analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Stf64.rar

Full analysis: https://app.any.run/tasks/5ca0439e-06ca-4ddd-9fa0-33cc07140f84
Verdict: Malicious activity
Analysis date: February 22, 2020, 02:53:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

187649348720074F3250F9421147F221

SHA1:

4D9328593A30896E32EAD8E08FE5BBBC0242193C

SHA256:

2A0CD6ACF88E0AB539CFB7324CEF294612ACBDFAA6738825648F6C4EDAC5A00D

SSDEEP:

196608:3s7ATYajR0zGu43cmDlfA+epN/7nNf4qc733ucGc/qCL5e3b9JjwgQhCV+:cVajwHBslfzgN2qi33zip3Dwz1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Patch.exe (PID: 1920)
      • Patch.exe (PID: 3460)
      • Setup.exe (PID: 2660)
      • Setup.exe (PID: 3744)
      • GetMachineSID.exe (PID: 3848)
      • irsetup.exe (PID: 4068)
    • Loads dropped or rewritten executable

      • Patch.exe (PID: 3460)
      • irsetup.exe (PID: 4068)
    • Connects to CnC server

      • irsetup.exe (PID: 4068)
    • Changes settings of System certificates

      • irsetup.exe (PID: 4068)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3824)
      • Patch.exe (PID: 3460)
      • Setup.exe (PID: 3744)
      • irsetup.exe (PID: 4068)
    • Uses REG.EXE to modify Windows registry

      • irsetup.exe (PID: 4068)
    • Reads Internet Cache Settings

      • irsetup.exe (PID: 4068)
    • Reads internet explorer settings

      • irsetup.exe (PID: 4068)
    • Adds / modifies Windows certificates

      • irsetup.exe (PID: 4068)
  • INFO

    • Manual execution by user

      • Patch.exe (PID: 3460)
      • Patch.exe (PID: 1920)
      • Setup.exe (PID: 3744)
      • Setup.exe (PID: 2660)
    • Reads settings of System Certificates

      • irsetup.exe (PID: 4068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: Setup.exe
PackingMethod: Normal
ModifyDate: 2018:06:13 21:35:01
OperatingSystem: Win32
UncompressedSize: 12709888
CompressedSize: 12014266
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe patch.exe no specs patch.exe setup.exe no specs setup.exe irsetup.exe getmachinesid.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3824"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Stf64.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1920"C:\Users\admin\Desktop\Patch.exe" C:\Users\admin\Desktop\Patch.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
3460"C:\Users\admin\Desktop\Patch.exe" C:\Users\admin\Desktop\Patch.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
2660"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup Application
Exit code:
3221226540
Version:
9.5.1.0
3744"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup Application
Version:
9.5.1.0
4068"C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1954746 "__IRAFN:C:\Users\admin\Desktop\Setup.exe" "__IRCT:3" "__IRTSS:12702823" "__IRSID:S-1-5-21-1302019708-1500728564-335382590-1000"C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
Setup.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
HIGH
Description:
Setup Application
Version:
9.5.1.0
3848"C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe" C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.tmpC:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exeirsetup.exe
User:
admin
Company:
Stardock Software, Inc
Integrity Level:
HIGH
Description:
Installer Helper
Exit code:
0
Version:
1.0.0.1
2512"C:\Windows\system32\reg.exe" export HKLM\Software\Stardock C:\Users\admin\AppData\Local\Temp\registry_export.txt /yC:\Windows\system32\reg.exeirsetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 912
Read events
1 668
Write events
0
Delete events
0

