exe
23.66.27.225:80
c.aaxads.com
Akamai Technologies, Inc.
NL
whitelisted
4092
iexplore.exe
104.16.203.237:80
www.mediafire.com
Cloudflare Inc
US
unknown
1696
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4092
iexplore.exe
104.16.202.237:80
www.mediafire.com
Cloudflare Inc
US
unknown
4092
iexplore.exe
172.217.22.106:443
translate.googleapis.com
Google Inc.
US
whitelisted
4092
iexplore.exe
34.95.120.147:443
mediafire-d.openx.net
US
unknown
4092
iexplore.exe
172.217.22.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4092
iexplore.exe
2.16.186.80:80
b.scorecardresearch.com
Akamai International B.V.
whitelisted
4092
iexplore.exe
185.33.223.218:80
ib.adnxs.com
AppNexus, Inc
unknown
4092
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 104.16.203.237
  • 104.16.202.237
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.googletagmanager.com
  • 172.217.21.200
whitelisted
translate.google.com
  • 172.217.18.174
whitelisted
securepubads.g.doubleclick.net
  • 216.58.208.34
whitelisted
c.aaxads.com
  • 23.66.27.225
whitelisted
cdn.otnolatrnup.com
  • 104.19.214.37
  • 104.19.215.37
whitelisted
translate.googleapis.com
  • 172.217.22.106
whitelisted
static.mediafire.com
  • 104.16.202.237
  • 104.16.203.237
shared

Threats

PID
Process
Class
Message
4092
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info