File name:

alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip

Full analysis: https://app.any.run/tasks/85d19971-4045-4ec9-b221-a59d9b3ec10b
Verdict: Malicious activity
Analysis date: September 23, 2020, 23:11:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

A70EBC90BDDB63D42AD22C47E718D950

SHA1:

E693EFFEEE9DB0834408BFD9662AFF3A4270DEA5

SHA256:

18F806AD1738BAD221984A9D4636AD55FDC230359E34B2F1D232B28AD1698062

SSDEEP:

98304:MBdeAj8/7EyWHSX1vVt/bNIgpi6DhWOOwEdlUVsiJu1zROo4LX:MBwAjA7ExyXXtxIgg6DhJkLUm/aX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 2420)
      • nsB7EF.tmp (PID: 3416)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3568)
      • nsDFF9.tmp (PID: 1980)
      • Setup.exe (PID: 292)
      • ns617D.tmp (PID: 3984)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
      • Setup.exe (PID: 1820)
      • nsEA5.tmp (PID: 2868)
    • Changes settings of System certificates

      • CScript.exe (PID: 772)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Setup.exe (PID: 3688)
      • WinRAR.exe (PID: 3564)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Creates files in the program directory

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Executes scripts

      • nsB7EF.tmp (PID: 3416)
      • nsDFF9.tmp (PID: 1980)
      • ns617D.tmp (PID: 3984)
      • nsEA5.tmp (PID: 2868)
    • Reads Internet Cache Settings

      • CScript.exe (PID: 772)
      • CScript.exe (PID: 480)
      • CScript.exe (PID: 2936)
      • CScript.exe (PID: 3488)
    • Starts application with an unusual extension

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Adds / modifies Windows certificates

      • CScript.exe (PID: 772)
  • INFO

    • Manual execution by user

      • Setup.exe (PID: 2420)
      • Setup.exe (PID: 3568)
      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • WinRAR.exe (PID: 3564)
      • Setup.exe (PID: 292)
      • Setup.exe (PID: 3000)
      • rundll32.exe (PID: 2132)
      • Setup.exe (PID: 1820)
      • Setup.exe (PID: 656)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:09:23 23:02:08
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
20
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start winrar.exe no specs winrar.exe setup.exe no specs setup.exe nsb7ef.tmp no specs cscript.exe setup.exe no specs setup.exe nsdff9.tmp no specs cscript.exe rundll32.exe no specs setup.exe no specs setup.exe ns617d.tmp no specs cscript.exe notepad.exe no specs setup.exe no specs setup.exe nsea5.tmp no specs cscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
480"C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Windows\system32\CScript.exe
nsDFF9.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
540"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa1704.18261\Important Note - USE winrar to extract files .txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
656"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
772"C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Windows\system32\CScript.exe
nsB7EF.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1704"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1820"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
1980"C:\Users\admin\AppData\Local\Temp\nsvDF9A.tmp\nsDFF9.tmp" "C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Users\admin\AppData\Local\Temp\nsvDF9A.tmp\nsDFF9.tmpSetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsvdf9a.tmp\nsdff9.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2132"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\read_this_txt.mdC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2420"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
Total events
1 112
Read events
1 007
Write events
105
Delete events
0

Modification events

(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1704) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(3564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
21
Suspicious files
5
Text files
8
Unknown types
2

Dropped files

PID
Process
Filename
Type
772CScript.exeC:\Users\admin\AppData\Local\Temp\CabBC03.tmp
MD5:
SHA256:
772CScript.exeC:\Users\admin\AppData\Local\Temp\TarBC04.tmp
MD5:
SHA256:
1704WinRAR.exeC:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\setup_installer.zipcompressed
MD5:
SHA256:
1704WinRAR.exeC:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\read_this_txt.mdtext
MD5:
SHA256:
480CScript.exeC:\Users\admin\AppData\Local\Temp\CabE287.tmp
MD5:
SHA256:
480CScript.exeC:\Users\admin\AppData\Local\Temp\TarE288.tmp
MD5:
SHA256:
1704WinRAR.exeC:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\Important Note - USE winrar to extract files .txttext
MD5:
SHA256:
3688Setup.exeC:\Program Files\Jaoler\kader\Setup3.vbstext
MD5:
SHA256:
3688Setup.exeC:\Program Files\Jaoler\kader\3.exeexecutable
MD5:
SHA256:
3688Setup.exeC:\Program Files\Jaoler\kader\Setup3.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
7
DNS requests
4
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1048
svchost.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAKXB1YM1Knrv%2BJy8eCW2II%3D
US
der
471 b
whitelisted
772
CScript.exe
GET
200
2.16.186.27:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOFvRj973rrPO3ypqcX4igUEQ%3D%3D
unknown
der
527 b
whitelisted
772
CScript.exe
GET
200
2.16.186.11:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
772
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
772
CScript.exe
2.16.186.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
772
CScript.exe
2.16.186.27:80
ocsp.int-x3.letsencrypt.org
Akamai International B.V.
whitelisted
480
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
2936
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
3488
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
1048
svchost.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
iplogger.org
  • 88.99.66.31
shared
isrg.trustid.ocsp.identrust.com
  • 2.16.186.11
  • 2.16.186.35
whitelisted
ocsp.int-x3.letsencrypt.org
  • 2.16.186.27
  • 2.16.186.11
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
9 ETPRO signatures available at the full report
No debug info