Modification events

No data
Executable files
8
Suspicious files
4
Text files
17
Unknown types
2

Dropped files

PID
Process
Filename
Type
3824WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3824.6104\Setup.exe
MD5:
SHA256:
4068irsetup.exeC:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.dat
MD5:
SHA256:
4068irsetup.exeC:\Users\admin\AppData\Local\Temp\Stardock Fences 3 Setup Log.txttext
MD5:E788EFC82DE86E851B3049D03A01D726
SHA256:E4F271906996AB84BE819C7C2D708A80F1E5E806A1AC5828E70272732DDA96A2
4068irsetup.exeC:\Users\admin\AppData\Local\Temp\sdWebResults.xmltext
MD5:6B5553C437CB43D10FD6CC1A48C5D02D
SHA256:D83EE67FA9828A504426EBC1BD862CEEA9F9912DF0770243EF57EA98BA3719B9
4068irsetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:E550DA03AEE5B546B436CD553D3233B9
SHA256:9ABFD4E29B96CCA442502B1DE6071FE0293455DF22B4EFF19FA3E6DF060947E7
4068irsetup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\groupy-2[1].htmhtml
MD5:047783D10463DA884C8C3F7C3DAA56DC
SHA256:24181AD9FCC9EFC79F41CAF660D3A5148DD83FD4B62FE674D734F4286264F772
4068irsetup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\groupy_v2[1].jpgimage
MD5:CEC87FEB240D39D60B314DEB2285C224
SHA256:8AA88C2EC533FA4EA012DA2463A4EB936DD5ECACD233634BB8DB091A2C3FF2A2
4068irsetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:9E3B450C1DD77E65C824195584FDF724
SHA256:1229D1C1E7EA07F3E6B37EBBE0501B128963912D08297C3E4A9B9D481877CDF6
4068irsetup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\bg_v1[1].pngimage
MD5:75E6A088B204E0CC79984240D408C7F0
SHA256:1D63510B40D74209A1BCFC0E8E79BEFC9C701E9471B6F81E0D730C0A6568F37F
4068irsetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_4D95D2CC90050ED69FBE26D775AA3232der
MD5:344A400B3D0FCDF93B9D5044942ED65C
SHA256:AAFE709E024D2437D7B311F3235568D3A8277E80EB9B9442B24DF75B29071D9C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4068
irsetup.exe
GET
200
205.234.175.175:80
http://stardock.cachefly.net/installer_crosssell_images/groupy_v2.jpg
US
image
66.2 Kb
whitelisted
4068
irsetup.exe
GET
200
172.217.23.99:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCgdZM8AVzzKAgAAAAALnDU
US
der
472 b
whitelisted
4068
irsetup.exe
GET
200
66.79.209.93:80
http://installers.stardock.com/crosssell/groupy-2/
US
html
888 b
whitelisted
4068
irsetup.exe
POST
200
66.79.209.82:80
http://install.api.stardock.net/installer/Initialize/?format=xml
US
text
735 b
whitelisted
4068
irsetup.exe
GET
200
205.234.175.175:80
http://stardock.cachefly.net/installer_crosssell_images/bg_v1.png
US
image
973 b
whitelisted
4068
irsetup.exe
GET
200
172.217.23.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4068
irsetup.exe
172.217.23.99:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4068
irsetup.exe
205.234.175.175:80
stardock.cachefly.net
CacheNetworks, Inc.
US
suspicious
4068
irsetup.exe
216.58.207.46:443
www.google-analytics.com
Google Inc.
US
whitelisted
4068
irsetup.exe
66.79.209.82:80
install.api.stardock.net
Telnet Worldwide, Inc.
US
malicious
4068
irsetup.exe
66.79.209.93:80
installers.stardock.com
Telnet Worldwide, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
install.api.stardock.net
  • 66.79.209.82
whitelisted
installers.stardock.com
  • 66.79.209.93
unknown
stardock.cachefly.net
  • 205.234.175.175
whitelisted
www.google-analytics.com
  • 216.58.207.46
whitelisted
ocsp.pki.goog
  • 172.217.23.99
whitelisted

Threats

PID
Process
Class
Message
4068
irsetup.exe
Misc activity
ADWARE [PTsecurity] Setup Factory Installer Checkin
1 ETPRO signatures available at the full report
No debug info