File name:

393d0f74-db9c-4deb-ae03-2cd46e69df09.zip

Full analysis: https://app.any.run/tasks/e7d3898d-eb67-479f-9121-b389da050f6c
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 25, 2019, 20:00:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
adware
installcore
pup
addrop
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

7015FE14A18975F60D190E49E845650E

SHA1:

B1483CFEC2EF42BFF74D1DBB41ABAF8900CA6BA5

SHA256:

24002EEA615E09078E281DFBC269FD28C1F298C4C78AB697279AF6DE893FCA35

SSDEEP:

24576:yx/aFskzgHuMzEnQvi5jdWEpFr2mfuInGwdiVSn6dSTmcbRiL8zAZipe0BOVr2Sm:ypQZnTVdWE3fdGOK9STfiiAiYsSm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • adobe_flash_setup_3366577055.exe (PID: 2284)
      • adobe_flash_setup_3366577055.exe (PID: 2784)
      • adobe_flash_setup_3366577055.exe (PID: 2888)
    • Connects to CnC server

      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • INSTALLCORE was detected

      • adobe_flash_setup_3366577055.exe (PID: 2784)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2968)
    • Reads the machine GUID from the registry

      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • Reads CPU info

      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • Reads Environment values

      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • Application launched itself

      • adobe_flash_setup_3366577055.exe (PID: 2284)
      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • Reads internet explorer settings

      • adobe_flash_setup_3366577055.exe (PID: 2784)
    • Reads Windows Product ID

      • adobe_flash_setup_3366577055.exe (PID: 2784)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2017:10:14 22:51:10
ZipCRC: 0x91b98f3c
ZipCompressedSize: 1543528
ZipUncompressedSize: 1569483
ZipFileName: Users/legag/Desktop/adobe_flash_setup_3366577055.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe adobe_flash_setup_3366577055.exe no specs #INSTALLCORE adobe_flash_setup_3366577055.exe adobe_flash_setup_3366577055.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2284"C:\Users\admin\Desktop\adobe_flash_setup_3366577055.exe" C:\Users\admin\Desktop\adobe_flash_setup_3366577055.exeexplorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Nonaranelu Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_3366577055.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2784"C:\Users\admin\Desktop\adobe_flash_setup_3366577055.exe" /RSF /ppn:YyhwYgxaFRAiP211FM5W /mnlC:\Users\admin\Desktop\adobe_flash_setup_3366577055.exe
adobe_flash_setup_3366577055.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Nonaranelu Setup
Exit code:
4294967206
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_3366577055.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2888"C:\Users\admin\Desktop\adobe_flash_setup_3366577055.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg== /mnlC:\Users\admin\Desktop\adobe_flash_setup_3366577055.exeadobe_flash_setup_3366577055.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Nonaranelu Setup
Exit code:
259
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_3366577055.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2968"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\393d0f74-db9c-4deb-ae03-2cd46e69df09.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
622
Read events
577
Write events
45
Delete events
0

Modification events

(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2968) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\393d0f74-db9c-4deb-ae03-2cd46e69df09.zip
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
1
Suspicious files
2
Text files
97
Unknown types
0

Dropped files

PID
Process
Filename
Type
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\0013B24C.log
MD5:
SHA256:
2968WinRAR.exeC:\Users\admin\Desktop\adobe_flash_setup_3366577055.exeexecutable
MD5:
SHA256:
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\progress-bar.csstext
MD5:5335F1C12201B5F7CF5F8B4F5692E3D1
SHA256:974CD89E64BDAA85BF36ED2A50AF266D245D781A8139F5B45D7C55A0B0841DDA
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\form.bmp.Maskbinary
MD5:D2FC989F9C2043CD32332EC0FAD69C70
SHA256:27DD029405CBFB0C3BF8BAC517BE5DB9AA83E981B1DC2BD5C5D6C549FA514101
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\button.csstext
MD5:37E1FF96E084EC201F0D95FEEF4D5E94
SHA256:8E806F5B94FC294E918503C8053EF1284E4F4B1E02C7DA4F4635E33EC33E0534
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\images\button-bg.pngimage
MD5:98B1DE48DFA64DC2AA1E52FACFBEE3B0
SHA256:2693930C474FE640E2FE8D6EF98ABE2ECD303D2392C3D8B2E006E8942BA8F534
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\browse.csstext
MD5:6009D6E864F60AEA980A9DF94C1F7E1C
SHA256:5EF48A8C8C3771B4F233314D50DD3B5AFDCD99DD4B74A9745C8FE7B22207056D
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\checkbox.csstext
MD5:64773C6B0E3413C81AEBC46CCE8C9318
SHA256:B09504C1BF0486D3EC46500592B178A3A6C39284672AF8815C3687CC3D29560D
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\css\sdk-ui\images\progress-bg.pngimage
MD5:E9F12F92A9EEB8EBE911080721446687
SHA256:C1CF449536BC2778E27348E45F0F53D04C284109199FB7A9AF7A61016B91F8BC
2284adobe_flash_setup_3366577055.exeC:\Users\admin\AppData\Local\Temp\inH129082857122\images\BG.pngimage
MD5:335A24011568627DE62082173F5FEF77
SHA256:E80B2232C24870B3D983D7576DD4BD117F7352B57B72BA61A0295ABF4F60D71D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
2
DNS requests
2
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2784
adobe_flash_setup_3366577055.exe
POST
200
54.194.149.175:80
http://rp.notatolol2.com/
IE
malicious
2784
adobe_flash_setup_3366577055.exe
POST
200
54.194.149.175:80
http://rp.notatolol2.com/
IE
malicious
2784
adobe_flash_setup_3366577055.exe
POST
200
54.194.149.175:80
http://rp.notatolol2.com/
IE
malicious
2784
adobe_flash_setup_3366577055.exe
POST
500
18.203.190.76:80
http://info.notatolol2.com/?vuv=0
US
text
21 b
malicious
2784
adobe_flash_setup_3366577055.exe
POST
500
18.203.190.76:80
http://info.notatolol2.com/?quepeg=1
US
text
21 b
malicious
2784
adobe_flash_setup_3366577055.exe
POST
200
54.194.149.175:80
http://rp.notatolol2.com/
IE
malicious
2784
adobe_flash_setup_3366577055.exe
POST
500
18.203.190.76:80
http://info.notatolol2.com/?wewudeh=2
US
text
21 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2784
adobe_flash_setup_3366577055.exe
54.194.149.175:80
rp.notatolol2.com
Amazon.com, Inc.
IE
malicious
2784
adobe_flash_setup_3366577055.exe
18.203.190.76:80
info.notatolol2.com
US
malicious

DNS requests

Domain
IP
Reputation
rp.notatolol2.com
  • 54.194.149.175
  • 52.214.73.247
malicious
info.notatolol2.com
  • 18.203.190.76
  • 52.209.116.64
  • 52.212.157.66
malicious

Threats

PID
Process
Class
Message
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
2784
adobe_flash_setup_3366577055.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
6 ETPRO signatures available at the full report
No debug info