File name:

Cs 2 SkinChanger.zip

Full analysis: https://app.any.run/tasks/eff1a7b9-3d40-45fe-be48-356fcbc59c76
Verdict: Malicious activity
Threats:

RisePro, an information-stealing malware, targets a wide range of sensitive data, including credit cards, passwords, and cryptocurrency wallets. By compromising infected devices, RisePro can steal valuable information and potentially cause significant financial and personal losses for victims.

Analysis date: December 04, 2023, 14:16:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
risepro
stealer
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

9EFA4D31D6BE7777F5C104B1C6DF7361

SHA1:

004DC09F364BC651EEE4C3A378CAE6772087119F

SHA256:

33661CE27FB6A02156CF58124CC03F598B57A01E8AD102B8D5BD6DABD35BCE90

SSDEEP:

98304:ryWVnLNJnlvQ5kKIRLte0TEbu/SSQeQ6Lz6UfeHUa0Oarq45HqBWZZXBitfEkUwW:Kr3QaJSp5h0Yal/75L6XAziVbQW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RISEPRO has been detected (SURICATA)

      • Loader.exe (PID: 3644)
      • IEUpdater140.exe (PID: 3272)
    • Steals credentials from Web Browsers

      • Loader.exe (PID: 3644)
    • Steals credentials

      • Loader.exe (PID: 3644)
    • Create files in the Startup directory

      • Loader.exe (PID: 3644)
    • Uses Task Scheduler to run other applications

      • Loader.exe (PID: 3644)
    • Drops the executable file immediately after the start

      • Loader.exe (PID: 3644)
    • Uses Task Scheduler to autorun other applications

      • Loader.exe (PID: 3644)
    • RISEPRO has been detected (YARA)

      • IEUpdater140.exe (PID: 3272)
    • Actions looks like stealing of personal data

      • Loader.exe (PID: 3644)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • Loader.exe (PID: 3644)
    • Checks for external IP

      • Loader.exe (PID: 3644)
    • Connects to unusual port

      • Loader.exe (PID: 3644)
      • IEUpdater140.exe (PID: 3272)
    • Reads browser cookies

      • Loader.exe (PID: 3644)
    • Accesses Microsoft Outlook profiles

      • Loader.exe (PID: 3644)
    • Searches for installed software

      • Loader.exe (PID: 3644)
    • Starts itself from another location

      • Loader.exe (PID: 3644)
    • Reads the Internet Settings

      • Loader.exe (PID: 3644)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 844)
    • Manual execution by a user

      • WinRAR.exe (PID: 1036)
      • Loader.exe (PID: 3644)
      • WinRAR.exe (PID: 2920)
      • WinRAR.exe (PID: 2072)
      • cmd.exe (PID: 2608)
      • taskmgr.exe (PID: 2968)
      • WinRAR.exe (PID: 2332)
      • wmpnscfg.exe (PID: 4076)
    • Checks supported languages

      • Loader.exe (PID: 3644)
      • IEUpdater140.exe (PID: 3272)
      • wmpnscfg.exe (PID: 4076)
    • Reads the computer name

      • Loader.exe (PID: 3644)
      • IEUpdater140.exe (PID: 3272)
      • wmpnscfg.exe (PID: 4076)
    • Reads the machine GUID from the registry

      • Loader.exe (PID: 3644)
      • IEUpdater140.exe (PID: 3272)
    • Create files in a temporary directory

      • Loader.exe (PID: 3644)
    • Reads product name

      • Loader.exe (PID: 3644)
    • Reads CPU info

      • Loader.exe (PID: 3644)
    • Creates files in the program directory

      • Loader.exe (PID: 3644)
    • Reads Environment values

      • Loader.exe (PID: 3644)
    • Creates files or folders in the user directory

      • Loader.exe (PID: 3644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RisePro

(PID) Process(3272) IEUpdater140.exe
C246.4.10.254
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:10:14 16:07:04
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Cs 2 SkinChanger/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
13
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs cmd.exe no specs taskmgr.exe no specs #RISEPRO loader.exe schtasks.exe no specs schtasks.exe no specs ieupdater140.exe no specs #RISEPRO ieupdater140.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
844"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Cs 2 SkinChanger.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1036"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New WinRAR archive.rar" C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2072"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New WinRAR ZIP archive.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2332"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New WinRAR archive.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2608"C:\Windows\system32\cmd.exe" C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2920"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\New WinRAR ZIP archive.zip" C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2968"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3272"C:\ProgramData\IEUpdater140\IEUpdater140.exe" C:\ProgramData\IEUpdater140\IEUpdater140.exe
Loader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\programdata\ieupdater140\ieupdater140.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
RisePro
(PID) Process(3272) IEUpdater140.exe
C246.4.10.254
3504schtasks /create /f /RU "admin" /tr "C:\ProgramData\IEUpdater140\IEUpdater140.exe" /tn "IEUpdater140 LG" /sc ONLOGON /rl HIGHESTC:\Windows\System32\schtasks.exeLoader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
3644"C:\Users\admin\Desktop\Cs 2 SkinChanger\Loader.exe" C:\Users\admin\Desktop\Cs 2 SkinChanger\Loader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\cs 2 skinchanger\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
Total events
10 147
Read events
9 954
Write events
188
Delete events
5

