analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

farcry3.exe

Full analysis: https://app.any.run/tasks/2e69d97b-5597-4ed8-8b91-65006f35c153
Verdict: Malicious activity
Analysis date: July 12, 2020, 19:14:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D712327B6D8A981BFDADD275E57DF328

SHA1:

05D639AA57A6EC5B2383E15E6E552031B72E75EC

SHA256:

72994B08E0388906E606BA37DF92AC016329F53823E385F0954B25F6796E4D93

SSDEEP:

3072:lUAilgOxMzR/YemgAQb0OGi7ktAwTLJdoRw/QqUrPKINEU9pSwPp:qhIRK/Q+wwLJD/bURNEUGK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • CCleaner.exe (PID: 1464)
      • CCleaner.exe (PID: 812)
    • Changes the autorun value in the registry

      • CCleaner.exe (PID: 812)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 3804)
      • CCleaner.exe (PID: 812)
    • Changes settings of System certificates

      • CCleaner.exe (PID: 3804)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • CCleaner.exe (PID: 3804)
    • Reads internet explorer settings

      • CCleaner.exe (PID: 812)
      • CCleaner.exe (PID: 3804)
    • Reads the cookies of Mozilla Firefox

      • CCleaner.exe (PID: 3804)
    • Reads the cookies of Google Chrome

      • CCleaner.exe (PID: 3804)
    • Creates files in the user directory

      • CCleaner.exe (PID: 3804)
    • Executed via Task Scheduler

      • CCleaner.exe (PID: 3804)
    • Application launched itself

      • CCleaner.exe (PID: 3804)
    • Low-level read access rights to disk partition

      • CCleaner.exe (PID: 3804)
    • Adds / modifies Windows certificates

      • CCleaner.exe (PID: 3804)
  • INFO

    • Manual execution by user

      • CCleaner.exe (PID: 1464)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 3804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

ProductVersion: 0, 1, 0, 1
ProductName: Far Cry 3
OriginalFileName: FarCry3.exe
LegalCopyright: Copyright (C) 2008 Ubisoft Entertainment
InternalName: FarCry3
FileVersion: 0, 1, 0, 1
CompanyName: Ubisoft Entertainment
FileDescription: Far Cry 3
CharacterSet: Unicode
LanguageCode: Unknown (0009)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0017
ProductVersionNumber: 0.1.0.1
FileVersionNumber: 0.1.0.1
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x12f5
UninitializedDataSize: -
InitializedDataSize: 191488
CodeSize: 2560
LinkerVersion: 10
PEType: PE32
TimeStamp: 2012:11:22 20:23:25+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 22-Nov-2012 19:23:25
Detected languages:
  • English - United States
Debug artifacts:
  • R:\FC3-SUB-PC-44.0\bin\farcry3.pdb
FileDescription: Far Cry 3
CompanyName: Ubisoft Entertainment
FileVersion: 0, 1, 0, 1
InternalName: FarCry3
LegalCopyright: Copyright (C) 2008 Ubisoft Entertainment
OriginalFilename: FarCry3.exe
ProductName: Far Cry 3
ProductVersion: 0, 1, 0, 1

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 22-Nov-2012 19:23:25
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000084A
0x00000A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.44402
.rdata
0x00002000
0x00000636
0x00000800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.17788
.data
0x00003000
0x0000038C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.352759
.rsrc
0x00004000
0x0002DDE8
0x0002DE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.88035
.reloc
0x00032000
0x00000360
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
2.64173

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.79597
346
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.35559
744
Latin 1 / Western European
English - United States
RT_ICON
3
3.9793
296
Latin 1 / Western European
English - United States
RT_ICON
4
7.94422
53815
Latin 1 / Western European
English - United States
RT_ICON
5
6.6376
3752
Latin 1 / Western European
English - United States
RT_ICON
6
6.75256
2216
Latin 1 / Western European
English - United States
RT_ICON
7
6.34226
1384
Latin 1 / Western European
English - United States
RT_ICON
8
7.11956
7336
Latin 1 / Western European
English - United States
RT_ICON
9
7.30083
3240
Latin 1 / Western European
English - United States
RT_ICON
10
7.2996
872
Latin 1 / Western European
English - United States
RT_ICON

Imports

FC3.dll
KERNEL32.dll
MSVCR100.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start farcry3.exe no specs ccleaner.exe no specs ccleaner.exe ccleaner.exe

Process information

PID
CMD
Path
Indicators
Parent process
1432"C:\Users\admin\AppData\Local\Temp\farcry3.exe" C:\Users\admin\AppData\Local\Temp\farcry3.exeexplorer.exe
User:
admin
Company:
Ubisoft Entertainment
Integrity Level:
MEDIUM
Description:
Far Cry 3
Exit code:
3221225781
Version:
0, 1, 0, 1
1464"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
3804"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
taskeng.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner
Version:
5, 35, 0, 6210
812"C:\Program Files\CCleaner\CCleaner.exe" /monitorC:\Program Files\CCleaner\CCleaner.exe
CCleaner.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner
Version:
5, 35, 0, 6210
Total events
2 153
Read events
461
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
10
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
3804CCleaner.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\tmp.edb
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\webappsstore.sqlite-shm
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HXFEDK3TN6IY2ORRU9W1.temp
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Local\Temp\CabDC99.tmp
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Local\Temp\TarDC9A.tmp
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RR3MMDFQ5TTVGJ2XFHAG.temp
MD5:
SHA256:
3804CCleaner.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\V01.chkbinary
MD5:91B599D3EC5A4240D6D8A794FC027B43
SHA256:BB124C4BEA3D18CCC4D108ED28262F806AD364CD0A2693F49813E80563BA4736
3804CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ed7a5cc3cca8d52a.customDestinations-msbinary
MD5:6A255B5031B6C7080F548E6433ADE230
SHA256:AEC1FD113BF5C5FA607E1EBB085E27EF2A913F60313324C0D239FA793CAF31CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
8
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3804
CCleaner.exe
GET
301
151.101.0.64:80
http://www.piriform.com/auto?a=0&p=cc&v=5.35.6210&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
whitelisted
3804
CCleaner.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH
US
der
1.49 Kb
whitelisted
3804
CCleaner.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkbwjNvPLFRm7zMB3V80
US
der
1.49 Kb
whitelisted
3804
CCleaner.exe
GET
200
151.101.2.109:80
http://license.piriform.com/verify/?p=ccpro&c=cc&cv=5.35.6210&l=1033&lk=CJ9T-J7CU-SPNV-GWMB-WBEC&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
text
14 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3804
CCleaner.exe
104.18.21.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared
3804
CCleaner.exe
151.101.2.202:443
www.ccleaner.com
Fastly
US
suspicious
3804
CCleaner.exe
104.18.20.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared
3804
CCleaner.exe
151.101.2.109:443
license.piriform.com
Fastly
US
suspicious
3804
CCleaner.exe
151.101.0.64:80
www.piriform.com
Fastly
US
whitelisted
3804
CCleaner.exe
151.101.2.109:80
license.piriform.com
Fastly
US
suspicious
3804
CCleaner.exe
151.101.0.64:443
www.piriform.com
Fastly
US
whitelisted

DNS requests

Domain
IP
Reputation
www.piriform.com
  • 151.101.0.64
  • 151.101.64.64
  • 151.101.128.64
  • 151.101.192.64
whitelisted
www.ccleaner.com
  • 151.101.2.202
  • 151.101.66.202
  • 151.101.130.202
  • 151.101.194.202
whitelisted
ocsp.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
license.piriform.com
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted

Threats

No threats detected
No debug info