analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://anonfile.com/54qeebo3bf/SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad_rar

Full analysis: https://app.any.run/tasks/5fc1d646-b93f-4395-846f-e12dc2cec331
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 19, 2018, 02:07:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MD5:

AA68EF042449A17BE5F6EA9AFC5A1372

SHA1:

4AF0C12D35589ED6CEE2AB9238B393BE40FE6841

SHA256:

56AF127E14D1C4F6EA73A34CC81E4A82D45CE77374F4C3BA6782340E3C5634F0

SSDEEP:

3:N8RGx2RA3JpdT2KLn:2gx0A31T20n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SexyChecker Cracked by LSquad.exe (PID: 3796)
    • Loads dropped or rewritten executable

      • SexyChecker Cracked by LSquad.exe (PID: 3796)
  • SUSPICIOUS

    • Reads Environment values

      • SexyChecker Cracked by LSquad.exe (PID: 3796)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2708)
    • Connects to unusual port

      • SexyChecker Cracked by LSquad.exe (PID: 3796)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 3108)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3452)
    • Changes internet zones settings

      • iexplore.exe (PID: 2808)
    • Application launched itself

      • iexplore.exe (PID: 2808)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3108)
      • iexplore.exe (PID: 2808)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3108)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2808)
      • SexyChecker Cracked by LSquad.exe (PID: 3796)
    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 2708)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2808)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs winrar.exe sexychecker cracked by lsquad.exe

Process information

PID
CMD
Path
Indicators
Parent process
2808"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
3108"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2808 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3452C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2708"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad[1].rar"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3796"C:\Users\admin\Desktop\SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad\SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad\SexyChecker Cracked by LSquad.exe" C:\Users\admin\Desktop\SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad\SexyChecker_v3.7_By_Minecon_Cracked_by_LSquad\SexyChecker Cracked by LSquad.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SexyChecker
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\sexychecker_v3.7_by_minecon_cracked_by_lsquad\sexychecker_v3.7_by_minecon_cracked_by_lsquad\sexychecker cracked by lsquad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
2 289
Read events
2 061
Write events
219
Delete events
9

Modification events

(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{F685E913-0332-11E9-BAD8-5254004A04AF}
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070C00030013000200080018009A02
Executable files
4
Suspicious files
5
Text files
203
Unknown types
5

Dropped files

PID
Process
Filename
Type
2808iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2808iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\SexyChecker_v3[1].7_By_Minecon_Cracked_by_LSquad_rar
MD5:
SHA256:
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\app[1].jstext
MD5:D83DF5523D24AE353A981C91CDFCD312
SHA256:026BE6782D7F8F7DC3D7B2F5258BA1406CEF66DE4E329C2574F117FB21A94D1C
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\anonfile[1].csstext
MD5:159FBF93FD01FB69D8BCF37D41708472
SHA256:930D052AD16DD77E1EA857D2D89F029C397C82D2EB212084F728FEC10E16F040
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\d3ud741uvs727m_cloudfront_net[1]text
MD5:A23ADD1C5453DFAEEA679967BEA4881E
SHA256:9CC5CAE1D620F910BBA77959C5750D4D85566040B3B84C0783A1D1332A4936A9
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\js[1]text
MD5:29B33414CD17980DAA7F61FB08AF11B9
SHA256:557561BA31430F10BC8B494B5189F7538032B77110859FA0C5FC693289084EB3
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\logo-anonfile[1].pngimage
MD5:B02F4A2776B104D3144E3829D2A3BDA3
SHA256:A9D65E88B9F25A240E8664F636534F0B7C368DC3B491B463723860F87CA0605E
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\SexyChecker_v3[1].htmhtml
MD5:C2F6E9DF33D3A8D7C87C455CC2949F32
SHA256:2ACB99E923B56373749218D90AF5980A496C0C8DBE633024874822B7FD1C67FC
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\html5shiv.min[1].jshtml
MD5:40BD440D29B3A9371B0C63FEC41EE64F
SHA256:DC9CBF19B48BAE0D28F72E59E67D6EC34AB1644087EC2E8E42954180D1586B48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
416
TCP/UDP connections
565
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3796
SexyChecker Cracked by LSquad.exe
CONNECT
45.71.229.58:8080
http://45.71.229.58:8080authserver.mojang.com:443
unknown
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
95.143.129.147:34107
http://95.143.129.147:34107authserver.mojang.com:443
CZ
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
185.75.36.194:58398
http://185.75.36.194:58398authserver.mojang.com:443
PL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
128.68.160.16:32211
http://128.68.160.16:32211authserver.mojang.com:443
RU
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
3796
SexyChecker Cracked by LSquad.exe
CONNECT
178.62.232.92:80
http://178.62.232.92:80authserver.mojang.com:443
NL
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2808
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3108
iexplore.exe
185.147.237.126:443
anonfile.com
Obenetwork AB
SE
unknown
3108
iexplore.exe
34.199.249.1:443
shermore.info
Amazon.com, Inc.
US
unknown
3108
iexplore.exe
23.111.8.154:443
oss.maxcdn.com
netDNA
US
unknown
3108
iexplore.exe
99.84.158.174:443
d3ud741uvs727m.cloudfront.net
AT&T Services, Inc.
US
malicious
3108
iexplore.exe
99.84.158.176:80
x.ss2.us
AT&T Services, Inc.
US
suspicious
3108
iexplore.exe
172.217.168.40:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2808
iexplore.exe
185.147.237.126:443
anonfile.com
Obenetwork AB
SE
unknown
202.169.235.17:43675
Jogja Medianet
ID
suspicious
3108
iexplore.exe
99.84.151.86:443
boudja.com
AT&T Services, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
anonfile.com
  • 185.147.237.126
  • 185.152.35.245
whitelisted
oss.maxcdn.com
  • 23.111.8.154
whitelisted
www.googletagmanager.com
  • 172.217.168.40
whitelisted
shermore.info
  • 34.199.249.1
  • 34.193.208.137
  • 52.204.205.54
  • 52.4.118.30
  • 52.4.178.201
whitelisted
d3ud741uvs727m.cloudfront.net
  • 99.84.158.174
  • 99.84.158.211
  • 99.84.158.140
  • 99.84.158.129
whitelisted
x.ss2.us
  • 99.84.158.176
  • 99.84.158.111
  • 99.84.158.159
  • 99.84.158.23
whitelisted
www.download.windowsupdate.com
  • 67.27.234.126
  • 67.26.105.254
  • 67.26.109.254
  • 67.27.158.126
  • 67.27.237.254
whitelisted
boudja.com
  • 99.84.151.86
  • 99.84.151.75
  • 99.84.151.35
  • 99.84.151.25
whitelisted
governobylgot.info
  • 54.85.228.212
  • 50.19.200.218
  • 54.157.72.246
  • 54.234.212.179
  • 54.82.168.49
  • 54.236.76.70
  • 54.84.159.107
  • 34.203.72.50
unknown

Threats

No threats detected
No debug info