Modification events

(PID) Process:(844) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(844) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
7
Suspicious files
41
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb844.40742\Cs 2 SkinChanger\bin\UbuilderB.dllexecutable
MD5:F474BAF2F922F8485752170CC261A72B
SHA256:2F9A39635D6A379577B073945477609C3AB3656C4ADC54A0D7CCE23C4432C04F
844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb844.40742\Cs 2 SkinChanger\bin\scv.jartext
MD5:8D94FB4EF8D7ABCB571F4A0C40BC8600
SHA256:4C49A4774B4185035A923FA4585E5A9B469A4A1CEB115DA738C62D3D0EBF299E
844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb844.40742\Cs 2 SkinChanger\xNet.dllbinary
MD5:E50D4C24DDFB38D5C8779346A9266D8D
SHA256:80B5B9A2A344BC99CFDA96E4EB87DED45484FA1E3C31FC6F4BC332F60923A398
844WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb844.40742\Cs 2 SkinChanger\packages\settingssbinary
MD5:72AC596D894D392F128D420BD9EFB8C1
SHA256:21035CA1D402FEE0DC9ADF2907FA7C98627D0E89054C04712470129CCE4F7A63
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\D87fZN3R3jFeWeb Databinary
MD5:F47EB60CDF981C17722D0CE740129927
SHA256:0210071DF12CA42D70DCB679926668AE072264705AC139A24F94BBC5A129DD8F
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\8ghN89CsjOW1key4.dbbinary
MD5:F62D8E993EA9C3B3A89DA19E4012638D
SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\02zdBXl47cvzkey4.dbbinary
MD5:F62D8E993EA9C3B3A89DA19E4012638D
SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\02zdBXl47cvzHistorybinary
MD5:FBD34F0AB5E3F18371CF71395F40C3C5
SHA256:17C9F4CB0FA71685013A864174352D87B1FE35CC3F3B499DF92EEDA3ABB8F862
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\D87fZN3R3jFekey4.dbbinary
MD5:F62D8E993EA9C3B3A89DA19E4012638D
SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A
3644Loader.exeC:\Users\admin\AppData\Local\Temp\posterBoxzQUxG0Nz1Yc87\8ghN89CsjOW1Login Data For Accountbinary
MD5:02D2C46697E3714E49F46B680B9A6B83
SHA256:522CAD95D3FA6EBB3274709B8D09BBB1CA37389D0A924CD29E934A75AA04C6C9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
11
DNS requests
2
Threats
15

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
3644
Loader.exe
46.4.10.254:50500
Hetzner Online GmbH
DE
malicious
3644
Loader.exe
34.117.59.81:443
ipinfo.io
GOOGLE-CLOUD-PLATFORM
US
whitelisted
3644
Loader.exe
104.26.4.15:443
db-ip.com
CLOUDFLARENET
US
unknown
3272
IEUpdater140.exe
46.4.10.254:50500
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
ipinfo.io
  • 34.117.59.81
shared
db-ip.com
  • 104.26.4.15
  • 172.67.75.166
  • 104.26.5.15
whitelisted

Threats

PID
Process
Class
Message
3644
Loader.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] RisePro TCP (Token)
3644
Loader.exe
Malware Command and Control Activity Detected
STEALER [ANY.RUN] RisePro TCP (Token)
3644
Loader.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] RisePro TCP (External IP)
3644
Loader.exe
Malware Command and Control Activity Detected
STEALER [ANY.RUN] RisePro TCP (External IP Check)
3644
Loader.exe
A Network Trojan was detected
ET MALWARE Suspected RisePro TCP Heartbeat Packet
3644
Loader.exe
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
3644
Loader.exe
Malware Command and Control Activity Detected
STEALER [ANY.RUN] RisePro TCP (get_settings)
3644
Loader.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] RisePro TCP (Exfiltration)
3644
Loader.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] RisePro TCP (exfiltration)
3272
IEUpdater140.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] RisePro TCP (Token)
No debug info