analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FatalityWin Crack.rar

Full analysis: https://app.any.run/tasks/c495da88-4131-4112-9aab-dace39c319f4
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 16, 2019, 13:25:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E5A0E16F0A81ED7ED51F888E15F4ECE3

SHA1:

8B3AC9DC70E2FEFC0F80C444B5FF340BB24E55CE

SHA256:

31943CC119C9AEB5C0B23B329FA33CABEEAB10E5E9D845441D7CD5CF24719513

SSDEEP:

24576:yiPBhsv1ohPnfdTVO5I2Qm/S0jsUC0zweObR2qgU0wTEpIuiN:yiPE1oXQINprUC0n0R2qgJPpIuiN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Stealing of credential data

      • fatalityLauncher.exe (PID: 332)
  • SUSPICIOUS

    • Reads Environment values

      • fatalityLauncher.exe (PID: 332)
    • Creates files in the program directory

      • fatalityLauncher.exe (PID: 332)
    • Application launched itself

      • fatalityLauncher.exe (PID: 2368)
    • Reads the cookies of Google Chrome

      • fatalityLauncher.exe (PID: 332)
    • Starts CMD.EXE for commands execution

      • fatalityLauncher.exe (PID: 332)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 3080)
  • INFO

    • Manual execution by user

      • fatalityLauncher.exe (PID: 2368)
      • rundll32.exe (PID: 3876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs fatalitylauncher.exe no specs fatalitylauncher.exe cmd.exe no specs choice.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\FatalityWin Crack.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2368"C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe" C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exeexplorer.exe
User:
admin
Company:
5pp1Zs5xUzqK1sすBLこBzHかBrLpW9JoBuRKo2Ys元tvvs91s気OWoHvvWB5SR4tKtYBQK
Integrity Level:
MEDIUM
Description:
1v3SDvx68K9K7tXnで47o2H8YntAoに2OかQXZYsOHKで92CQ4YS5K6urは2tzWXVDzzHP8
Exit code:
0
Version:
5.1.5.2
332"C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe" C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe
fatalityLauncher.exe
User:
admin
Company:
5pp1Zs5xUzqK1sすBLこBzHかBrLpW9JoBuRKo2Ys元tvvs91s気OWoHvvWB5SR4tKtYBQK
Integrity Level:
MEDIUM
Description:
1v3SDvx68K9K7tXnで47o2H8YntAoに2OかQXZYsOHKで92CQ4YS5K6urは2tzWXVDzzHP8
Exit code:
0
Version:
5.1.5.2
3080"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T & Del "fatalityLauncher.exe"C:\Windows\System32\cmd.exefatalityLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2912choice /C Y /N /D Y /T C:\Windows\system32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
255
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3876"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\GDIPFONTCACHEV1.DATC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
565
Read events
526
Write events
39
Delete events
0

Modification events

(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(640) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\FatalityWin Crack.rar
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(332) fatalityLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fatalityLauncher_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(332) fatalityLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fatalityLauncher_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
2
Text files
8
Unknown types
2

Dropped files

PID
Process
Filename
Type
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\fatalityLauncher.exe
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\gui-57.dll
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\icuuc.dll
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\ReadMe.txt
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\Temp\s4dgdtadpgu.fv
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\Temp\v5y1puhfa5j.fv
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\U3LZDGVTLKNOYXJBXQ\FuckTheWorld\Misc\ReadMe.txt
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\Temp\zewnvphm5zr.fvsqlite
MD5:DD9640AF5F03807CF2E3921CBA16AF0D
SHA256:ECF72C454FEF08C5948A565464839A554567E499F995483D6C8B54B32EA2C5F0
332fatalityLauncher.exeC:\Users\admin\AppData\Local\U3LZDGVTLKNOYXJBXQ\[GB]185.92.25.17_U3LZDGVTLKNOYXJBXQ.zipcompressed
MD5:71AF9FB28A60C61950A90C2A8CBB474E
SHA256:75C2B75E005CFDDC573291A86B626586DF2D291259A7053463FE06B32E01B53F
332fatalityLauncher.exeC:\ProgramData\debug.txttext
MD5:86F9C0DC4B80F1D0F9121A67470C0A69
SHA256:2ABA1A3878BD14F45448F10C0BB0E48D40E58AA981DF4465BA9ED213114C22A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
332
fatalityLauncher.exe
GET
200
31.131.30.43:80
http://hokage.ru/antivirus.php
US
text
31 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
332
fatalityLauncher.exe
31.131.30.43:80
hokage.ru
PE Skurykhin Mukola Volodumurovuch
US
malicious
332
fatalityLauncher.exe
176.10.124.134:443
soranoproject.com
SOFTplus Entwicklungen GmbH
CH
suspicious

DNS requests

Domain
IP
Reputation
hokage.ru
  • 31.131.30.43
malicious
soranoproject.com
  • 176.10.124.134
suspicious

Threats

No threats detected
No debug info