download:

/pepeleaks/Wizard-Crypter/refs/heads/main/Wizard_Crypter.exe

Full analysis: https://app.any.run/tasks/7f39115d-62c2-4a69-8337-0b4e59f50725
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: September 26, 2024, 07:21:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
themida
sheetrat
rat
ip-check
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B26B293985F7C364210C7CD10730081E

SHA1:

CB877AAC5D4984CDF2916537485749C809E5919C

SHA256:

5795564A2652877356805490F4D0C918F0512F00F9C0534A029B03FB2400669C

SSDEEP:

98304:HWLCUObPoNYGDnH+pvkbs/jiqLt1+DlX+9Z+0Pk5U+mX72avk4l3fvPU3olkC5wu:TWx5BcIOcypaINjqElPVL7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SHEETRAT has been detected (YARA)

      • Wizard_Crypter.exe (PID: 5516)
  • SUSPICIOUS

    • Reads the BIOS version

      • Wizard_Crypter.exe (PID: 5516)
    • There is functionality for taking screenshot (YARA)

      • Wizard_Crypter.exe (PID: 5516)
    • There is functionality for capture public ip (YARA)

      • Wizard_Crypter.exe (PID: 5516)
  • INFO

    • Checks supported languages

      • Wizard_Crypter.exe (PID: 5516)
    • Sends debugging messages

      • Wizard_Crypter.exe (PID: 5516)
    • Reads the computer name

      • Wizard_Crypter.exe (PID: 5516)
    • Reads the machine GUID from the registry

      • Wizard_Crypter.exe (PID: 5516)
    • Themida protector has been detected

      • Wizard_Crypter.exe (PID: 5516)
    • Reads the software policy settings

      • Wizard_Crypter.exe (PID: 5516)
    • Checks proxy server information

      • Wizard_Crypter.exe (PID: 5516)
    • Disables trace logs

      • Wizard_Crypter.exe (PID: 5516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:30 07:40:49+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 10397184
InitializedDataSize: 22528
UninitializedDataSize: -
EntryPoint: 0xe6c000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.0.0.0
ProductVersionNumber: 5.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: WizNon
CompanyName: -
FileDescription: Wizard Crypter
FileVersion: 5.0.0.0
InternalName: Wizard Crypter.exe
LegalCopyright: Copyright © 2023
LegalTrademarks: -
OriginalFileName: Wizard Crypter.exe
ProductName: Wizard Crypter
ProductVersion: 5.0.0.0
AssemblyVersion: 5.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT wizard_crypter.exe svchost.exe wizard_crypter.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5516"C:\Users\admin\AppData\Local\Temp\Wizard_Crypter.exe" C:\Users\admin\AppData\Local\Temp\Wizard_Crypter.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Wizard Crypter
Version:
5.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wizard_crypter.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6548"C:\Users\admin\AppData\Local\Temp\Wizard_Crypter.exe" C:\Users\admin\AppData\Local\Temp\Wizard_Crypter.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Wizard Crypter
Exit code:
3221226540
Version:
5.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wizard_crypter.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
1 681
Read events
1 667
Write events
14
Delete events
0

Modification events

(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5516) Wizard_Crypter.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wizard_Crypter_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
19
DNS requests
12
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4472
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1848
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
5516
Wizard_Crypter.exe
104.26.0.5:443
keyauth.win
CLOUDFLARENET
US
malicious
4472
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5516
Wizard_Crypter.exe
34.82.173.236:443
expensivethunderousbutton.ponoaseno.repl.co
GOOGLE-CLOUD-PLATFORM
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
keyauth.win
  • 104.26.0.5
  • 104.26.1.5
  • 172.67.72.57
malicious
expensivethunderousbutton.ponoaseno.repl.co
  • 34.82.173.236
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.30
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET INFO Fake Game Cheat Related Domain in DNS Lookup (keyauth .win)
5516
Wizard_Crypter.exe
Potentially Bad Traffic
ET INFO Fake Game Cheat Related Domain (keyauth .win) in TLS SNI
Process
Message
Wizard_Crypter.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------