File name:

FatalityWin Crack.rar

Full analysis: https://app.any.run/tasks/c495da88-4131-4112-9aab-dace39c319f4
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 16, 2019, 13:25:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E5A0E16F0A81ED7ED51F888E15F4ECE3

SHA1:

8B3AC9DC70E2FEFC0F80C444B5FF340BB24E55CE

SHA256:

31943CC119C9AEB5C0B23B329FA33CABEEAB10E5E9D845441D7CD5CF24719513

SSDEEP:

24576:yiPBhsv1ohPnfdTVO5I2Qm/S0jsUC0zweObR2qgU0wTEpIuiN:yiPE1oXQINprUC0n0R2qgJPpIuiN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Stealing of credential data

      • fatalityLauncher.exe (PID: 332)
  • SUSPICIOUS

    • Application launched itself

      • fatalityLauncher.exe (PID: 2368)
    • Creates files in the program directory

      • fatalityLauncher.exe (PID: 332)
    • Reads Environment values

      • fatalityLauncher.exe (PID: 332)
    • Reads the cookies of Google Chrome

      • fatalityLauncher.exe (PID: 332)
    • Starts CMD.EXE for commands execution

      • fatalityLauncher.exe (PID: 332)
    • Starts CHOICE.EXE (used to create a delay)

      • cmd.exe (PID: 3080)
  • INFO

    • Manual execution by user

      • fatalityLauncher.exe (PID: 2368)
      • rundll32.exe (PID: 3876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs fatalitylauncher.exe no specs fatalitylauncher.exe cmd.exe no specs choice.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe" C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe
fatalityLauncher.exe
User:
admin
Company:
5pp1Zs5xUzqK1sすBLこBzHかBrLpW9JoBuRKo2Ys元tvvs91s気OWoHvvWB5SR4tKtYBQK
Integrity Level:
MEDIUM
Description:
1v3SDvx68K9K7tXnで47o2H8YntAoに2OかQXZYsOHKで92CQ4YS5K6urは2tzWXVDzzHP8
Exit code:
0
Version:
5.1.5.2
Modules
Images
c:\users\admin\desktop\fatality crack\fatalitylauncher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
640"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\FatalityWin Crack.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2368"C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exe" C:\Users\admin\Desktop\Fatality Crack\fatalityLauncher.exeexplorer.exe
User:
admin
Company:
5pp1Zs5xUzqK1sすBLこBzHかBrLpW9JoBuRKo2Ys元tvvs91s気OWoHvvWB5SR4tKtYBQK
Integrity Level:
MEDIUM
Description:
1v3SDvx68K9K7tXnで47o2H8YntAoに2OかQXZYsOHKで92CQ4YS5K6urは2tzWXVDzzHP8
Exit code:
0
Version:
5.1.5.2
Modules
Images
c:\users\admin\desktop\fatality crack\fatalitylauncher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2912choice /C Y /N /D Y /T C:\Windows\system32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
255
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\choice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
3080"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T & Del "fatalityLauncher.exe"C:\Windows\System32\cmd.exefatalityLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3876"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\GDIPFONTCACHEV1.DATC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
565
Read events
526
Write events
39
Delete events
0

Modification events

(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(640) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\FatalityWin Crack.rar
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(640) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(332) fatalityLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fatalityLauncher_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(332) fatalityLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fatalityLauncher_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
2
Text files
8
Unknown types
2

Dropped files

PID
Process
Filename
Type
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\fatalityLauncher.exe
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\gui-57.dll
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\icuuc.dll
MD5:
SHA256:
640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa640.25963\Fatality Crack\ReadMe.txt
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\Temp\s4dgdtadpgu.fv
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\Temp\v5y1puhfa5j.fv
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\U3LZDGVTLKNOYXJBXQ\FuckTheWorld\Misc\ReadMe.txt
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\U3LZDGVTLKNOYXJBXQ\FuckTheWorld\Browsers\AutoFill.txttext
MD5:
SHA256:
332fatalityLauncher.exeC:\Users\admin\AppData\Local\U3LZDGVTLKNOYXJBXQ\FuckTheWorld\image.pngimage
MD5:
SHA256:
332fatalityLauncher.exeC:\ProgramData\debug.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
332
fatalityLauncher.exe
GET
200
31.131.30.43:80
http://hokage.ru/antivirus.php
US
text
31 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
332
fatalityLauncher.exe
31.131.30.43:80
hokage.ru
PE Skurykhin Mukola Volodumurovuch
US
malicious
332
fatalityLauncher.exe
176.10.124.134:443
soranoproject.com
SOFTplus Entwicklungen GmbH
CH
suspicious

DNS requests

Domain
IP
Reputation
hokage.ru
  • 31.131.30.43
malicious
soranoproject.com
  • 176.10.124.134
suspicious

Threats

No threats detected
No debug info