File name:

alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip

Full analysis: https://app.any.run/tasks/85d19971-4045-4ec9-b221-a59d9b3ec10b
Verdict: Malicious activity
Analysis date: September 23, 2020, 23:11:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

A70EBC90BDDB63D42AD22C47E718D950

SHA1:

E693EFFEEE9DB0834408BFD9662AFF3A4270DEA5

SHA256:

18F806AD1738BAD221984A9D4636AD55FDC230359E34B2F1D232B28AD1698062

SSDEEP:

98304:MBdeAj8/7EyWHSX1vVt/bNIgpi6DhWOOwEdlUVsiJu1zROo4LX:MBwAjA7ExyXXtxIgg6DhJkLUm/aX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 2420)
      • nsB7EF.tmp (PID: 3416)
      • Setup.exe (PID: 3568)
      • Setup.exe (PID: 3756)
      • nsDFF9.tmp (PID: 1980)
      • Setup.exe (PID: 292)
      • Setup.exe (PID: 3000)
      • ns617D.tmp (PID: 3984)
      • Setup.exe (PID: 656)
      • nsEA5.tmp (PID: 2868)
      • Setup.exe (PID: 1820)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 656)
    • Changes settings of System certificates

      • CScript.exe (PID: 772)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3564)
      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Creates files in the program directory

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Starts application with an unusual extension

      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • Setup.exe (PID: 656)
    • Executes scripts

      • nsB7EF.tmp (PID: 3416)
      • nsDFF9.tmp (PID: 1980)
      • ns617D.tmp (PID: 3984)
      • nsEA5.tmp (PID: 2868)
    • Reads Internet Cache Settings

      • CScript.exe (PID: 772)
      • CScript.exe (PID: 480)
      • CScript.exe (PID: 2936)
      • CScript.exe (PID: 3488)
    • Adds / modifies Windows certificates

      • CScript.exe (PID: 772)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 3564)
      • Setup.exe (PID: 2420)
      • Setup.exe (PID: 3688)
      • Setup.exe (PID: 3568)
      • Setup.exe (PID: 3756)
      • Setup.exe (PID: 3000)
      • rundll32.exe (PID: 2132)
      • Setup.exe (PID: 292)
      • Setup.exe (PID: 656)
      • Setup.exe (PID: 1820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:09:23 23:02:08
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
20
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start winrar.exe no specs winrar.exe setup.exe no specs setup.exe nsb7ef.tmp no specs cscript.exe setup.exe no specs setup.exe nsdff9.tmp no specs cscript.exe rundll32.exe no specs setup.exe no specs setup.exe ns617d.tmp no specs cscript.exe notepad.exe no specs setup.exe no specs setup.exe nsea5.tmp no specs cscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
480"C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Windows\system32\CScript.exe
nsDFF9.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
540"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa1704.18261\Important Note - USE winrar to extract files .txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
656"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
772"C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Windows\system32\CScript.exe
nsB7EF.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1704"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1820"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
1980"C:\Users\admin\AppData\Local\Temp\nsvDF9A.tmp\nsDFF9.tmp" "C:\Windows\system32\CScript.exe" "C:\Program Files\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO C:\Users\admin\AppData\Local\Temp\nsvDF9A.tmp\nsDFF9.tmpSetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsvdf9a.tmp\nsdff9.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2132"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\read_this_txt.mdC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2420"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
4.2.0.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\systemroot\system32\ntdll.dll
Total events
1 112
Read events
1 007
Write events
105
Delete events
0

Modification events

(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1704) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137.zip
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1704) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(3564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
21
Suspicious files
5
Text files
8
Unknown types
2

Dropped files

PID
Process
Filename
Type
772CScript.exeC:\Users\admin\AppData\Local\Temp\CabBC03.tmp
MD5:
SHA256:
772CScript.exeC:\Users\admin\AppData\Local\Temp\TarBC04.tmp
MD5:
SHA256:
1704WinRAR.exeC:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\read_this_txt.mdtext
MD5:704A0FBC3E5F466364F509F356BF70B4
SHA256:91EDD29609AC12A09E80C30844127ADA306FFCB5B6B81FC5C12EBA83B3F435C6
772CScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08binary
MD5:ED295C76CD126227AB7539681253B61E
SHA256:F75BABE3071EAA76A9014F3B7047D405105AE2FAEA0F40A2444AAADA8FC9E034
480CScript.exeC:\Users\admin\AppData\Local\Temp\CabE287.tmp
MD5:
SHA256:
480CScript.exeC:\Users\admin\AppData\Local\Temp\TarE288.tmp
MD5:
SHA256:
772CScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\809F549ACD5D5E0FC927377BAAE913CCder
MD5:9F20E3E71CEB1176482968FAC6D1DD81
SHA256:F2720BBC21D3AEE562B185CE29E1EA5D55A7C4E2A4E79B4E904B5F5F792BFCD9
772CScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\809F549ACD5D5E0FC927377BAAE913CCbinary
MD5:3A425EDF87926773A0CDF7640E48674A
SHA256:EC10B7AE08096D1B95D895412C3D6DC4227539F24383FF154BB7CC1AB192672F
1704WinRAR.exeC:\Users\admin\Desktop\alwaysup-12-0-8-31-full-keygen-crack-free-download-1600902137-zip\Password is 44556677.txttext
MD5:6A76BD0CC387812F751209A4DE7B4F62
SHA256:F19E81D9612100278045584DC9C2DC70BF8671C668C5D20B2BBB644B38133B35
3756Setup.exeC:\Program Files\Jaoler\kader\Setup3.vbstext
MD5:C9FC689889EACCCC03F26013EB52AB7F
SHA256:9A68E005BFDC7CF192E56F0F56BB37EF1DC1EAB34577BD69EC10F87508864800
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
7
DNS requests
4
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
772
CScript.exe
GET
200
2.16.186.27:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOFvRj973rrPO3ypqcX4igUEQ%3D%3D
unknown
der
527 b
whitelisted
772
CScript.exe
GET
200
2.16.186.11:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
1048
svchost.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAKXB1YM1Knrv%2BJy8eCW2II%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
772
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
772
CScript.exe
2.16.186.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
772
CScript.exe
2.16.186.27:80
ocsp.int-x3.letsencrypt.org
Akamai International B.V.
whitelisted
480
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
2936
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
3488
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
1048
svchost.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
iplogger.org
  • 88.99.66.31
shared
isrg.trustid.ocsp.identrust.com
  • 2.16.186.11
  • 2.16.186.35
whitelisted
ocsp.int-x3.letsencrypt.org
  • 2.16.186.27
  • 2.16.186.11
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
772
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
772
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
480
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
480
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
2936
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
2936
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3488
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3488
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
9 ETPRO signatures available at the full report
No debug info